Oct 31 05:02:33.943546 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Oct 30 23:32:41 -00 2025 Oct 31 05:02:33.943588 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 05:02:33.943606 kernel: BIOS-provided physical RAM map: Oct 31 05:02:33.943616 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 31 05:02:33.943625 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 31 05:02:33.943634 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 31 05:02:33.943645 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Oct 31 05:02:33.943654 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Oct 31 05:02:33.943663 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Oct 31 05:02:33.943673 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Oct 31 05:02:33.943686 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 31 05:02:33.943695 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 31 05:02:33.943704 kernel: NX (Execute Disable) protection: active Oct 31 05:02:33.943714 kernel: SMBIOS 2.8 present. Oct 31 05:02:33.943725 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Oct 31 05:02:33.943736 kernel: Hypervisor detected: KVM Oct 31 05:02:33.943749 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 31 05:02:33.943759 kernel: kvm-clock: cpu 0, msr 381a0001, primary cpu clock Oct 31 05:02:33.943769 kernel: kvm-clock: using sched offset of 4841754201 cycles Oct 31 05:02:33.943780 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 31 05:02:33.943802 kernel: tsc: Detected 2799.998 MHz processor Oct 31 05:02:33.943813 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 31 05:02:33.943831 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 31 05:02:33.943853 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Oct 31 05:02:33.943863 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 31 05:02:33.943877 kernel: Using GB pages for direct mapping Oct 31 05:02:33.943887 kernel: ACPI: Early table checksum verification disabled Oct 31 05:02:33.943913 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Oct 31 05:02:33.943923 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:02:33.943932 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:02:33.943942 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:02:33.943951 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Oct 31 05:02:33.943960 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:02:33.943970 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:02:33.943983 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:02:33.943992 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:02:33.944013 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Oct 31 05:02:33.944023 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Oct 31 05:02:33.944032 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Oct 31 05:02:33.944041 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Oct 31 05:02:33.944055 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Oct 31 05:02:33.944068 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Oct 31 05:02:33.944078 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Oct 31 05:02:33.944087 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 31 05:02:33.944097 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 31 05:02:33.944107 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Oct 31 05:02:33.944117 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Oct 31 05:02:33.944126 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Oct 31 05:02:33.944139 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Oct 31 05:02:33.944149 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Oct 31 05:02:33.944159 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Oct 31 05:02:33.944168 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Oct 31 05:02:33.944178 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Oct 31 05:02:33.944188 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Oct 31 05:02:33.944197 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Oct 31 05:02:33.944207 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Oct 31 05:02:33.944216 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Oct 31 05:02:33.944226 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Oct 31 05:02:33.944239 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Oct 31 05:02:33.944249 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 31 05:02:33.944270 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Oct 31 05:02:33.944279 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Oct 31 05:02:33.944289 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Oct 31 05:02:33.944298 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Oct 31 05:02:33.944308 kernel: Zone ranges: Oct 31 05:02:33.944317 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 31 05:02:33.944327 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Oct 31 05:02:33.944340 kernel: Normal empty Oct 31 05:02:33.944349 kernel: Movable zone start for each node Oct 31 05:02:33.944359 kernel: Early memory node ranges Oct 31 05:02:33.944368 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 31 05:02:33.944377 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Oct 31 05:02:33.944387 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Oct 31 05:02:33.944396 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 31 05:02:33.944418 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 31 05:02:33.944428 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Oct 31 05:02:33.944441 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 31 05:02:33.944450 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 31 05:02:33.944460 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 31 05:02:33.944470 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 31 05:02:33.944492 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 31 05:02:33.944502 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 31 05:02:33.944512 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 31 05:02:33.944522 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 31 05:02:33.944532 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 31 05:02:33.944576 kernel: TSC deadline timer available Oct 31 05:02:33.944587 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Oct 31 05:02:33.944598 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Oct 31 05:02:33.944609 kernel: Booting paravirtualized kernel on KVM Oct 31 05:02:33.944619 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 31 05:02:33.944630 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Oct 31 05:02:33.944641 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Oct 31 05:02:33.944652 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Oct 31 05:02:33.944662 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Oct 31 05:02:33.944676 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Oct 31 05:02:33.944687 kernel: kvm-guest: PV spinlocks enabled Oct 31 05:02:33.944698 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 31 05:02:33.944708 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Oct 31 05:02:33.944719 kernel: Policy zone: DMA32 Oct 31 05:02:33.944731 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 05:02:33.944742 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 31 05:02:33.944753 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 31 05:02:33.944767 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 31 05:02:33.944778 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 31 05:02:33.944798 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 192524K reserved, 0K cma-reserved) Oct 31 05:02:33.944811 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Oct 31 05:02:33.944889 kernel: Kernel/User page tables isolation: enabled Oct 31 05:02:33.944900 kernel: ftrace: allocating 34614 entries in 136 pages Oct 31 05:02:33.944910 kernel: ftrace: allocated 136 pages with 2 groups Oct 31 05:02:33.944921 kernel: rcu: Hierarchical RCU implementation. Oct 31 05:02:33.944936 kernel: rcu: RCU event tracing is enabled. Oct 31 05:02:33.944951 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Oct 31 05:02:33.944962 kernel: Rude variant of Tasks RCU enabled. Oct 31 05:02:33.944973 kernel: Tracing variant of Tasks RCU enabled. Oct 31 05:02:33.944983 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 31 05:02:33.944998 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Oct 31 05:02:33.945008 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Oct 31 05:02:33.945019 kernel: random: crng init done Oct 31 05:02:33.945040 kernel: Console: colour VGA+ 80x25 Oct 31 05:02:33.945051 kernel: printk: console [tty0] enabled Oct 31 05:02:33.945062 kernel: printk: console [ttyS0] enabled Oct 31 05:02:33.945073 kernel: ACPI: Core revision 20210730 Oct 31 05:02:33.945083 kernel: APIC: Switch to symmetric I/O mode setup Oct 31 05:02:33.945098 kernel: x2apic enabled Oct 31 05:02:33.945109 kernel: Switched APIC routing to physical x2apic. Oct 31 05:02:33.945119 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Oct 31 05:02:33.945131 kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Oct 31 05:02:33.945142 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 31 05:02:33.945168 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Oct 31 05:02:33.945178 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Oct 31 05:02:33.945189 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 31 05:02:33.945199 kernel: Spectre V2 : Mitigation: Retpolines Oct 31 05:02:33.945209 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Oct 31 05:02:33.945219 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Oct 31 05:02:33.945230 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 31 05:02:33.945253 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 31 05:02:33.945263 kernel: MDS: Mitigation: Clear CPU buffers Oct 31 05:02:33.945274 kernel: MMIO Stale Data: Unknown: No mitigations Oct 31 05:02:33.945284 kernel: SRBDS: Unknown: Dependent on hypervisor status Oct 31 05:02:33.945300 kernel: active return thunk: its_return_thunk Oct 31 05:02:33.945311 kernel: ITS: Mitigation: Aligned branch/return thunks Oct 31 05:02:33.945322 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 31 05:02:33.945333 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 31 05:02:33.945343 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 31 05:02:33.945354 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 31 05:02:33.945365 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 31 05:02:33.945375 kernel: Freeing SMP alternatives memory: 32K Oct 31 05:02:33.945386 kernel: pid_max: default: 32768 minimum: 301 Oct 31 05:02:33.945397 kernel: LSM: Security Framework initializing Oct 31 05:02:33.945407 kernel: SELinux: Initializing. Oct 31 05:02:33.945422 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 31 05:02:33.945433 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 31 05:02:33.945444 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Oct 31 05:02:33.945454 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Oct 31 05:02:33.945465 kernel: signal: max sigframe size: 1776 Oct 31 05:02:33.945477 kernel: rcu: Hierarchical SRCU implementation. Oct 31 05:02:33.945488 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 31 05:02:33.945499 kernel: smp: Bringing up secondary CPUs ... Oct 31 05:02:33.945510 kernel: x86: Booting SMP configuration: Oct 31 05:02:33.945533 kernel: .... node #0, CPUs: #1 Oct 31 05:02:33.945564 kernel: kvm-clock: cpu 1, msr 381a0041, secondary cpu clock Oct 31 05:02:33.945575 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Oct 31 05:02:33.945599 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Oct 31 05:02:33.945609 kernel: smp: Brought up 1 node, 2 CPUs Oct 31 05:02:33.945620 kernel: smpboot: Max logical packages: 16 Oct 31 05:02:33.945631 kernel: smpboot: Total of 2 processors activated (11199.99 BogoMIPS) Oct 31 05:02:33.945641 kernel: devtmpfs: initialized Oct 31 05:02:33.945652 kernel: x86/mm: Memory block size: 128MB Oct 31 05:02:33.945663 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 31 05:02:33.945678 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Oct 31 05:02:33.945689 kernel: pinctrl core: initialized pinctrl subsystem Oct 31 05:02:33.945700 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 31 05:02:33.945711 kernel: audit: initializing netlink subsys (disabled) Oct 31 05:02:33.945722 kernel: audit: type=2000 audit(1761886952.870:1): state=initialized audit_enabled=0 res=1 Oct 31 05:02:33.945732 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 31 05:02:33.945743 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 31 05:02:33.945754 kernel: cpuidle: using governor menu Oct 31 05:02:33.945765 kernel: ACPI: bus type PCI registered Oct 31 05:02:33.945779 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 31 05:02:33.945790 kernel: dca service started, version 1.12.1 Oct 31 05:02:33.945824 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Oct 31 05:02:33.945843 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Oct 31 05:02:33.945853 kernel: PCI: Using configuration type 1 for base access Oct 31 05:02:33.945864 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 31 05:02:33.945887 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 31 05:02:33.945905 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 31 05:02:33.945916 kernel: ACPI: Added _OSI(Module Device) Oct 31 05:02:33.945931 kernel: ACPI: Added _OSI(Processor Device) Oct 31 05:02:33.945942 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 31 05:02:33.945966 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 31 05:02:33.945976 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 31 05:02:33.945987 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 31 05:02:33.945997 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 31 05:02:33.946008 kernel: ACPI: Interpreter enabled Oct 31 05:02:33.946018 kernel: ACPI: PM: (supports S0 S5) Oct 31 05:02:33.946029 kernel: ACPI: Using IOAPIC for interrupt routing Oct 31 05:02:33.946043 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 31 05:02:33.946053 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Oct 31 05:02:33.946064 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 31 05:02:33.946332 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 31 05:02:33.946483 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 31 05:02:33.946657 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 31 05:02:33.946675 kernel: PCI host bridge to bus 0000:00 Oct 31 05:02:33.946843 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 31 05:02:33.946996 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 31 05:02:33.947151 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 31 05:02:33.947300 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Oct 31 05:02:33.947441 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 31 05:02:33.947600 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Oct 31 05:02:33.947737 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 31 05:02:33.948011 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Oct 31 05:02:33.948193 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Oct 31 05:02:33.948367 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Oct 31 05:02:33.948569 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Oct 31 05:02:33.948722 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Oct 31 05:02:33.948890 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 31 05:02:33.949065 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Oct 31 05:02:33.949227 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Oct 31 05:02:33.949401 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Oct 31 05:02:33.949562 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Oct 31 05:02:33.949721 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Oct 31 05:02:33.949900 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Oct 31 05:02:33.950122 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Oct 31 05:02:33.950324 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Oct 31 05:02:33.950522 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Oct 31 05:02:33.950740 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Oct 31 05:02:33.950916 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Oct 31 05:02:33.951064 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Oct 31 05:02:33.951246 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Oct 31 05:02:33.951413 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Oct 31 05:02:33.951607 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Oct 31 05:02:33.951756 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Oct 31 05:02:33.951958 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Oct 31 05:02:33.952123 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Oct 31 05:02:33.952276 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Oct 31 05:02:33.952464 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Oct 31 05:02:33.952628 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Oct 31 05:02:33.958874 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 31 05:02:33.959055 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Oct 31 05:02:33.959210 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Oct 31 05:02:33.959362 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Oct 31 05:02:33.959520 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Oct 31 05:02:33.959691 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Oct 31 05:02:33.959870 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Oct 31 05:02:33.960021 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Oct 31 05:02:33.960167 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Oct 31 05:02:33.960322 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Oct 31 05:02:33.960469 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Oct 31 05:02:33.960644 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Oct 31 05:02:33.961849 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Oct 31 05:02:33.962015 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Oct 31 05:02:33.962189 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Oct 31 05:02:33.962338 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 31 05:02:33.962527 kernel: pci_bus 0000:02: extended config space not accessible Oct 31 05:02:33.962721 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Oct 31 05:02:33.962912 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Oct 31 05:02:33.963068 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Oct 31 05:02:33.963221 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Oct 31 05:02:33.963383 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Oct 31 05:02:33.963557 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Oct 31 05:02:33.963711 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Oct 31 05:02:33.963885 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Oct 31 05:02:33.964035 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 31 05:02:33.964198 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Oct 31 05:02:33.964353 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Oct 31 05:02:33.964500 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Oct 31 05:02:33.964661 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Oct 31 05:02:33.964823 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 31 05:02:33.964975 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Oct 31 05:02:33.965139 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Oct 31 05:02:33.965279 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 31 05:02:33.965438 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Oct 31 05:02:33.965599 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Oct 31 05:02:33.965746 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 31 05:02:33.965914 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Oct 31 05:02:33.966091 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Oct 31 05:02:33.966260 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 31 05:02:33.966428 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Oct 31 05:02:33.966594 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Oct 31 05:02:33.966745 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 31 05:02:33.971995 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Oct 31 05:02:33.972152 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Oct 31 05:02:33.972376 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 31 05:02:33.972404 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 31 05:02:33.972423 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 31 05:02:33.972441 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 31 05:02:33.972462 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 31 05:02:33.972474 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Oct 31 05:02:33.972485 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Oct 31 05:02:33.972497 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Oct 31 05:02:33.972508 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Oct 31 05:02:33.972532 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Oct 31 05:02:33.972557 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Oct 31 05:02:33.972569 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Oct 31 05:02:33.972585 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Oct 31 05:02:33.972596 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Oct 31 05:02:33.972615 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Oct 31 05:02:33.972628 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Oct 31 05:02:33.972640 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Oct 31 05:02:33.972651 kernel: iommu: Default domain type: Translated Oct 31 05:02:33.972663 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 31 05:02:33.973884 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Oct 31 05:02:33.974079 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 31 05:02:33.974261 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Oct 31 05:02:33.974280 kernel: vgaarb: loaded Oct 31 05:02:33.974292 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 31 05:02:33.974303 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 31 05:02:33.974315 kernel: PTP clock support registered Oct 31 05:02:33.974326 kernel: PCI: Using ACPI for IRQ routing Oct 31 05:02:33.974337 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 31 05:02:33.974348 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 31 05:02:33.974365 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Oct 31 05:02:33.974377 kernel: clocksource: Switched to clocksource kvm-clock Oct 31 05:02:33.974388 kernel: VFS: Disk quotas dquot_6.6.0 Oct 31 05:02:33.974399 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 31 05:02:33.974423 kernel: pnp: PnP ACPI init Oct 31 05:02:33.974636 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Oct 31 05:02:33.974655 kernel: pnp: PnP ACPI: found 5 devices Oct 31 05:02:33.974667 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 31 05:02:33.974679 kernel: NET: Registered PF_INET protocol family Oct 31 05:02:33.974696 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 31 05:02:33.974708 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 31 05:02:33.974719 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 31 05:02:33.974731 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 31 05:02:33.974742 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 31 05:02:33.974753 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 31 05:02:33.974765 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 31 05:02:33.974776 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 31 05:02:33.974806 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 31 05:02:33.974830 kernel: NET: Registered PF_XDP protocol family Oct 31 05:02:33.974982 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Oct 31 05:02:33.975133 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Oct 31 05:02:33.975292 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Oct 31 05:02:33.975461 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Oct 31 05:02:33.975636 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Oct 31 05:02:33.975790 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Oct 31 05:02:33.980007 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Oct 31 05:02:33.980165 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Oct 31 05:02:33.980330 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Oct 31 05:02:33.980500 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Oct 31 05:02:33.980665 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Oct 31 05:02:33.980830 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Oct 31 05:02:33.980986 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Oct 31 05:02:33.981156 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Oct 31 05:02:33.981308 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Oct 31 05:02:33.981472 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Oct 31 05:02:33.981656 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Oct 31 05:02:33.981824 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Oct 31 05:02:33.981985 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Oct 31 05:02:33.982161 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Oct 31 05:02:33.982314 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Oct 31 05:02:33.982457 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 31 05:02:33.982649 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Oct 31 05:02:33.982808 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Oct 31 05:02:33.987044 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Oct 31 05:02:33.987199 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 31 05:02:33.987354 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Oct 31 05:02:33.987526 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Oct 31 05:02:33.987690 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Oct 31 05:02:33.987864 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 31 05:02:33.988013 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Oct 31 05:02:33.988180 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Oct 31 05:02:33.988330 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Oct 31 05:02:33.988466 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 31 05:02:33.988643 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Oct 31 05:02:33.988826 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Oct 31 05:02:33.988979 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Oct 31 05:02:33.989152 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 31 05:02:33.989314 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Oct 31 05:02:33.989470 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Oct 31 05:02:33.989647 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Oct 31 05:02:33.999737 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 31 05:02:33.999971 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Oct 31 05:02:34.000137 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Oct 31 05:02:34.000311 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Oct 31 05:02:34.000465 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 31 05:02:34.000632 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Oct 31 05:02:34.000781 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Oct 31 05:02:34.001021 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Oct 31 05:02:34.001179 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 31 05:02:34.001335 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 31 05:02:34.001483 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 31 05:02:34.001642 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 31 05:02:34.001775 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Oct 31 05:02:34.001977 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Oct 31 05:02:34.002133 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Oct 31 05:02:34.002296 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Oct 31 05:02:34.002465 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Oct 31 05:02:34.002642 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Oct 31 05:02:34.002795 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Oct 31 05:02:34.003044 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Oct 31 05:02:34.003194 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Oct 31 05:02:34.003359 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 31 05:02:34.003549 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Oct 31 05:02:34.003707 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Oct 31 05:02:34.003903 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 31 05:02:34.004055 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Oct 31 05:02:34.004196 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Oct 31 05:02:34.004349 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 31 05:02:34.004506 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Oct 31 05:02:34.004679 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Oct 31 05:02:34.004847 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 31 05:02:34.005022 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Oct 31 05:02:34.005203 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Oct 31 05:02:34.005357 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 31 05:02:34.005531 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Oct 31 05:02:34.005706 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Oct 31 05:02:34.005906 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 31 05:02:34.006132 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Oct 31 05:02:34.006268 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Oct 31 05:02:34.006412 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 31 05:02:34.006429 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Oct 31 05:02:34.006441 kernel: PCI: CLS 0 bytes, default 64 Oct 31 05:02:34.006452 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 31 05:02:34.006481 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Oct 31 05:02:34.006493 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 31 05:02:34.006505 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Oct 31 05:02:34.006516 kernel: Initialise system trusted keyrings Oct 31 05:02:34.006549 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 31 05:02:34.006562 kernel: Key type asymmetric registered Oct 31 05:02:34.006574 kernel: Asymmetric key parser 'x509' registered Oct 31 05:02:34.006585 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 31 05:02:34.006597 kernel: io scheduler mq-deadline registered Oct 31 05:02:34.006625 kernel: io scheduler kyber registered Oct 31 05:02:34.006637 kernel: io scheduler bfq registered Oct 31 05:02:34.006785 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Oct 31 05:02:34.006962 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Oct 31 05:02:34.007121 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:02:34.007290 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Oct 31 05:02:34.007450 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Oct 31 05:02:34.007641 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:02:34.007804 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Oct 31 05:02:34.007984 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Oct 31 05:02:34.008162 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:02:34.008333 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Oct 31 05:02:34.008483 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Oct 31 05:02:34.008663 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:02:34.008851 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Oct 31 05:02:34.009047 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Oct 31 05:02:34.009229 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:02:34.009426 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Oct 31 05:02:34.009616 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Oct 31 05:02:34.009775 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:02:34.015124 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Oct 31 05:02:34.015325 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Oct 31 05:02:34.015494 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:02:34.015671 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Oct 31 05:02:34.015867 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Oct 31 05:02:34.016064 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:02:34.016089 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 31 05:02:34.016102 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Oct 31 05:02:34.016114 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Oct 31 05:02:34.016127 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 31 05:02:34.016139 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 31 05:02:34.016151 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 31 05:02:34.016169 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 31 05:02:34.016185 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 31 05:02:34.016197 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 31 05:02:34.016355 kernel: rtc_cmos 00:03: RTC can wake from S4 Oct 31 05:02:34.016546 kernel: rtc_cmos 00:03: registered as rtc0 Oct 31 05:02:34.016720 kernel: rtc_cmos 00:03: setting system clock to 2025-10-31T05:02:33 UTC (1761886953) Oct 31 05:02:34.016890 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Oct 31 05:02:34.016908 kernel: intel_pstate: CPU model not supported Oct 31 05:02:34.016921 kernel: NET: Registered PF_INET6 protocol family Oct 31 05:02:34.016939 kernel: Segment Routing with IPv6 Oct 31 05:02:34.016951 kernel: In-situ OAM (IOAM) with IPv6 Oct 31 05:02:34.016963 kernel: NET: Registered PF_PACKET protocol family Oct 31 05:02:34.016975 kernel: Key type dns_resolver registered Oct 31 05:02:34.016987 kernel: IPI shorthand broadcast: enabled Oct 31 05:02:34.016999 kernel: sched_clock: Marking stable (983631333, 220690082)->(1483817718, -279496303) Oct 31 05:02:34.017011 kernel: registered taskstats version 1 Oct 31 05:02:34.017023 kernel: Loading compiled-in X.509 certificates Oct 31 05:02:34.017035 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 8306d4e745b00e76b5fae2596c709096b7f28adc' Oct 31 05:02:34.017051 kernel: Key type .fscrypt registered Oct 31 05:02:34.017066 kernel: Key type fscrypt-provisioning registered Oct 31 05:02:34.017078 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 31 05:02:34.017090 kernel: ima: Allocated hash algorithm: sha1 Oct 31 05:02:34.017117 kernel: ima: No architecture policies found Oct 31 05:02:34.017129 kernel: clk: Disabling unused clocks Oct 31 05:02:34.017140 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 31 05:02:34.017152 kernel: Write protecting the kernel read-only data: 28672k Oct 31 05:02:34.017180 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 31 05:02:34.017191 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 31 05:02:34.017202 kernel: Run /init as init process Oct 31 05:02:34.017213 kernel: with arguments: Oct 31 05:02:34.017224 kernel: /init Oct 31 05:02:34.017249 kernel: with environment: Oct 31 05:02:34.017259 kernel: HOME=/ Oct 31 05:02:34.017270 kernel: TERM=linux Oct 31 05:02:34.017281 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 31 05:02:34.017323 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 05:02:34.017343 systemd[1]: Detected virtualization kvm. Oct 31 05:02:34.017392 systemd[1]: Detected architecture x86-64. Oct 31 05:02:34.017405 systemd[1]: Running in initrd. Oct 31 05:02:34.017430 systemd[1]: No hostname configured, using default hostname. Oct 31 05:02:34.017442 systemd[1]: Hostname set to . Oct 31 05:02:34.017456 systemd[1]: Initializing machine ID from VM UUID. Oct 31 05:02:34.017468 systemd[1]: Queued start job for default target initrd.target. Oct 31 05:02:34.017486 systemd[1]: Started systemd-ask-password-console.path. Oct 31 05:02:34.017507 systemd[1]: Reached target cryptsetup.target. Oct 31 05:02:34.017520 systemd[1]: Reached target paths.target. Oct 31 05:02:34.017533 systemd[1]: Reached target slices.target. Oct 31 05:02:34.017555 systemd[1]: Reached target swap.target. Oct 31 05:02:34.017568 systemd[1]: Reached target timers.target. Oct 31 05:02:34.017582 systemd[1]: Listening on iscsid.socket. Oct 31 05:02:34.017599 systemd[1]: Listening on iscsiuio.socket. Oct 31 05:02:34.017612 systemd[1]: Listening on systemd-journald-audit.socket. Oct 31 05:02:34.017625 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 31 05:02:34.017638 systemd[1]: Listening on systemd-journald.socket. Oct 31 05:02:34.017650 systemd[1]: Listening on systemd-networkd.socket. Oct 31 05:02:34.017663 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 05:02:34.017676 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 05:02:34.017689 systemd[1]: Reached target sockets.target. Oct 31 05:02:34.017702 systemd[1]: Starting kmod-static-nodes.service... Oct 31 05:02:34.017718 systemd[1]: Finished network-cleanup.service. Oct 31 05:02:34.017731 systemd[1]: Starting systemd-fsck-usr.service... Oct 31 05:02:34.017744 systemd[1]: Starting systemd-journald.service... Oct 31 05:02:34.017761 systemd[1]: Starting systemd-modules-load.service... Oct 31 05:02:34.017774 systemd[1]: Starting systemd-resolved.service... Oct 31 05:02:34.017797 systemd[1]: Starting systemd-vconsole-setup.service... Oct 31 05:02:34.017812 systemd[1]: Finished kmod-static-nodes.service. Oct 31 05:02:34.017825 kernel: audit: type=1130 audit(1761886953.937:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.017843 systemd[1]: Finished systemd-fsck-usr.service. Oct 31 05:02:34.017871 systemd-journald[200]: Journal started Oct 31 05:02:34.017948 systemd-journald[200]: Runtime Journal (/run/log/journal/e453887e886f40af8fee5969cb74db83) is 4.7M, max 38.1M, 33.3M free. Oct 31 05:02:33.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:33.952852 systemd-modules-load[201]: Inserted module 'overlay' Oct 31 05:02:34.051777 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 31 05:02:34.051857 kernel: Bridge firewalling registered Oct 31 05:02:34.051876 systemd[1]: Started systemd-resolved.service. Oct 31 05:02:34.051911 kernel: audit: type=1130 audit(1761886954.043:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:33.999202 systemd-resolved[202]: Positive Trust Anchors: Oct 31 05:02:34.067910 systemd[1]: Started systemd-journald.service. Oct 31 05:02:34.067935 kernel: audit: type=1130 audit(1761886954.051:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.067953 kernel: SCSI subsystem initialized Oct 31 05:02:34.067969 kernel: audit: type=1130 audit(1761886954.060:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:33.999237 systemd-resolved[202]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 05:02:33.999282 systemd-resolved[202]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 05:02:34.004412 systemd-resolved[202]: Defaulting to hostname 'linux'. Oct 31 05:02:34.025088 systemd-modules-load[201]: Inserted module 'br_netfilter' Oct 31 05:02:34.061291 systemd[1]: Finished systemd-vconsole-setup.service. Oct 31 05:02:34.087951 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 31 05:02:34.087982 kernel: audit: type=1130 audit(1761886954.073:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.088001 kernel: device-mapper: uevent: version 1.0.3 Oct 31 05:02:34.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.074575 systemd[1]: Reached target nss-lookup.target. Oct 31 05:02:34.076658 systemd[1]: Starting dracut-cmdline-ask.service... Oct 31 05:02:34.090599 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 05:02:34.100240 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 31 05:02:34.099431 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 05:02:34.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.106824 kernel: audit: type=1130 audit(1761886954.099:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.110151 systemd-modules-load[201]: Inserted module 'dm_multipath' Oct 31 05:02:34.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.112524 systemd[1]: Finished systemd-modules-load.service. Oct 31 05:02:34.119395 kernel: audit: type=1130 audit(1761886954.112:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.120380 systemd[1]: Starting systemd-sysctl.service... Oct 31 05:02:34.124464 systemd[1]: Finished dracut-cmdline-ask.service. Oct 31 05:02:34.127125 systemd[1]: Starting dracut-cmdline.service... Oct 31 05:02:34.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.135552 kernel: audit: type=1130 audit(1761886954.125:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.135984 systemd[1]: Finished systemd-sysctl.service. Oct 31 05:02:34.158209 kernel: audit: type=1130 audit(1761886954.136:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.161669 dracut-cmdline[223]: dracut-dracut-053 Oct 31 05:02:34.164892 dracut-cmdline[223]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 05:02:34.250852 kernel: Loading iSCSI transport class v2.0-870. Oct 31 05:02:34.271830 kernel: iscsi: registered transport (tcp) Oct 31 05:02:34.299929 kernel: iscsi: registered transport (qla4xxx) Oct 31 05:02:34.300008 kernel: QLogic iSCSI HBA Driver Oct 31 05:02:34.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.346745 systemd[1]: Finished dracut-cmdline.service. Oct 31 05:02:34.348588 systemd[1]: Starting dracut-pre-udev.service... Oct 31 05:02:34.404878 kernel: raid6: sse2x4 gen() 14623 MB/s Oct 31 05:02:34.422825 kernel: raid6: sse2x4 xor() 8428 MB/s Oct 31 05:02:34.440828 kernel: raid6: sse2x2 gen() 9979 MB/s Oct 31 05:02:34.458855 kernel: raid6: sse2x2 xor() 8531 MB/s Oct 31 05:02:34.476827 kernel: raid6: sse2x1 gen() 10161 MB/s Oct 31 05:02:34.495411 kernel: raid6: sse2x1 xor() 7605 MB/s Oct 31 05:02:34.495468 kernel: raid6: using algorithm sse2x4 gen() 14623 MB/s Oct 31 05:02:34.495486 kernel: raid6: .... xor() 8428 MB/s, rmw enabled Oct 31 05:02:34.496664 kernel: raid6: using ssse3x2 recovery algorithm Oct 31 05:02:34.513828 kernel: xor: automatically using best checksumming function avx Oct 31 05:02:34.624862 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 31 05:02:34.638729 systemd[1]: Finished dracut-pre-udev.service. Oct 31 05:02:34.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.639000 audit: BPF prog-id=7 op=LOAD Oct 31 05:02:34.639000 audit: BPF prog-id=8 op=LOAD Oct 31 05:02:34.640730 systemd[1]: Starting systemd-udevd.service... Oct 31 05:02:34.657653 systemd-udevd[401]: Using default interface naming scheme 'v252'. Oct 31 05:02:34.666838 systemd[1]: Started systemd-udevd.service. Oct 31 05:02:34.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.670261 systemd[1]: Starting dracut-pre-trigger.service... Oct 31 05:02:34.687019 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation Oct 31 05:02:34.727569 systemd[1]: Finished dracut-pre-trigger.service. Oct 31 05:02:34.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.729352 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 05:02:34.821763 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 05:02:34.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:34.906024 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Oct 31 05:02:34.969780 kernel: cryptd: max_cpu_qlen set to 1000 Oct 31 05:02:34.969826 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 31 05:02:34.969843 kernel: GPT:17805311 != 125829119 Oct 31 05:02:34.969869 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 31 05:02:34.969892 kernel: GPT:17805311 != 125829119 Oct 31 05:02:34.969908 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 31 05:02:34.969923 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 05:02:34.969939 kernel: AVX version of gcm_enc/dec engaged. Oct 31 05:02:34.969954 kernel: AES CTR mode by8 optimization enabled Oct 31 05:02:34.976812 kernel: ACPI: bus type USB registered Oct 31 05:02:34.976852 kernel: usbcore: registered new interface driver usbfs Oct 31 05:02:34.976871 kernel: usbcore: registered new interface driver hub Oct 31 05:02:34.976887 kernel: usbcore: registered new device driver usb Oct 31 05:02:34.979825 kernel: libata version 3.00 loaded. Oct 31 05:02:35.008994 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Oct 31 05:02:35.014456 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Oct 31 05:02:35.014654 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Oct 31 05:02:35.014848 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Oct 31 05:02:35.015027 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Oct 31 05:02:35.015197 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Oct 31 05:02:35.015366 kernel: hub 1-0:1.0: USB hub found Oct 31 05:02:35.015584 kernel: hub 1-0:1.0: 4 ports detected Oct 31 05:02:35.015770 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Oct 31 05:02:35.015985 kernel: hub 2-0:1.0: USB hub found Oct 31 05:02:35.016299 kernel: hub 2-0:1.0: 4 ports detected Oct 31 05:02:35.017888 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 31 05:02:35.152024 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (450) Oct 31 05:02:35.152066 kernel: ahci 0000:00:1f.2: version 3.0 Oct 31 05:02:35.152351 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Oct 31 05:02:35.152371 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Oct 31 05:02:35.152557 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Oct 31 05:02:35.152720 kernel: scsi host0: ahci Oct 31 05:02:35.152949 kernel: scsi host1: ahci Oct 31 05:02:35.153169 kernel: scsi host2: ahci Oct 31 05:02:35.153385 kernel: scsi host3: ahci Oct 31 05:02:35.153612 kernel: scsi host4: ahci Oct 31 05:02:35.153809 kernel: scsi host5: ahci Oct 31 05:02:35.154032 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 41 Oct 31 05:02:35.154050 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 41 Oct 31 05:02:35.154066 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 41 Oct 31 05:02:35.154087 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 41 Oct 31 05:02:35.154109 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 41 Oct 31 05:02:35.154125 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 41 Oct 31 05:02:35.152646 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 31 05:02:35.158287 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 31 05:02:35.163377 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 31 05:02:35.168757 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 05:02:35.170669 systemd[1]: Starting disk-uuid.service... Oct 31 05:02:35.177090 disk-uuid[534]: Primary Header is updated. Oct 31 05:02:35.177090 disk-uuid[534]: Secondary Entries is updated. Oct 31 05:02:35.177090 disk-uuid[534]: Secondary Header is updated. Oct 31 05:02:35.180453 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 05:02:35.249833 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Oct 31 05:02:35.357818 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 31 05:02:35.361366 kernel: ata3: SATA link down (SStatus 0 SControl 300) Oct 31 05:02:35.361399 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 31 05:02:35.362980 kernel: ata2: SATA link down (SStatus 0 SControl 300) Oct 31 05:02:35.364556 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 31 05:02:35.366260 kernel: ata1: SATA link down (SStatus 0 SControl 300) Oct 31 05:02:35.390812 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 31 05:02:35.397939 kernel: usbcore: registered new interface driver usbhid Oct 31 05:02:35.397975 kernel: usbhid: USB HID core driver Oct 31 05:02:35.407658 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Oct 31 05:02:35.407696 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Oct 31 05:02:36.193818 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 05:02:36.194411 disk-uuid[535]: The operation has completed successfully. Oct 31 05:02:36.249712 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 31 05:02:36.249871 systemd[1]: Finished disk-uuid.service. Oct 31 05:02:36.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.251616 systemd[1]: Starting verity-setup.service... Oct 31 05:02:36.273816 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Oct 31 05:02:36.313024 systemd[1]: Found device dev-mapper-usr.device. Oct 31 05:02:36.316716 systemd[1]: Mounting sysusr-usr.mount... Oct 31 05:02:36.319224 systemd[1]: Finished verity-setup.service. Oct 31 05:02:36.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.411835 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 31 05:02:36.411517 systemd[1]: Mounted sysusr-usr.mount. Oct 31 05:02:36.412341 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 31 05:02:36.413437 systemd[1]: Starting ignition-setup.service... Oct 31 05:02:36.417749 systemd[1]: Starting parse-ip-for-networkd.service... Oct 31 05:02:36.433348 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 05:02:36.433415 kernel: BTRFS info (device vda6): using free space tree Oct 31 05:02:36.433442 kernel: BTRFS info (device vda6): has skinny extents Oct 31 05:02:36.462015 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 31 05:02:36.471565 systemd[1]: Finished ignition-setup.service. Oct 31 05:02:36.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.473676 systemd[1]: Starting ignition-fetch-offline.service... Oct 31 05:02:36.552339 systemd[1]: Finished parse-ip-for-networkd.service. Oct 31 05:02:36.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.560000 audit: BPF prog-id=9 op=LOAD Oct 31 05:02:36.562774 systemd[1]: Starting systemd-networkd.service... Oct 31 05:02:36.612094 systemd-networkd[708]: lo: Link UP Oct 31 05:02:36.613175 systemd-networkd[708]: lo: Gained carrier Oct 31 05:02:36.615577 systemd-networkd[708]: Enumeration completed Oct 31 05:02:36.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.616518 systemd[1]: Started systemd-networkd.service. Oct 31 05:02:36.617323 systemd[1]: Reached target network.target. Oct 31 05:02:36.619217 systemd[1]: Starting iscsiuio.service... Oct 31 05:02:36.633298 systemd-networkd[708]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 05:02:36.639225 systemd-networkd[708]: eth0: Link UP Oct 31 05:02:36.639248 systemd-networkd[708]: eth0: Gained carrier Oct 31 05:02:36.642191 systemd[1]: Started iscsiuio.service. Oct 31 05:02:36.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.644268 systemd[1]: Starting iscsid.service... Oct 31 05:02:36.651944 iscsid[714]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 31 05:02:36.651944 iscsid[714]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 31 05:02:36.651944 iscsid[714]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 31 05:02:36.651944 iscsid[714]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 31 05:02:36.651944 iscsid[714]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 31 05:02:36.651944 iscsid[714]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 31 05:02:36.651944 iscsid[714]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 31 05:02:36.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.653443 systemd[1]: Started iscsid.service. Oct 31 05:02:36.656360 systemd[1]: Starting dracut-initqueue.service... Oct 31 05:02:36.664700 systemd-networkd[708]: eth0: DHCPv4 address 10.230.52.158/30, gateway 10.230.52.157 acquired from 10.230.52.157 Oct 31 05:02:36.681243 ignition[648]: Ignition 2.14.0 Oct 31 05:02:36.681273 ignition[648]: Stage: fetch-offline Oct 31 05:02:36.681386 ignition[648]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:02:36.681426 ignition[648]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:02:36.684658 systemd[1]: Finished ignition-fetch-offline.service. Oct 31 05:02:36.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.682699 ignition[648]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:02:36.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.686890 systemd[1]: Finished dracut-initqueue.service. Oct 31 05:02:36.682860 ignition[648]: parsed url from cmdline: "" Oct 31 05:02:36.688116 systemd[1]: Reached target remote-fs-pre.target. Oct 31 05:02:36.682867 ignition[648]: no config URL provided Oct 31 05:02:36.689421 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 05:02:36.682877 ignition[648]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 05:02:36.690768 systemd[1]: Reached target remote-fs.target. Oct 31 05:02:36.682893 ignition[648]: no config at "/usr/lib/ignition/user.ign" Oct 31 05:02:36.693210 systemd[1]: Starting dracut-pre-mount.service... Oct 31 05:02:36.682904 ignition[648]: failed to fetch config: resource requires networking Oct 31 05:02:36.683062 ignition[648]: Ignition finished successfully Oct 31 05:02:36.700376 systemd[1]: Starting ignition-fetch.service... Oct 31 05:02:36.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.710026 systemd[1]: Finished dracut-pre-mount.service. Oct 31 05:02:36.714070 ignition[725]: Ignition 2.14.0 Oct 31 05:02:36.715039 ignition[725]: Stage: fetch Oct 31 05:02:36.715857 ignition[725]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:02:36.716843 ignition[725]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:02:36.718520 ignition[725]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:02:36.719629 ignition[725]: parsed url from cmdline: "" Oct 31 05:02:36.719717 ignition[725]: no config URL provided Oct 31 05:02:36.720376 ignition[725]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 05:02:36.721282 ignition[725]: no config at "/usr/lib/ignition/user.ign" Oct 31 05:02:36.725328 ignition[725]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Oct 31 05:02:36.725405 ignition[725]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Oct 31 05:02:36.727216 ignition[725]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Oct 31 05:02:36.748642 ignition[725]: GET result: OK Oct 31 05:02:36.749030 ignition[725]: parsing config with SHA512: c813df35981832b10a17d768055fbc55501749b5199ce3090bc961e7e7f5ce9b9ba36f798bc21f83434dad36b0da40c58ce1598a59b3c66301a2f207fc899815 Oct 31 05:02:36.760343 unknown[725]: fetched base config from "system" Oct 31 05:02:36.760362 unknown[725]: fetched base config from "system" Oct 31 05:02:36.760902 ignition[725]: fetch: fetch complete Oct 31 05:02:36.760374 unknown[725]: fetched user config from "openstack" Oct 31 05:02:36.760911 ignition[725]: fetch: fetch passed Oct 31 05:02:36.760967 ignition[725]: Ignition finished successfully Oct 31 05:02:36.765278 systemd[1]: Finished ignition-fetch.service. Oct 31 05:02:36.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.767326 systemd[1]: Starting ignition-kargs.service... Oct 31 05:02:36.780703 ignition[734]: Ignition 2.14.0 Oct 31 05:02:36.781672 ignition[734]: Stage: kargs Oct 31 05:02:36.782509 ignition[734]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:02:36.783522 ignition[734]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:02:36.784914 ignition[734]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:02:36.787432 ignition[734]: kargs: kargs passed Oct 31 05:02:36.788177 ignition[734]: Ignition finished successfully Oct 31 05:02:36.790121 systemd[1]: Finished ignition-kargs.service. Oct 31 05:02:36.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.792143 systemd[1]: Starting ignition-disks.service... Oct 31 05:02:36.802903 ignition[739]: Ignition 2.14.0 Oct 31 05:02:36.802927 ignition[739]: Stage: disks Oct 31 05:02:36.803114 ignition[739]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:02:36.803147 ignition[739]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:02:36.804499 ignition[739]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:02:36.806010 ignition[739]: disks: disks passed Oct 31 05:02:36.806081 ignition[739]: Ignition finished successfully Oct 31 05:02:36.807873 systemd[1]: Finished ignition-disks.service. Oct 31 05:02:36.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.809695 systemd[1]: Reached target initrd-root-device.target. Oct 31 05:02:36.810409 systemd[1]: Reached target local-fs-pre.target. Oct 31 05:02:36.811732 systemd[1]: Reached target local-fs.target. Oct 31 05:02:36.812342 systemd[1]: Reached target sysinit.target. Oct 31 05:02:36.813722 systemd[1]: Reached target basic.target. Oct 31 05:02:36.816292 systemd[1]: Starting systemd-fsck-root.service... Oct 31 05:02:36.838195 systemd-fsck[746]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Oct 31 05:02:36.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.842372 systemd[1]: Finished systemd-fsck-root.service. Oct 31 05:02:36.844126 systemd[1]: Mounting sysroot.mount... Oct 31 05:02:36.858836 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 31 05:02:36.859406 systemd[1]: Mounted sysroot.mount. Oct 31 05:02:36.860830 systemd[1]: Reached target initrd-root-fs.target. Oct 31 05:02:36.863809 systemd[1]: Mounting sysroot-usr.mount... Oct 31 05:02:36.865812 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 31 05:02:36.867735 systemd[1]: Starting flatcar-openstack-hostname.service... Oct 31 05:02:36.868439 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 31 05:02:36.868495 systemd[1]: Reached target ignition-diskful.target. Oct 31 05:02:36.870595 systemd[1]: Mounted sysroot-usr.mount. Oct 31 05:02:36.873866 systemd[1]: Starting initrd-setup-root.service... Oct 31 05:02:36.884257 initrd-setup-root[757]: cut: /sysroot/etc/passwd: No such file or directory Oct 31 05:02:36.898713 initrd-setup-root[765]: cut: /sysroot/etc/group: No such file or directory Oct 31 05:02:36.907224 initrd-setup-root[773]: cut: /sysroot/etc/shadow: No such file or directory Oct 31 05:02:36.915898 initrd-setup-root[781]: cut: /sysroot/etc/gshadow: No such file or directory Oct 31 05:02:36.982837 systemd[1]: Finished initrd-setup-root.service. Oct 31 05:02:36.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:36.984620 systemd[1]: Starting ignition-mount.service... Oct 31 05:02:36.986145 systemd[1]: Starting sysroot-boot.service... Oct 31 05:02:36.998427 bash[800]: umount: /sysroot/usr/share/oem: not mounted. Oct 31 05:02:37.014085 ignition[801]: INFO : Ignition 2.14.0 Oct 31 05:02:37.015108 ignition[801]: INFO : Stage: mount Oct 31 05:02:37.016002 ignition[801]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:02:37.017003 coreos-metadata[752]: Oct 31 05:02:37.016 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Oct 31 05:02:37.018316 ignition[801]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:02:37.022984 ignition[801]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:02:37.025455 ignition[801]: INFO : mount: mount passed Oct 31 05:02:37.034512 ignition[801]: INFO : Ignition finished successfully Oct 31 05:02:37.035411 coreos-metadata[752]: Oct 31 05:02:37.035 INFO Fetch successful Oct 31 05:02:37.036237 coreos-metadata[752]: Oct 31 05:02:37.036 INFO wrote hostname srv-cjebs.gb1.brightbox.com to /sysroot/etc/hostname Oct 31 05:02:37.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:37.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:37.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:37.038349 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Oct 31 05:02:37.038528 systemd[1]: Finished flatcar-openstack-hostname.service. Oct 31 05:02:37.039567 systemd[1]: Finished ignition-mount.service. Oct 31 05:02:37.044110 systemd[1]: Finished sysroot-boot.service. Oct 31 05:02:37.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:37.338670 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 31 05:02:37.350398 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (811) Oct 31 05:02:37.354217 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 05:02:37.354262 kernel: BTRFS info (device vda6): using free space tree Oct 31 05:02:37.354281 kernel: BTRFS info (device vda6): has skinny extents Oct 31 05:02:37.361210 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 31 05:02:37.362985 systemd[1]: Starting ignition-files.service... Oct 31 05:02:37.383827 ignition[831]: INFO : Ignition 2.14.0 Oct 31 05:02:37.384907 ignition[831]: INFO : Stage: files Oct 31 05:02:37.385758 ignition[831]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:02:37.386701 ignition[831]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:02:37.389412 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:02:37.392018 ignition[831]: DEBUG : files: compiled without relabeling support, skipping Oct 31 05:02:37.392895 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 31 05:02:37.392895 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 31 05:02:37.396195 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 31 05:02:37.397419 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 31 05:02:37.399738 unknown[831]: wrote ssh authorized keys file for user: core Oct 31 05:02:37.400735 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 31 05:02:37.402034 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Oct 31 05:02:37.403254 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 Oct 31 05:02:37.595022 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 31 05:02:37.835430 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Oct 31 05:02:37.836819 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Oct 31 05:02:37.836819 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Oct 31 05:02:37.836819 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 31 05:02:37.836819 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 31 05:02:37.836819 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 31 05:02:37.842029 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 31 05:02:37.842029 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 31 05:02:37.842029 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 31 05:02:37.842029 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 05:02:37.842029 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 05:02:37.842029 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 05:02:37.842029 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 05:02:37.842029 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 05:02:37.842029 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Oct 31 05:02:38.377128 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Oct 31 05:02:38.582413 systemd-networkd[708]: eth0: Gained IPv6LL Oct 31 05:02:40.007522 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 31 05:02:40.009474 ignition[831]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 31 05:02:40.009474 ignition[831]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 31 05:02:40.009474 ignition[831]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Oct 31 05:02:40.012271 ignition[831]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 31 05:02:40.012271 ignition[831]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 31 05:02:40.012271 ignition[831]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Oct 31 05:02:40.012271 ignition[831]: INFO : files: op(e): [started] setting preset to enabled for "prepare-helm.service" Oct 31 05:02:40.012271 ignition[831]: INFO : files: op(e): [finished] setting preset to enabled for "prepare-helm.service" Oct 31 05:02:40.012271 ignition[831]: INFO : files: op(f): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 31 05:02:40.012271 ignition[831]: INFO : files: op(f): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 31 05:02:40.024532 ignition[831]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 31 05:02:40.026878 ignition[831]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 31 05:02:40.026878 ignition[831]: INFO : files: files passed Oct 31 05:02:40.026878 ignition[831]: INFO : Ignition finished successfully Oct 31 05:02:40.041780 kernel: kauditd_printk_skb: 28 callbacks suppressed Oct 31 05:02:40.041840 kernel: audit: type=1130 audit(1761886960.029:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.027705 systemd[1]: Finished ignition-files.service. Oct 31 05:02:40.032419 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 31 05:02:40.056070 kernel: audit: type=1130 audit(1761886960.045:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.056105 kernel: audit: type=1131 audit(1761886960.045:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.038837 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 31 05:02:40.040175 systemd[1]: Starting ignition-quench.service... Oct 31 05:02:40.058632 initrd-setup-root-after-ignition[856]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 31 05:02:40.045113 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 31 05:02:40.066086 kernel: audit: type=1130 audit(1761886960.059:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.045245 systemd[1]: Finished ignition-quench.service. Oct 31 05:02:40.059148 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 31 05:02:40.060649 systemd[1]: Reached target ignition-complete.target. Oct 31 05:02:40.067760 systemd[1]: Starting initrd-parse-etc.service... Oct 31 05:02:40.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.087166 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 31 05:02:40.098970 kernel: audit: type=1130 audit(1761886960.087:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.099015 kernel: audit: type=1131 audit(1761886960.087:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.087337 systemd[1]: Finished initrd-parse-etc.service. Oct 31 05:02:40.088204 systemd[1]: Reached target initrd-fs.target. Oct 31 05:02:40.089243 systemd-networkd[708]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8d27:24:19ff:fee6:349e/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8d27:24:19ff:fee6:349e/64 assigned by NDisc. Oct 31 05:02:40.089249 systemd-networkd[708]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Oct 31 05:02:40.098219 systemd[1]: Reached target initrd.target. Oct 31 05:02:40.099606 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 31 05:02:40.100833 systemd[1]: Starting dracut-pre-pivot.service... Oct 31 05:02:40.117913 systemd[1]: Finished dracut-pre-pivot.service. Oct 31 05:02:40.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.124842 kernel: audit: type=1130 audit(1761886960.118:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.125434 systemd[1]: Starting initrd-cleanup.service... Oct 31 05:02:40.138689 systemd[1]: Stopped target nss-lookup.target. Oct 31 05:02:40.140224 systemd[1]: Stopped target remote-cryptsetup.target. Oct 31 05:02:40.154934 systemd[1]: Stopped target timers.target. Oct 31 05:02:40.156418 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 31 05:02:40.157416 systemd[1]: Stopped dracut-pre-pivot.service. Oct 31 05:02:40.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.159038 systemd[1]: Stopped target initrd.target. Oct 31 05:02:40.164377 kernel: audit: type=1131 audit(1761886960.157:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.165188 systemd[1]: Stopped target basic.target. Oct 31 05:02:40.165983 systemd[1]: Stopped target ignition-complete.target. Oct 31 05:02:40.167212 systemd[1]: Stopped target ignition-diskful.target. Oct 31 05:02:40.168456 systemd[1]: Stopped target initrd-root-device.target. Oct 31 05:02:40.169660 systemd[1]: Stopped target remote-fs.target. Oct 31 05:02:40.170893 systemd[1]: Stopped target remote-fs-pre.target. Oct 31 05:02:40.172084 systemd[1]: Stopped target sysinit.target. Oct 31 05:02:40.173222 systemd[1]: Stopped target local-fs.target. Oct 31 05:02:40.174369 systemd[1]: Stopped target local-fs-pre.target. Oct 31 05:02:40.175537 systemd[1]: Stopped target swap.target. Oct 31 05:02:40.176737 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 31 05:02:40.182994 kernel: audit: type=1131 audit(1761886960.177:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.177013 systemd[1]: Stopped dracut-pre-mount.service. Oct 31 05:02:40.178130 systemd[1]: Stopped target cryptsetup.target. Oct 31 05:02:40.189928 kernel: audit: type=1131 audit(1761886960.184:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.183692 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 31 05:02:40.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.183945 systemd[1]: Stopped dracut-initqueue.service. Oct 31 05:02:40.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.185095 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 31 05:02:40.185324 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 31 05:02:40.190783 systemd[1]: ignition-files.service: Deactivated successfully. Oct 31 05:02:40.191041 systemd[1]: Stopped ignition-files.service. Oct 31 05:02:40.193600 systemd[1]: Stopping ignition-mount.service... Oct 31 05:02:40.197000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.197420 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 31 05:02:40.197606 systemd[1]: Stopped kmod-static-nodes.service. Oct 31 05:02:40.199559 systemd[1]: Stopping sysroot-boot.service... Oct 31 05:02:40.200350 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 31 05:02:40.200603 systemd[1]: Stopped systemd-udev-trigger.service. Oct 31 05:02:40.201397 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 31 05:02:40.201532 systemd[1]: Stopped dracut-pre-trigger.service. Oct 31 05:02:40.213262 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 31 05:02:40.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.224772 ignition[869]: INFO : Ignition 2.14.0 Oct 31 05:02:40.224772 ignition[869]: INFO : Stage: umount Oct 31 05:02:40.224772 ignition[869]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:02:40.224772 ignition[869]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:02:40.224772 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:02:40.224772 ignition[869]: INFO : umount: umount passed Oct 31 05:02:40.224772 ignition[869]: INFO : Ignition finished successfully Oct 31 05:02:40.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.213418 systemd[1]: Finished initrd-cleanup.service. Oct 31 05:02:40.221599 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 31 05:02:40.221735 systemd[1]: Stopped ignition-mount.service. Oct 31 05:02:40.222516 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 31 05:02:40.222583 systemd[1]: Stopped ignition-disks.service. Oct 31 05:02:40.223219 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 31 05:02:40.223269 systemd[1]: Stopped ignition-kargs.service. Oct 31 05:02:40.227180 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 31 05:02:40.227257 systemd[1]: Stopped ignition-fetch.service. Oct 31 05:02:40.228984 systemd[1]: Stopped target network.target. Oct 31 05:02:40.230413 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 31 05:02:40.230480 systemd[1]: Stopped ignition-fetch-offline.service. Oct 31 05:02:40.231779 systemd[1]: Stopped target paths.target. Oct 31 05:02:40.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.233014 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 31 05:02:40.237942 systemd[1]: Stopped systemd-ask-password-console.path. Oct 31 05:02:40.238695 systemd[1]: Stopped target slices.target. Oct 31 05:02:40.239972 systemd[1]: Stopped target sockets.target. Oct 31 05:02:40.241190 systemd[1]: iscsid.socket: Deactivated successfully. Oct 31 05:02:40.241242 systemd[1]: Closed iscsid.socket. Oct 31 05:02:40.242327 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 31 05:02:40.242368 systemd[1]: Closed iscsiuio.socket. Oct 31 05:02:40.243601 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 31 05:02:40.243689 systemd[1]: Stopped ignition-setup.service. Oct 31 05:02:40.246113 systemd[1]: Stopping systemd-networkd.service... Oct 31 05:02:40.247477 systemd[1]: Stopping systemd-resolved.service... Oct 31 05:02:40.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.249848 systemd-networkd[708]: eth0: DHCPv6 lease lost Oct 31 05:02:40.253115 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 31 05:02:40.254007 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 31 05:02:40.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.258000 audit: BPF prog-id=6 op=UNLOAD Oct 31 05:02:40.254182 systemd[1]: Stopped systemd-resolved.service. Oct 31 05:02:40.256526 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 31 05:02:40.260000 audit: BPF prog-id=9 op=UNLOAD Oct 31 05:02:40.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.257028 systemd[1]: Stopped systemd-networkd.service. Oct 31 05:02:40.259054 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 31 05:02:40.259108 systemd[1]: Closed systemd-networkd.socket. Oct 31 05:02:40.261066 systemd[1]: Stopping network-cleanup.service... Oct 31 05:02:40.264750 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 31 05:02:40.264863 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 31 05:02:40.265539 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 31 05:02:40.265602 systemd[1]: Stopped systemd-sysctl.service. Oct 31 05:02:40.266348 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 31 05:02:40.266427 systemd[1]: Stopped systemd-modules-load.service. Oct 31 05:02:40.270455 systemd[1]: Stopping systemd-udevd.service... Oct 31 05:02:40.273703 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 31 05:02:40.280497 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 31 05:02:40.280637 systemd[1]: Stopped network-cleanup.service. Oct 31 05:02:40.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.283940 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 31 05:02:40.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.284163 systemd[1]: Stopped systemd-udevd.service. Oct 31 05:02:40.285208 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 31 05:02:40.285266 systemd[1]: Closed systemd-udevd-control.socket. Oct 31 05:02:40.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.286208 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 31 05:02:40.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.286257 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 31 05:02:40.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.287414 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 31 05:02:40.287476 systemd[1]: Stopped dracut-pre-udev.service. Oct 31 05:02:40.288972 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 31 05:02:40.289040 systemd[1]: Stopped dracut-cmdline.service. Oct 31 05:02:40.290261 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 31 05:02:40.290318 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 31 05:02:40.292773 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 31 05:02:40.300469 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 31 05:02:40.300551 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 31 05:02:40.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.304494 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 31 05:02:40.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.304617 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 31 05:02:40.377614 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 31 05:02:40.377845 systemd[1]: Stopped sysroot-boot.service. Oct 31 05:02:40.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.379393 systemd[1]: Reached target initrd-switch-root.target. Oct 31 05:02:40.380464 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 31 05:02:40.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.380533 systemd[1]: Stopped initrd-setup-root.service. Oct 31 05:02:40.382924 systemd[1]: Starting initrd-switch-root.service... Oct 31 05:02:40.398805 systemd[1]: Switching root. Oct 31 05:02:40.424643 iscsid[714]: iscsid shutting down. Oct 31 05:02:40.425659 systemd-journald[200]: Received SIGTERM from PID 1 (systemd). Oct 31 05:02:40.425727 systemd-journald[200]: Journal stopped Oct 31 05:02:44.294458 kernel: SELinux: Class mctp_socket not defined in policy. Oct 31 05:02:44.294608 kernel: SELinux: Class anon_inode not defined in policy. Oct 31 05:02:44.294648 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 31 05:02:44.294674 kernel: SELinux: policy capability network_peer_controls=1 Oct 31 05:02:44.294706 kernel: SELinux: policy capability open_perms=1 Oct 31 05:02:44.294730 kernel: SELinux: policy capability extended_socket_class=1 Oct 31 05:02:44.297935 kernel: SELinux: policy capability always_check_network=0 Oct 31 05:02:44.298008 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 31 05:02:44.298036 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 31 05:02:44.298063 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 31 05:02:44.298091 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 31 05:02:44.298128 systemd[1]: Successfully loaded SELinux policy in 61.015ms. Oct 31 05:02:44.298185 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.543ms. Oct 31 05:02:44.298207 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 05:02:44.298236 systemd[1]: Detected virtualization kvm. Oct 31 05:02:44.298262 systemd[1]: Detected architecture x86-64. Oct 31 05:02:44.298307 systemd[1]: Detected first boot. Oct 31 05:02:44.298329 systemd[1]: Hostname set to . Oct 31 05:02:44.298363 systemd[1]: Initializing machine ID from VM UUID. Oct 31 05:02:44.299215 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 31 05:02:44.299248 systemd[1]: Populated /etc with preset unit settings. Oct 31 05:02:44.299291 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 05:02:44.299340 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 05:02:44.299379 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 05:02:44.299410 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 31 05:02:44.299432 systemd[1]: Stopped iscsiuio.service. Oct 31 05:02:44.299452 systemd[1]: iscsid.service: Deactivated successfully. Oct 31 05:02:44.299477 systemd[1]: Stopped iscsid.service. Oct 31 05:02:44.299504 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 31 05:02:44.299537 systemd[1]: Stopped initrd-switch-root.service. Oct 31 05:02:44.299569 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 31 05:02:44.299596 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 31 05:02:44.299616 systemd[1]: Created slice system-addon\x2drun.slice. Oct 31 05:02:44.299642 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 31 05:02:44.299667 systemd[1]: Created slice system-getty.slice. Oct 31 05:02:44.299687 systemd[1]: Created slice system-modprobe.slice. Oct 31 05:02:44.299705 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 31 05:02:44.299731 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 31 05:02:44.299760 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 31 05:02:44.299807 systemd[1]: Created slice user.slice. Oct 31 05:02:44.299831 systemd[1]: Started systemd-ask-password-console.path. Oct 31 05:02:44.299860 systemd[1]: Started systemd-ask-password-wall.path. Oct 31 05:02:44.299887 systemd[1]: Set up automount boot.automount. Oct 31 05:02:44.299908 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 31 05:02:44.299946 systemd[1]: Stopped target initrd-switch-root.target. Oct 31 05:02:44.299978 systemd[1]: Stopped target initrd-fs.target. Oct 31 05:02:44.300000 systemd[1]: Stopped target initrd-root-fs.target. Oct 31 05:02:44.300019 systemd[1]: Reached target integritysetup.target. Oct 31 05:02:44.300045 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 05:02:44.300070 systemd[1]: Reached target remote-fs.target. Oct 31 05:02:44.300096 systemd[1]: Reached target slices.target. Oct 31 05:02:44.300116 systemd[1]: Reached target swap.target. Oct 31 05:02:44.300140 systemd[1]: Reached target torcx.target. Oct 31 05:02:44.300160 systemd[1]: Reached target veritysetup.target. Oct 31 05:02:44.300190 systemd[1]: Listening on systemd-coredump.socket. Oct 31 05:02:44.300211 systemd[1]: Listening on systemd-initctl.socket. Oct 31 05:02:44.300257 systemd[1]: Listening on systemd-networkd.socket. Oct 31 05:02:44.300298 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 05:02:44.300328 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 05:02:44.300354 systemd[1]: Listening on systemd-userdbd.socket. Oct 31 05:02:44.300374 systemd[1]: Mounting dev-hugepages.mount... Oct 31 05:02:44.300393 systemd[1]: Mounting dev-mqueue.mount... Oct 31 05:02:44.300412 systemd[1]: Mounting media.mount... Oct 31 05:02:44.300431 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:02:44.300462 systemd[1]: Mounting sys-kernel-debug.mount... Oct 31 05:02:44.300496 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 31 05:02:44.300517 systemd[1]: Mounting tmp.mount... Oct 31 05:02:44.300536 systemd[1]: Starting flatcar-tmpfiles.service... Oct 31 05:02:44.300562 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:02:44.302901 systemd[1]: Starting kmod-static-nodes.service... Oct 31 05:02:44.302932 systemd[1]: Starting modprobe@configfs.service... Oct 31 05:02:44.302953 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:02:44.302973 systemd[1]: Starting modprobe@drm.service... Oct 31 05:02:44.303005 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:02:44.303026 systemd[1]: Starting modprobe@fuse.service... Oct 31 05:02:44.303045 systemd[1]: Starting modprobe@loop.service... Oct 31 05:02:44.303079 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 31 05:02:44.303101 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 31 05:02:44.303126 systemd[1]: Stopped systemd-fsck-root.service. Oct 31 05:02:44.303153 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 31 05:02:44.303172 systemd[1]: Stopped systemd-fsck-usr.service. Oct 31 05:02:44.303205 systemd[1]: Stopped systemd-journald.service. Oct 31 05:02:44.303226 systemd[1]: Starting systemd-journald.service... Oct 31 05:02:44.303251 systemd[1]: Starting systemd-modules-load.service... Oct 31 05:02:44.303271 systemd[1]: Starting systemd-network-generator.service... Oct 31 05:02:44.303304 systemd[1]: Starting systemd-remount-fs.service... Oct 31 05:02:44.303325 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 05:02:44.303344 systemd[1]: verity-setup.service: Deactivated successfully. Oct 31 05:02:44.303363 kernel: fuse: init (API version 7.34) Oct 31 05:02:44.303382 systemd[1]: Stopped verity-setup.service. Oct 31 05:02:44.303401 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:02:44.303436 systemd[1]: Mounted dev-hugepages.mount. Oct 31 05:02:44.303464 kernel: loop: module loaded Oct 31 05:02:44.303484 systemd[1]: Mounted dev-mqueue.mount. Oct 31 05:02:44.303509 systemd[1]: Mounted media.mount. Oct 31 05:02:44.303540 systemd[1]: Mounted sys-kernel-debug.mount. Oct 31 05:02:44.303567 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 31 05:02:44.303588 systemd[1]: Mounted tmp.mount. Oct 31 05:02:44.303607 systemd[1]: Finished kmod-static-nodes.service. Oct 31 05:02:44.303637 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 31 05:02:44.303672 systemd[1]: Finished modprobe@configfs.service. Oct 31 05:02:44.303693 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:02:44.303715 systemd-journald[980]: Journal started Oct 31 05:02:44.303861 systemd-journald[980]: Runtime Journal (/run/log/journal/e453887e886f40af8fee5969cb74db83) is 4.7M, max 38.1M, 33.3M free. Oct 31 05:02:40.593000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 31 05:02:40.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 05:02:40.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 05:02:40.669000 audit: BPF prog-id=10 op=LOAD Oct 31 05:02:40.669000 audit: BPF prog-id=10 op=UNLOAD Oct 31 05:02:40.669000 audit: BPF prog-id=11 op=LOAD Oct 31 05:02:40.669000 audit: BPF prog-id=11 op=UNLOAD Oct 31 05:02:40.788000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 31 05:02:40.788000 audit[902]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878c2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:02:40.788000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 05:02:40.790000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 31 05:02:40.790000 audit[902]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000187999 a2=1ed a3=0 items=2 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:02:40.790000 audit: CWD cwd="/" Oct 31 05:02:40.790000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:40.790000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:40.790000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 05:02:44.028000 audit: BPF prog-id=12 op=LOAD Oct 31 05:02:44.028000 audit: BPF prog-id=3 op=UNLOAD Oct 31 05:02:44.028000 audit: BPF prog-id=13 op=LOAD Oct 31 05:02:44.028000 audit: BPF prog-id=14 op=LOAD Oct 31 05:02:44.028000 audit: BPF prog-id=4 op=UNLOAD Oct 31 05:02:44.028000 audit: BPF prog-id=5 op=UNLOAD Oct 31 05:02:44.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.040000 audit: BPF prog-id=12 op=UNLOAD Oct 31 05:02:44.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.217000 audit: BPF prog-id=15 op=LOAD Oct 31 05:02:44.217000 audit: BPF prog-id=16 op=LOAD Oct 31 05:02:44.217000 audit: BPF prog-id=17 op=LOAD Oct 31 05:02:44.217000 audit: BPF prog-id=13 op=UNLOAD Oct 31 05:02:44.217000 audit: BPF prog-id=14 op=UNLOAD Oct 31 05:02:44.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.308330 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:02:44.291000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 31 05:02:44.291000 audit[980]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd637322a0 a2=4000 a3=7ffd6373233c items=0 ppid=1 pid=980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:02:44.291000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 31 05:02:44.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.785083 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 05:02:44.024238 systemd[1]: Queued start job for default target multi-user.target. Oct 31 05:02:44.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:40.785707 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 05:02:44.024256 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 31 05:02:40.785744 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 05:02:44.031748 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 31 05:02:40.785819 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 31 05:02:40.785837 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 31 05:02:40.785896 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 31 05:02:40.785928 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 31 05:02:40.786249 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 31 05:02:44.310860 systemd[1]: Started systemd-journald.service. Oct 31 05:02:40.786310 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 05:02:40.786334 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 05:02:40.788023 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 31 05:02:40.788078 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 31 05:02:40.788109 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 31 05:02:40.788135 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 31 05:02:40.788165 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 31 05:02:40.788189 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 31 05:02:43.438975 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:43Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 05:02:44.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:43.439407 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:43Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 05:02:43.439641 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:43Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 05:02:43.440035 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:43Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 05:02:43.440128 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:43Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 31 05:02:43.440235 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-10-31T05:02:43Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 31 05:02:44.313734 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 05:02:44.313996 systemd[1]: Finished modprobe@drm.service. Oct 31 05:02:44.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.315271 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:02:44.315475 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:02:44.317214 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 31 05:02:44.317429 systemd[1]: Finished modprobe@fuse.service. Oct 31 05:02:44.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.319349 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:02:44.319528 systemd[1]: Finished modprobe@loop.service. Oct 31 05:02:44.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.320622 systemd[1]: Finished systemd-modules-load.service. Oct 31 05:02:44.321613 systemd[1]: Finished systemd-network-generator.service. Oct 31 05:02:44.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.323635 systemd[1]: Finished systemd-remount-fs.service. Oct 31 05:02:44.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.325366 systemd[1]: Reached target network-pre.target. Oct 31 05:02:44.332431 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 31 05:02:44.334784 systemd[1]: Mounting sys-kernel-config.mount... Oct 31 05:02:44.338667 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 31 05:02:44.341713 systemd[1]: Starting systemd-hwdb-update.service... Oct 31 05:02:44.344103 systemd[1]: Starting systemd-journal-flush.service... Oct 31 05:02:44.347908 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 05:02:44.349423 systemd[1]: Starting systemd-random-seed.service... Oct 31 05:02:44.350196 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 05:02:44.351547 systemd-journald[980]: Time spent on flushing to /var/log/journal/e453887e886f40af8fee5969cb74db83 is 50.321ms for 1276 entries. Oct 31 05:02:44.351547 systemd-journald[980]: System Journal (/var/log/journal/e453887e886f40af8fee5969cb74db83) is 8.0M, max 584.8M, 576.8M free. Oct 31 05:02:44.424561 systemd-journald[980]: Received client request to flush runtime journal. Oct 31 05:02:44.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.353810 systemd[1]: Starting systemd-sysctl.service... Oct 31 05:02:44.358436 systemd[1]: Finished flatcar-tmpfiles.service. Oct 31 05:02:44.360174 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 31 05:02:44.362980 systemd[1]: Mounted sys-kernel-config.mount. Oct 31 05:02:44.365507 systemd[1]: Starting systemd-sysusers.service... Oct 31 05:02:44.383871 systemd[1]: Finished systemd-random-seed.service. Oct 31 05:02:44.384706 systemd[1]: Reached target first-boot-complete.target. Oct 31 05:02:44.394325 systemd[1]: Finished systemd-sysctl.service. Oct 31 05:02:44.425831 systemd[1]: Finished systemd-journal-flush.service. Oct 31 05:02:44.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.432771 systemd[1]: Finished systemd-sysusers.service. Oct 31 05:02:44.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.485836 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 05:02:44.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:44.488261 systemd[1]: Starting systemd-udev-settle.service... Oct 31 05:02:44.498756 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Oct 31 05:02:45.018210 systemd[1]: Finished systemd-hwdb-update.service. Oct 31 05:02:45.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:45.020000 audit: BPF prog-id=18 op=LOAD Oct 31 05:02:45.020000 audit: BPF prog-id=19 op=LOAD Oct 31 05:02:45.020000 audit: BPF prog-id=7 op=UNLOAD Oct 31 05:02:45.020000 audit: BPF prog-id=8 op=UNLOAD Oct 31 05:02:45.022583 systemd[1]: Starting systemd-udevd.service... Oct 31 05:02:45.048862 systemd-udevd[1014]: Using default interface naming scheme 'v252'. Oct 31 05:02:45.090822 kernel: kauditd_printk_skb: 99 callbacks suppressed Oct 31 05:02:45.090979 kernel: audit: type=1130 audit(1761886965.081:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:45.091030 kernel: audit: type=1334 audit(1761886965.088:140): prog-id=20 op=LOAD Oct 31 05:02:45.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:45.088000 audit: BPF prog-id=20 op=LOAD Oct 31 05:02:45.081004 systemd[1]: Started systemd-udevd.service. Oct 31 05:02:45.094066 systemd[1]: Starting systemd-networkd.service... Oct 31 05:02:45.110134 kernel: audit: type=1334 audit(1761886965.104:141): prog-id=21 op=LOAD Oct 31 05:02:45.110238 kernel: audit: type=1334 audit(1761886965.107:142): prog-id=22 op=LOAD Oct 31 05:02:45.110322 kernel: audit: type=1334 audit(1761886965.109:143): prog-id=23 op=LOAD Oct 31 05:02:45.104000 audit: BPF prog-id=21 op=LOAD Oct 31 05:02:45.107000 audit: BPF prog-id=22 op=LOAD Oct 31 05:02:45.109000 audit: BPF prog-id=23 op=LOAD Oct 31 05:02:45.112108 systemd[1]: Starting systemd-userdbd.service... Oct 31 05:02:45.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:45.165697 systemd[1]: Started systemd-userdbd.service. Oct 31 05:02:45.172854 kernel: audit: type=1130 audit(1761886965.165:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:45.177336 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 31 05:02:45.234574 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 05:02:45.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:45.298612 systemd-networkd[1021]: lo: Link UP Oct 31 05:02:45.298637 systemd-networkd[1021]: lo: Gained carrier Oct 31 05:02:45.299484 systemd-networkd[1021]: Enumeration completed Oct 31 05:02:45.299622 systemd[1]: Started systemd-networkd.service. Oct 31 05:02:45.301517 systemd-networkd[1021]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 05:02:45.307016 kernel: audit: type=1130 audit(1761886965.299:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:45.308121 systemd-networkd[1021]: eth0: Link UP Oct 31 05:02:45.308132 systemd-networkd[1021]: eth0: Gained carrier Oct 31 05:02:45.316842 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 31 05:02:45.317073 systemd-networkd[1021]: eth0: DHCPv4 address 10.230.52.158/30, gateway 10.230.52.157 acquired from 10.230.52.157 Oct 31 05:02:45.368882 kernel: ACPI: button: Power Button [PWRF] Oct 31 05:02:45.403838 kernel: mousedev: PS/2 mouse device common for all mice Oct 31 05:02:45.404000 audit[1022]: AVC avc: denied { confidentiality } for pid=1022 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 31 05:02:45.425866 kernel: audit: type=1400 audit(1761886965.404:146): avc: denied { confidentiality } for pid=1022 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 31 05:02:45.404000 audit[1022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5558eb845e50 a1=338ec a2=7f8be5dd2bc5 a3=5 items=110 ppid=1014 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:02:45.434840 kernel: audit: type=1300 audit(1761886965.404:146): arch=c000003e syscall=175 success=yes exit=0 a0=5558eb845e50 a1=338ec a2=7f8be5dd2bc5 a3=5 items=110 ppid=1014 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:02:45.404000 audit: CWD cwd="/" Oct 31 05:02:45.404000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=1 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=2 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=3 name=(null) inode=15587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=4 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=5 name=(null) inode=15588 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=6 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.435851 kernel: audit: type=1307 audit(1761886965.404:146): cwd="/" Oct 31 05:02:45.404000 audit: PATH item=7 name=(null) inode=15589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=8 name=(null) inode=15589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=9 name=(null) inode=15590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=10 name=(null) inode=15589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=11 name=(null) inode=15591 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=12 name=(null) inode=15589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=13 name=(null) inode=15592 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=14 name=(null) inode=15589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=15 name=(null) inode=15593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=16 name=(null) inode=15589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=17 name=(null) inode=15594 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=18 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=19 name=(null) inode=15595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=20 name=(null) inode=15595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=21 name=(null) inode=15596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=22 name=(null) inode=15595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=23 name=(null) inode=15597 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=24 name=(null) inode=15595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=25 name=(null) inode=15598 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=26 name=(null) inode=15595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=27 name=(null) inode=15599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=28 name=(null) inode=15595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=29 name=(null) inode=15600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=30 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=31 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=32 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=33 name=(null) inode=15602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=34 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=35 name=(null) inode=15603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=36 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=37 name=(null) inode=15604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=38 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=39 name=(null) inode=15605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=40 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=41 name=(null) inode=15606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=42 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=43 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=44 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=45 name=(null) inode=15608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=46 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=47 name=(null) inode=15609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=48 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=49 name=(null) inode=15610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=50 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=51 name=(null) inode=15611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=52 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=53 name=(null) inode=15612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=55 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=56 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=57 name=(null) inode=15614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=58 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=59 name=(null) inode=15615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=60 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=61 name=(null) inode=15616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=62 name=(null) inode=15616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=63 name=(null) inode=15617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=64 name=(null) inode=15616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=65 name=(null) inode=15618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=66 name=(null) inode=15616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=67 name=(null) inode=15619 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=68 name=(null) inode=15616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=69 name=(null) inode=15620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=70 name=(null) inode=15616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=71 name=(null) inode=15621 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=72 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=73 name=(null) inode=15622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=74 name=(null) inode=15622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=75 name=(null) inode=15623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=76 name=(null) inode=15622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=77 name=(null) inode=15624 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=78 name=(null) inode=15622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=79 name=(null) inode=15625 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=80 name=(null) inode=15622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=81 name=(null) inode=15626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=82 name=(null) inode=15622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=83 name=(null) inode=15627 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=84 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=85 name=(null) inode=15628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=86 name=(null) inode=15628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=87 name=(null) inode=15629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=88 name=(null) inode=15628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=89 name=(null) inode=15630 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=90 name=(null) inode=15628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=91 name=(null) inode=15631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=92 name=(null) inode=15628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=93 name=(null) inode=15632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=94 name=(null) inode=15628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=95 name=(null) inode=15633 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=96 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=97 name=(null) inode=15634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=98 name=(null) inode=15634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=99 name=(null) inode=15635 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=100 name=(null) inode=15634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=101 name=(null) inode=15636 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=102 name=(null) inode=15634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=103 name=(null) inode=15637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=104 name=(null) inode=15634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=105 name=(null) inode=15638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=106 name=(null) inode=15634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=107 name=(null) inode=15639 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PATH item=109 name=(null) inode=15640 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:02:45.404000 audit: PROCTITLE proctitle="(udev-worker)" Oct 31 05:02:45.446813 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Oct 31 05:02:45.465109 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Oct 31 05:02:45.465157 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Oct 31 05:02:45.465479 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Oct 31 05:02:45.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:45.594597 systemd[1]: Finished systemd-udev-settle.service. Oct 31 05:02:45.597357 systemd[1]: Starting lvm2-activation-early.service... Oct 31 05:02:45.622361 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 05:02:45.656497 systemd[1]: Finished lvm2-activation-early.service. Oct 31 05:02:45.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:45.657473 systemd[1]: Reached target cryptsetup.target. Oct 31 05:02:45.659998 systemd[1]: Starting lvm2-activation.service... Oct 31 05:02:45.665941 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 05:02:45.690063 systemd[1]: Finished lvm2-activation.service. Oct 31 05:02:45.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:45.690919 systemd[1]: Reached target local-fs-pre.target. Oct 31 05:02:45.691557 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 31 05:02:45.691603 systemd[1]: Reached target local-fs.target. Oct 31 05:02:45.692200 systemd[1]: Reached target machines.target. Oct 31 05:02:45.694555 systemd[1]: Starting ldconfig.service... Oct 31 05:02:45.695861 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:02:45.695916 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:02:45.697825 systemd[1]: Starting systemd-boot-update.service... Oct 31 05:02:45.700877 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 31 05:02:45.706121 systemd[1]: Starting systemd-machine-id-commit.service... Oct 31 05:02:45.708534 systemd[1]: Starting systemd-sysext.service... Oct 31 05:02:45.719382 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1046 (bootctl) Oct 31 05:02:45.721275 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 31 05:02:45.728733 systemd[1]: Unmounting usr-share-oem.mount... Oct 31 05:02:45.804757 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 31 05:02:45.805077 systemd[1]: Unmounted usr-share-oem.mount. Oct 31 05:02:45.809308 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 31 05:02:45.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:45.832830 kernel: loop0: detected capacity change from 0 to 224512 Oct 31 05:02:45.891366 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 31 05:02:45.893055 systemd[1]: Finished systemd-machine-id-commit.service. Oct 31 05:02:45.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:45.913817 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 31 05:02:45.934826 kernel: loop1: detected capacity change from 0 to 224512 Oct 31 05:02:45.948088 (sd-sysext)[1058]: Using extensions 'kubernetes'. Oct 31 05:02:45.950944 (sd-sysext)[1058]: Merged extensions into '/usr'. Oct 31 05:02:45.981119 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:02:45.983898 systemd-fsck[1055]: fsck.fat 4.2 (2021-01-31) Oct 31 05:02:45.983898 systemd-fsck[1055]: /dev/vda1: 790 files, 120772/258078 clusters Oct 31 05:02:45.985714 systemd[1]: Mounting usr-share-oem.mount... Oct 31 05:02:45.990335 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:02:45.997032 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:02:46.000411 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:02:46.004498 systemd[1]: Starting modprobe@loop.service... Oct 31 05:02:46.005298 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:02:46.005456 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:02:46.005640 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:02:46.011811 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 31 05:02:46.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.013263 systemd[1]: Mounted usr-share-oem.mount. Oct 31 05:02:46.014371 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:02:46.014551 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:02:46.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.016316 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:02:46.016696 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:02:46.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.018584 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:02:46.018760 systemd[1]: Finished modprobe@loop.service. Oct 31 05:02:46.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.025000 systemd[1]: Mounting boot.mount... Oct 31 05:02:46.028600 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 05:02:46.028691 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 05:02:46.029407 systemd[1]: Finished systemd-sysext.service. Oct 31 05:02:46.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.032906 systemd[1]: Starting ensure-sysext.service... Oct 31 05:02:46.035076 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 31 05:02:46.049680 systemd[1]: Reloading. Oct 31 05:02:46.082131 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 31 05:02:46.093134 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 31 05:02:46.104908 systemd-tmpfiles[1066]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 31 05:02:46.208120 /usr/lib/systemd/system-generators/torcx-generator[1085]: time="2025-10-31T05:02:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 05:02:46.208170 /usr/lib/systemd/system-generators/torcx-generator[1085]: time="2025-10-31T05:02:46Z" level=info msg="torcx already run" Oct 31 05:02:46.313950 ldconfig[1045]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 31 05:02:46.349687 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 05:02:46.349746 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 05:02:46.377248 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 05:02:46.462000 audit: BPF prog-id=24 op=LOAD Oct 31 05:02:46.462000 audit: BPF prog-id=20 op=UNLOAD Oct 31 05:02:46.463000 audit: BPF prog-id=25 op=LOAD Oct 31 05:02:46.463000 audit: BPF prog-id=21 op=UNLOAD Oct 31 05:02:46.463000 audit: BPF prog-id=26 op=LOAD Oct 31 05:02:46.463000 audit: BPF prog-id=27 op=LOAD Oct 31 05:02:46.463000 audit: BPF prog-id=22 op=UNLOAD Oct 31 05:02:46.463000 audit: BPF prog-id=23 op=UNLOAD Oct 31 05:02:46.464000 audit: BPF prog-id=28 op=LOAD Oct 31 05:02:46.464000 audit: BPF prog-id=29 op=LOAD Oct 31 05:02:46.465000 audit: BPF prog-id=18 op=UNLOAD Oct 31 05:02:46.465000 audit: BPF prog-id=19 op=UNLOAD Oct 31 05:02:46.469000 audit: BPF prog-id=30 op=LOAD Oct 31 05:02:46.469000 audit: BPF prog-id=15 op=UNLOAD Oct 31 05:02:46.469000 audit: BPF prog-id=31 op=LOAD Oct 31 05:02:46.469000 audit: BPF prog-id=32 op=LOAD Oct 31 05:02:46.469000 audit: BPF prog-id=16 op=UNLOAD Oct 31 05:02:46.469000 audit: BPF prog-id=17 op=UNLOAD Oct 31 05:02:46.474733 systemd[1]: Finished ldconfig.service. Oct 31 05:02:46.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.481728 systemd[1]: Mounted boot.mount. Oct 31 05:02:46.501321 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:02:46.503331 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:02:46.506476 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:02:46.510700 systemd[1]: Starting modprobe@loop.service... Oct 31 05:02:46.511404 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:02:46.511554 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:02:46.512760 systemd[1]: Finished systemd-boot-update.service. Oct 31 05:02:46.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.515123 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:02:46.515321 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:02:46.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.516950 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:02:46.517137 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:02:46.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.518870 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:02:46.519162 systemd[1]: Finished modprobe@loop.service. Oct 31 05:02:46.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.520676 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 05:02:46.524574 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 05:02:46.528029 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:02:46.530010 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:02:46.534503 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:02:46.537239 systemd[1]: Starting modprobe@loop.service... Oct 31 05:02:46.538984 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:02:46.539154 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:02:46.540633 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:02:46.540861 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:02:46.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.542218 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:02:46.542417 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:02:46.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.543660 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:02:46.543932 systemd[1]: Finished modprobe@loop.service. Oct 31 05:02:46.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.548460 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:02:46.551873 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:02:46.554013 systemd[1]: Starting modprobe@drm.service... Oct 31 05:02:46.556696 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:02:46.560378 systemd[1]: Starting modprobe@loop.service... Oct 31 05:02:46.561244 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:02:46.561400 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:02:46.563354 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 31 05:02:46.566202 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:02:46.567141 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:02:46.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.569306 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 05:02:46.569471 systemd[1]: Finished modprobe@drm.service. Oct 31 05:02:46.569000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.570782 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:02:46.570997 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:02:46.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.572318 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:02:46.572493 systemd[1]: Finished modprobe@loop.service. Oct 31 05:02:46.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.574141 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 05:02:46.574266 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 05:02:46.575617 systemd[1]: Finished ensure-sysext.service. Oct 31 05:02:46.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.664237 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 31 05:02:46.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.667172 systemd[1]: Starting audit-rules.service... Oct 31 05:02:46.669631 systemd[1]: Starting clean-ca-certificates.service... Oct 31 05:02:46.673149 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 31 05:02:46.675000 audit: BPF prog-id=33 op=LOAD Oct 31 05:02:46.677705 systemd[1]: Starting systemd-resolved.service... Oct 31 05:02:46.681000 audit: BPF prog-id=34 op=LOAD Oct 31 05:02:46.683507 systemd[1]: Starting systemd-timesyncd.service... Oct 31 05:02:46.686211 systemd[1]: Starting systemd-update-utmp.service... Oct 31 05:02:46.702520 systemd[1]: Finished clean-ca-certificates.service. Oct 31 05:02:46.703455 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 05:02:46.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.706000 audit[1150]: SYSTEM_BOOT pid=1150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.709861 systemd[1]: Finished systemd-update-utmp.service. Oct 31 05:02:46.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.735486 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 31 05:02:46.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.738457 systemd[1]: Starting systemd-update-done.service... Oct 31 05:02:46.752315 systemd[1]: Finished systemd-update-done.service. Oct 31 05:02:46.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:02:46.782000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 31 05:02:46.782000 audit[1165]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc254e3860 a2=420 a3=0 items=0 ppid=1144 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:02:46.782000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 31 05:02:46.784689 augenrules[1165]: No rules Oct 31 05:02:46.784812 systemd[1]: Finished audit-rules.service. Oct 31 05:02:46.794887 systemd[1]: Started systemd-timesyncd.service. Oct 31 05:02:46.795735 systemd[1]: Reached target time-set.target. Oct 31 05:02:46.800985 systemd-resolved[1148]: Positive Trust Anchors: Oct 31 05:02:46.801004 systemd-resolved[1148]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 05:02:46.801039 systemd-resolved[1148]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 05:02:46.803439 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:02:46.803502 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:02:46.808973 systemd-resolved[1148]: Using system hostname 'srv-cjebs.gb1.brightbox.com'. Oct 31 05:02:46.811395 systemd[1]: Started systemd-resolved.service. Oct 31 05:02:46.812135 systemd[1]: Reached target network.target. Oct 31 05:02:46.812720 systemd[1]: Reached target nss-lookup.target. Oct 31 05:02:46.813375 systemd[1]: Reached target sysinit.target. Oct 31 05:02:46.814123 systemd[1]: Started motdgen.path. Oct 31 05:02:46.828464 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 31 05:02:46.829527 systemd[1]: Started logrotate.timer. Oct 31 05:02:46.830341 systemd[1]: Started mdadm.timer. Oct 31 05:02:46.830939 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 31 05:02:46.831581 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 31 05:02:46.831647 systemd[1]: Reached target paths.target. Oct 31 05:02:46.832274 systemd[1]: Reached target timers.target. Oct 31 05:02:46.834943 systemd[1]: Listening on dbus.socket. Oct 31 05:02:46.839942 systemd[1]: Starting docker.socket... Oct 31 05:02:46.844660 systemd[1]: Listening on sshd.socket. Oct 31 05:02:46.845455 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:02:46.846143 systemd[1]: Listening on docker.socket. Oct 31 05:02:46.846901 systemd[1]: Reached target sockets.target. Oct 31 05:02:46.847495 systemd[1]: Reached target basic.target. Oct 31 05:02:46.848279 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 05:02:46.848328 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 05:02:46.849859 systemd[1]: Starting containerd.service... Oct 31 05:02:46.852683 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 31 05:02:46.855157 systemd[1]: Starting dbus.service... Oct 31 05:02:46.857576 systemd[1]: Starting enable-oem-cloudinit.service... Oct 31 05:02:46.862085 systemd[1]: Starting extend-filesystems.service... Oct 31 05:02:46.862954 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 31 05:02:46.867404 systemd[1]: Starting motdgen.service... Oct 31 05:02:46.874808 jq[1176]: false Oct 31 05:02:46.876250 systemd[1]: Starting prepare-helm.service... Oct 31 05:02:46.880759 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 31 05:02:46.890743 systemd[1]: Starting sshd-keygen.service... Oct 31 05:02:46.897025 systemd[1]: Starting systemd-logind.service... Oct 31 05:02:46.898009 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:02:46.898171 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 31 05:02:46.898977 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 31 05:02:46.902271 systemd[1]: Starting update-engine.service... Oct 31 05:02:46.905321 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 31 05:02:46.909074 jq[1196]: true Oct 31 05:02:46.911609 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 31 05:02:46.912190 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 31 05:02:46.941012 tar[1199]: linux-amd64/LICENSE Oct 31 05:02:46.943460 tar[1199]: linux-amd64/helm Oct 31 05:02:46.945410 systemd[1]: motdgen.service: Deactivated successfully. Oct 31 05:02:46.945681 systemd[1]: Finished motdgen.service. Oct 31 05:02:46.948631 dbus-daemon[1175]: [system] SELinux support is enabled Oct 31 05:02:46.949476 systemd[1]: Started dbus.service. Oct 31 05:02:46.950889 jq[1200]: true Oct 31 05:02:46.952317 dbus-daemon[1175]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1021 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 31 05:02:46.955116 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 31 05:02:46.955205 systemd[1]: Reached target system-config.target. Oct 31 05:02:46.956119 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 31 05:02:46.956185 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 31 05:02:46.956242 systemd[1]: Reached target user-config.target. Oct 31 05:02:46.966409 systemd[1]: Starting systemd-hostnamed.service... Oct 31 05:02:46.972067 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 31 05:02:46.972522 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 31 05:02:46.982190 extend-filesystems[1179]: Found loop1 Oct 31 05:02:46.986982 extend-filesystems[1179]: Found vda Oct 31 05:02:46.987797 extend-filesystems[1179]: Found vda1 Oct 31 05:02:46.988605 extend-filesystems[1179]: Found vda2 Oct 31 05:02:46.989412 extend-filesystems[1179]: Found vda3 Oct 31 05:02:46.990894 extend-filesystems[1179]: Found usr Oct 31 05:02:46.992995 extend-filesystems[1179]: Found vda4 Oct 31 05:02:46.994633 extend-filesystems[1179]: Found vda6 Oct 31 05:02:46.994633 extend-filesystems[1179]: Found vda7 Oct 31 05:02:46.994633 extend-filesystems[1179]: Found vda9 Oct 31 05:02:46.994633 extend-filesystems[1179]: Checking size of /dev/vda9 Oct 31 05:02:47.026331 systemd[1]: Created slice system-sshd.slice. Oct 31 05:02:47.050622 extend-filesystems[1179]: Resized partition /dev/vda9 Oct 31 05:02:47.062666 extend-filesystems[1232]: resize2fs 1.46.5 (30-Dec-2021) Oct 31 05:02:47.069836 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Oct 31 05:02:47.093303 update_engine[1195]: I1031 05:02:47.092507 1195 main.cc:92] Flatcar Update Engine starting Oct 31 05:02:47.102403 systemd[1]: Started update-engine.service. Oct 31 05:02:47.106116 systemd[1]: Started locksmithd.service. Oct 31 05:02:47.109883 update_engine[1195]: I1031 05:02:47.107396 1195 update_check_scheduler.cc:74] Next update check in 7m44s Oct 31 05:02:47.157673 env[1202]: time="2025-10-31T05:02:47.157552353Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 31 05:02:47.169751 bash[1230]: Updated "/home/core/.ssh/authorized_keys" Oct 31 05:02:47.170645 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 31 05:02:47.180175 systemd-logind[1193]: Watching system buttons on /dev/input/event2 (Power Button) Oct 31 05:02:47.184891 systemd-logind[1193]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 31 05:02:47.189037 systemd-logind[1193]: New seat seat0. Oct 31 05:02:47.196025 systemd[1]: Started systemd-logind.service. Oct 31 05:02:47.222727 systemd-networkd[1021]: eth0: Gained IPv6LL Oct 31 05:02:47.224966 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 31 05:02:47.225190 systemd[1]: Started systemd-hostnamed.service. Oct 31 05:02:47.229433 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 31 05:02:47.230506 systemd[1]: Reached target network-online.target. Oct 31 05:02:47.233706 systemd[1]: Starting kubelet.service... Oct 31 05:02:47.238221 dbus-daemon[1175]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1207 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 31 05:02:47.241680 systemd[1]: Starting polkit.service... Oct 31 05:02:47.265667 env[1202]: time="2025-10-31T05:02:47.265599038Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 31 05:02:47.286989 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Oct 31 05:02:47.287066 extend-filesystems[1232]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 31 05:02:47.287066 extend-filesystems[1232]: old_desc_blocks = 1, new_desc_blocks = 8 Oct 31 05:02:47.287066 extend-filesystems[1232]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Oct 31 05:02:47.272932 polkitd[1239]: Started polkitd version 121 Oct 31 05:02:47.299928 env[1202]: time="2025-10-31T05:02:47.290028995Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 31 05:02:47.299928 env[1202]: time="2025-10-31T05:02:47.295700087Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 31 05:02:47.299928 env[1202]: time="2025-10-31T05:02:47.295753261Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 31 05:02:47.289451 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 31 05:02:47.300169 extend-filesystems[1179]: Resized filesystem in /dev/vda9 Oct 31 05:02:47.289684 systemd[1]: Finished extend-filesystems.service. Oct 31 05:02:47.303460 polkitd[1239]: Loading rules from directory /etc/polkit-1/rules.d Oct 31 05:02:47.305610 env[1202]: time="2025-10-31T05:02:47.301183178Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 05:02:47.305610 env[1202]: time="2025-10-31T05:02:47.301257798Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 31 05:02:47.305610 env[1202]: time="2025-10-31T05:02:47.301285431Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 31 05:02:47.305610 env[1202]: time="2025-10-31T05:02:47.301322919Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 31 05:02:47.305610 env[1202]: time="2025-10-31T05:02:47.301495564Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 31 05:02:47.303542 polkitd[1239]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 31 05:02:47.307971 env[1202]: time="2025-10-31T05:02:47.307277252Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 31 05:02:47.307971 env[1202]: time="2025-10-31T05:02:47.307523579Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 05:02:47.307971 env[1202]: time="2025-10-31T05:02:47.307552245Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 31 05:02:47.307971 env[1202]: time="2025-10-31T05:02:47.307652679Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 31 05:02:47.307971 env[1202]: time="2025-10-31T05:02:47.307672884Z" level=info msg="metadata content store policy set" policy=shared Oct 31 05:02:47.310036 polkitd[1239]: Finished loading, compiling and executing 2 rules Oct 31 05:02:47.310747 systemd[1]: Started polkit.service. Oct 31 05:02:47.310533 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 31 05:02:47.311067 polkitd[1239]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320290690Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320334729Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320366097Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320434691Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320463650Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320485545Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320518582Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320574893Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320609594Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320629440Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320653570Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320677960Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.320879188Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 31 05:02:47.322818 env[1202]: time="2025-10-31T05:02:47.321076750Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.321431251Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.321484519Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.321512251Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.321625376Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.321649164Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.321673845Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.321698502Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.321729468Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.321751704Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.321769847Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.321816879Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.321842717Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.322118035Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.322156761Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.323492 env[1202]: time="2025-10-31T05:02:47.322175780Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.324168 env[1202]: time="2025-10-31T05:02:47.322193030Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 31 05:02:47.324168 env[1202]: time="2025-10-31T05:02:47.322226627Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 31 05:02:47.324168 env[1202]: time="2025-10-31T05:02:47.322243887Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 31 05:02:47.324168 env[1202]: time="2025-10-31T05:02:47.322293977Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 31 05:02:47.324168 env[1202]: time="2025-10-31T05:02:47.322359721Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 31 05:02:47.324388 env[1202]: time="2025-10-31T05:02:47.322630648Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 31 05:02:47.324388 env[1202]: time="2025-10-31T05:02:47.322717363Z" level=info msg="Connect containerd service" Oct 31 05:02:47.324388 env[1202]: time="2025-10-31T05:02:47.322775543Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 31 05:02:47.327148 env[1202]: time="2025-10-31T05:02:47.326236988Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 05:02:47.327600 env[1202]: time="2025-10-31T05:02:47.327443851Z" level=info msg="Start subscribing containerd event" Oct 31 05:02:47.327600 env[1202]: time="2025-10-31T05:02:47.327552230Z" level=info msg="Start recovering state" Oct 31 05:02:47.327600 env[1202]: time="2025-10-31T05:02:47.327587279Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 31 05:02:47.327762 env[1202]: time="2025-10-31T05:02:47.327665496Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 31 05:02:47.327843 systemd[1]: Started containerd.service. Oct 31 05:02:47.340045 env[1202]: time="2025-10-31T05:02:47.340009242Z" level=info msg="containerd successfully booted in 0.188358s" Oct 31 05:02:47.340355 env[1202]: time="2025-10-31T05:02:47.340328137Z" level=info msg="Start event monitor" Oct 31 05:02:47.341137 env[1202]: time="2025-10-31T05:02:47.341081190Z" level=info msg="Start snapshots syncer" Oct 31 05:02:47.341312 env[1202]: time="2025-10-31T05:02:47.341282579Z" level=info msg="Start cni network conf syncer for default" Oct 31 05:02:47.341351 systemd-hostnamed[1207]: Hostname set to (static) Oct 31 05:02:47.342853 env[1202]: time="2025-10-31T05:02:47.342809795Z" level=info msg="Start streaming server" Oct 31 05:02:48.605053 systemd-timesyncd[1149]: Contacted time server 178.79.158.157:123 (0.flatcar.pool.ntp.org). Oct 31 05:02:48.605193 systemd-timesyncd[1149]: Initial clock synchronization to Fri 2025-10-31 05:02:48.604829 UTC. Oct 31 05:02:48.605575 systemd-resolved[1148]: Clock change detected. Flushing caches. Oct 31 05:02:48.767628 tar[1199]: linux-amd64/README.md Oct 31 05:02:48.773094 systemd[1]: Finished prepare-helm.service. Oct 31 05:02:48.799838 locksmithd[1233]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 31 05:02:49.419199 systemd[1]: Started kubelet.service. Oct 31 05:02:49.481167 systemd-networkd[1021]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8d27:24:19ff:fee6:349e/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8d27:24:19ff:fee6:349e/64 assigned by NDisc. Oct 31 05:02:49.481180 systemd-networkd[1021]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Oct 31 05:02:50.100023 kubelet[1257]: E1031 05:02:50.099931 1257 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:02:50.102355 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:02:50.102633 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:02:50.103222 systemd[1]: kubelet.service: Consumed 1.123s CPU time. Oct 31 05:02:50.387155 sshd_keygen[1205]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 31 05:02:50.414924 systemd[1]: Finished sshd-keygen.service. Oct 31 05:02:50.420538 systemd[1]: Starting issuegen.service... Oct 31 05:02:50.424391 systemd[1]: Started sshd@0-10.230.52.158:22-139.178.68.195:40520.service. Oct 31 05:02:50.432601 systemd[1]: issuegen.service: Deactivated successfully. Oct 31 05:02:50.432877 systemd[1]: Finished issuegen.service. Oct 31 05:02:50.436089 systemd[1]: Starting systemd-user-sessions.service... Oct 31 05:02:50.450358 systemd[1]: Finished systemd-user-sessions.service. Oct 31 05:02:50.453731 systemd[1]: Started getty@tty1.service. Oct 31 05:02:50.458148 systemd[1]: Started serial-getty@ttyS0.service. Oct 31 05:02:50.459584 systemd[1]: Reached target getty.target. Oct 31 05:02:51.342620 sshd[1272]: Accepted publickey for core from 139.178.68.195 port 40520 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:02:51.345493 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:02:51.362037 systemd[1]: Created slice user-500.slice. Oct 31 05:02:51.365592 systemd[1]: Starting user-runtime-dir@500.service... Oct 31 05:02:51.371876 systemd-logind[1193]: New session 1 of user core. Oct 31 05:02:51.380685 systemd[1]: Finished user-runtime-dir@500.service. Oct 31 05:02:51.383932 systemd[1]: Starting user@500.service... Oct 31 05:02:51.389471 (systemd)[1281]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:02:51.493403 systemd[1281]: Queued start job for default target default.target. Oct 31 05:02:51.494827 systemd[1281]: Reached target paths.target. Oct 31 05:02:51.495019 systemd[1281]: Reached target sockets.target. Oct 31 05:02:51.495474 systemd[1281]: Reached target timers.target. Oct 31 05:02:51.495634 systemd[1281]: Reached target basic.target. Oct 31 05:02:51.495954 systemd[1281]: Reached target default.target. Oct 31 05:02:51.496062 systemd[1]: Started user@500.service. Oct 31 05:02:51.496266 systemd[1281]: Startup finished in 95ms. Oct 31 05:02:51.498449 systemd[1]: Started session-1.scope. Oct 31 05:02:52.133211 systemd[1]: Started sshd@1-10.230.52.158:22-139.178.68.195:40536.service. Oct 31 05:02:53.027068 sshd[1290]: Accepted publickey for core from 139.178.68.195 port 40536 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:02:53.029345 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:02:53.036632 systemd-logind[1193]: New session 2 of user core. Oct 31 05:02:53.037747 systemd[1]: Started session-2.scope. Oct 31 05:02:53.650711 sshd[1290]: pam_unix(sshd:session): session closed for user core Oct 31 05:02:53.654712 systemd-logind[1193]: Session 2 logged out. Waiting for processes to exit. Oct 31 05:02:53.655172 systemd[1]: sshd@1-10.230.52.158:22-139.178.68.195:40536.service: Deactivated successfully. Oct 31 05:02:53.656190 systemd[1]: session-2.scope: Deactivated successfully. Oct 31 05:02:53.657358 systemd-logind[1193]: Removed session 2. Oct 31 05:02:53.798674 systemd[1]: Started sshd@2-10.230.52.158:22-139.178.68.195:60118.service. Oct 31 05:02:54.691247 sshd[1296]: Accepted publickey for core from 139.178.68.195 port 60118 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:02:54.693280 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:02:54.700099 systemd-logind[1193]: New session 3 of user core. Oct 31 05:02:54.700926 systemd[1]: Started session-3.scope. Oct 31 05:02:54.736314 coreos-metadata[1174]: Oct 31 05:02:54.736 WARN failed to locate config-drive, using the metadata service API instead Oct 31 05:02:54.789503 coreos-metadata[1174]: Oct 31 05:02:54.789 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Oct 31 05:02:54.815796 coreos-metadata[1174]: Oct 31 05:02:54.815 INFO Fetch successful Oct 31 05:02:54.816105 coreos-metadata[1174]: Oct 31 05:02:54.816 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 31 05:02:54.849541 coreos-metadata[1174]: Oct 31 05:02:54.849 INFO Fetch successful Oct 31 05:02:54.851196 unknown[1174]: wrote ssh authorized keys file for user: core Oct 31 05:02:54.862870 update-ssh-keys[1301]: Updated "/home/core/.ssh/authorized_keys" Oct 31 05:02:54.863865 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 31 05:02:54.865252 systemd[1]: Reached target multi-user.target. Oct 31 05:02:54.868486 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 31 05:02:54.878603 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 31 05:02:54.878953 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 31 05:02:54.882884 systemd[1]: Startup finished in 1.152s (kernel) + 6.836s (initrd) + 13.610s (userspace) = 21.600s. Oct 31 05:02:55.315943 sshd[1296]: pam_unix(sshd:session): session closed for user core Oct 31 05:02:55.319925 systemd[1]: sshd@2-10.230.52.158:22-139.178.68.195:60118.service: Deactivated successfully. Oct 31 05:02:55.321550 systemd[1]: session-3.scope: Deactivated successfully. Oct 31 05:02:55.321599 systemd-logind[1193]: Session 3 logged out. Waiting for processes to exit. Oct 31 05:02:55.323515 systemd-logind[1193]: Removed session 3. Oct 31 05:03:00.354091 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 31 05:03:00.354395 systemd[1]: Stopped kubelet.service. Oct 31 05:03:00.354476 systemd[1]: kubelet.service: Consumed 1.123s CPU time. Oct 31 05:03:00.356794 systemd[1]: Starting kubelet.service... Oct 31 05:03:00.525505 systemd[1]: Started kubelet.service. Oct 31 05:03:00.627930 kubelet[1309]: E1031 05:03:00.627728 1309 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:03:00.632055 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:03:00.632276 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:03:05.469443 systemd[1]: Started sshd@3-10.230.52.158:22-139.178.68.195:48406.service. Oct 31 05:03:06.371208 sshd[1316]: Accepted publickey for core from 139.178.68.195 port 48406 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:03:06.373838 sshd[1316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:03:06.380131 systemd-logind[1193]: New session 4 of user core. Oct 31 05:03:06.380939 systemd[1]: Started session-4.scope. Oct 31 05:03:07.002147 sshd[1316]: pam_unix(sshd:session): session closed for user core Oct 31 05:03:07.005936 systemd[1]: sshd@3-10.230.52.158:22-139.178.68.195:48406.service: Deactivated successfully. Oct 31 05:03:07.006859 systemd[1]: session-4.scope: Deactivated successfully. Oct 31 05:03:07.007680 systemd-logind[1193]: Session 4 logged out. Waiting for processes to exit. Oct 31 05:03:07.008935 systemd-logind[1193]: Removed session 4. Oct 31 05:03:07.149607 systemd[1]: Started sshd@4-10.230.52.158:22-139.178.68.195:48414.service. Oct 31 05:03:08.039238 sshd[1322]: Accepted publickey for core from 139.178.68.195 port 48414 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:03:08.042259 sshd[1322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:03:08.050563 systemd-logind[1193]: New session 5 of user core. Oct 31 05:03:08.051020 systemd[1]: Started session-5.scope. Oct 31 05:03:08.654119 sshd[1322]: pam_unix(sshd:session): session closed for user core Oct 31 05:03:08.657605 systemd[1]: sshd@4-10.230.52.158:22-139.178.68.195:48414.service: Deactivated successfully. Oct 31 05:03:08.658620 systemd[1]: session-5.scope: Deactivated successfully. Oct 31 05:03:08.659373 systemd-logind[1193]: Session 5 logged out. Waiting for processes to exit. Oct 31 05:03:08.660443 systemd-logind[1193]: Removed session 5. Oct 31 05:03:08.805117 systemd[1]: Started sshd@5-10.230.52.158:22-139.178.68.195:48418.service. Oct 31 05:03:09.695389 sshd[1328]: Accepted publickey for core from 139.178.68.195 port 48418 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:03:09.697957 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:03:09.705069 systemd[1]: Started session-6.scope. Oct 31 05:03:09.706842 systemd-logind[1193]: New session 6 of user core. Oct 31 05:03:10.319644 sshd[1328]: pam_unix(sshd:session): session closed for user core Oct 31 05:03:10.323474 systemd[1]: sshd@5-10.230.52.158:22-139.178.68.195:48418.service: Deactivated successfully. Oct 31 05:03:10.324449 systemd[1]: session-6.scope: Deactivated successfully. Oct 31 05:03:10.325280 systemd-logind[1193]: Session 6 logged out. Waiting for processes to exit. Oct 31 05:03:10.326679 systemd-logind[1193]: Removed session 6. Oct 31 05:03:10.471988 systemd[1]: Started sshd@6-10.230.52.158:22-139.178.68.195:48424.service. Oct 31 05:03:10.883515 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 31 05:03:10.883837 systemd[1]: Stopped kubelet.service. Oct 31 05:03:10.886484 systemd[1]: Starting kubelet.service... Oct 31 05:03:11.036451 systemd[1]: Started kubelet.service. Oct 31 05:03:11.123989 kubelet[1340]: E1031 05:03:11.123873 1340 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:03:11.126074 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:03:11.126293 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:03:11.375556 sshd[1334]: Accepted publickey for core from 139.178.68.195 port 48424 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:03:11.377981 sshd[1334]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:03:11.385013 systemd-logind[1193]: New session 7 of user core. Oct 31 05:03:11.385798 systemd[1]: Started session-7.scope. Oct 31 05:03:11.876935 sudo[1346]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 31 05:03:11.877972 sudo[1346]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 05:03:11.891283 dbus-daemon[1175]: \xd0\xdd`C\U: received setenforce notice (enforcing=-851731776) Oct 31 05:03:11.893655 sudo[1346]: pam_unix(sudo:session): session closed for user root Oct 31 05:03:12.041522 sshd[1334]: pam_unix(sshd:session): session closed for user core Oct 31 05:03:12.046273 systemd[1]: sshd@6-10.230.52.158:22-139.178.68.195:48424.service: Deactivated successfully. Oct 31 05:03:12.047491 systemd[1]: session-7.scope: Deactivated successfully. Oct 31 05:03:12.048403 systemd-logind[1193]: Session 7 logged out. Waiting for processes to exit. Oct 31 05:03:12.049826 systemd-logind[1193]: Removed session 7. Oct 31 05:03:12.191268 systemd[1]: Started sshd@7-10.230.52.158:22-139.178.68.195:48436.service. Oct 31 05:03:13.094339 sshd[1350]: Accepted publickey for core from 139.178.68.195 port 48436 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:03:13.096395 sshd[1350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:03:13.103610 systemd[1]: Started session-8.scope. Oct 31 05:03:13.104073 systemd-logind[1193]: New session 8 of user core. Oct 31 05:03:13.577219 sudo[1354]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 31 05:03:13.578222 sudo[1354]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 05:03:13.582825 sudo[1354]: pam_unix(sudo:session): session closed for user root Oct 31 05:03:13.589373 sudo[1353]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 31 05:03:13.589734 sudo[1353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 05:03:13.608070 kernel: kauditd_printk_skb: 176 callbacks suppressed Oct 31 05:03:13.608203 kernel: audit: type=1305 audit(1761886993.602:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 05:03:13.602000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 05:03:13.606861 systemd[1]: Stopping audit-rules.service... Oct 31 05:03:13.602000 audit[1357]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeed117220 a2=420 a3=0 items=0 ppid=1 pid=1357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:13.616593 kernel: audit: type=1300 audit(1761886993.602:210): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeed117220 a2=420 a3=0 items=0 ppid=1 pid=1357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:13.616682 kernel: audit: type=1327 audit(1761886993.602:210): proctitle=2F7362696E2F617564697463746C002D44 Oct 31 05:03:13.602000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 31 05:03:13.616837 auditctl[1357]: No rules Oct 31 05:03:13.625148 kernel: audit: type=1131 audit(1761886993.615:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:13.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:13.617720 systemd[1]: audit-rules.service: Deactivated successfully. Oct 31 05:03:13.618031 systemd[1]: Stopped audit-rules.service. Oct 31 05:03:13.624703 systemd[1]: Starting audit-rules.service... Oct 31 05:03:13.649455 augenrules[1374]: No rules Oct 31 05:03:13.650748 systemd[1]: Finished audit-rules.service. Oct 31 05:03:13.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:13.652382 sudo[1353]: pam_unix(sudo:session): session closed for user root Oct 31 05:03:13.649000 audit[1353]: USER_END pid=1353 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:03:13.663042 kernel: audit: type=1130 audit(1761886993.649:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:13.663153 kernel: audit: type=1106 audit(1761886993.649:213): pid=1353 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:03:13.663202 kernel: audit: type=1104 audit(1761886993.649:214): pid=1353 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:03:13.649000 audit[1353]: CRED_DISP pid=1353 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:03:13.802912 sshd[1350]: pam_unix(sshd:session): session closed for user core Oct 31 05:03:13.802000 audit[1350]: USER_END pid=1350 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:03:13.806129 systemd[1]: sshd@7-10.230.52.158:22-139.178.68.195:48436.service: Deactivated successfully. Oct 31 05:03:13.807259 systemd[1]: session-8.scope: Deactivated successfully. Oct 31 05:03:13.808994 systemd-logind[1193]: Session 8 logged out. Waiting for processes to exit. Oct 31 05:03:13.810321 systemd-logind[1193]: Removed session 8. Oct 31 05:03:13.802000 audit[1350]: CRED_DISP pid=1350 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:03:13.817700 kernel: audit: type=1106 audit(1761886993.802:215): pid=1350 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:03:13.818119 kernel: audit: type=1104 audit(1761886993.802:216): pid=1350 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:03:13.818174 kernel: audit: type=1131 audit(1761886993.804:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.52.158:22-139.178.68.195:48436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:13.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.52.158:22-139.178.68.195:48436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:13.951465 systemd[1]: Started sshd@8-10.230.52.158:22-139.178.68.195:35970.service. Oct 31 05:03:13.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.52.158:22-139.178.68.195:35970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:14.853000 audit[1380]: USER_ACCT pid=1380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:03:14.856069 sshd[1380]: Accepted publickey for core from 139.178.68.195 port 35970 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:03:14.855000 audit[1380]: CRED_ACQ pid=1380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:03:14.855000 audit[1380]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb9555fa0 a2=3 a3=0 items=0 ppid=1 pid=1380 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:14.855000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:03:14.858370 sshd[1380]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:03:14.865285 systemd-logind[1193]: New session 9 of user core. Oct 31 05:03:14.866126 systemd[1]: Started session-9.scope. Oct 31 05:03:14.871000 audit[1380]: USER_START pid=1380 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:03:14.874000 audit[1382]: CRED_ACQ pid=1382 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:03:15.338000 audit[1383]: USER_ACCT pid=1383 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:03:15.338000 audit[1383]: CRED_REFR pid=1383 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:03:15.340301 sudo[1383]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 31 05:03:15.340685 sudo[1383]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 05:03:15.341000 audit[1383]: USER_START pid=1383 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:03:15.380406 systemd[1]: Starting docker.service... Oct 31 05:03:15.441533 env[1393]: time="2025-10-31T05:03:15.441419944Z" level=info msg="Starting up" Oct 31 05:03:15.444086 env[1393]: time="2025-10-31T05:03:15.443990558Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 31 05:03:15.444381 env[1393]: time="2025-10-31T05:03:15.444340754Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 31 05:03:15.444496 env[1393]: time="2025-10-31T05:03:15.444410079Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 31 05:03:15.444496 env[1393]: time="2025-10-31T05:03:15.444436931Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 31 05:03:15.448328 env[1393]: time="2025-10-31T05:03:15.448299992Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 31 05:03:15.448515 env[1393]: time="2025-10-31T05:03:15.448464434Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 31 05:03:15.448650 env[1393]: time="2025-10-31T05:03:15.448612674Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 31 05:03:15.448774 env[1393]: time="2025-10-31T05:03:15.448735867Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 31 05:03:15.456158 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3746847098-merged.mount: Deactivated successfully. Oct 31 05:03:15.484565 env[1393]: time="2025-10-31T05:03:15.484507876Z" level=info msg="Loading containers: start." Oct 31 05:03:15.570000 audit[1425]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.570000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffef8b70870 a2=0 a3=7ffef8b7085c items=0 ppid=1393 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.570000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 31 05:03:15.573000 audit[1427]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.573000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe86620c10 a2=0 a3=7ffe86620bfc items=0 ppid=1393 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.573000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 31 05:03:15.576000 audit[1429]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.576000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff455b50a0 a2=0 a3=7fff455b508c items=0 ppid=1393 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 31 05:03:15.579000 audit[1431]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.579000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcfd4db2b0 a2=0 a3=7ffcfd4db29c items=0 ppid=1393 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.579000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 31 05:03:15.583000 audit[1433]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.583000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffa4d99170 a2=0 a3=7fffa4d9915c items=0 ppid=1393 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.583000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 31 05:03:15.605000 audit[1438]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.605000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffdeeea6f0 a2=0 a3=7fffdeeea6dc items=0 ppid=1393 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.605000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 31 05:03:15.614000 audit[1440]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.614000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc0a86d130 a2=0 a3=7ffc0a86d11c items=0 ppid=1393 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.614000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 31 05:03:15.617000 audit[1442]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.617000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff341790c0 a2=0 a3=7fff341790ac items=0 ppid=1393 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.617000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 31 05:03:15.620000 audit[1444]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.620000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffffcf09ad0 a2=0 a3=7ffffcf09abc items=0 ppid=1393 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.620000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:03:15.630000 audit[1448]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.630000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffe0843700 a2=0 a3=7fffe08436ec items=0 ppid=1393 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.630000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:03:15.635000 audit[1449]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.635000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc39834880 a2=0 a3=7ffc3983486c items=0 ppid=1393 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.635000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:03:15.652878 kernel: Initializing XFRM netlink socket Oct 31 05:03:15.707140 env[1393]: time="2025-10-31T05:03:15.707014793Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 31 05:03:15.748000 audit[1458]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.748000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff021154d0 a2=0 a3=7fff021154bc items=0 ppid=1393 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.748000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 31 05:03:15.762000 audit[1461]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.762000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd60e235a0 a2=0 a3=7ffd60e2358c items=0 ppid=1393 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 31 05:03:15.767000 audit[1464]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.767000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff7dee9620 a2=0 a3=7fff7dee960c items=0 ppid=1393 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 31 05:03:15.770000 audit[1466]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.770000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd595211e0 a2=0 a3=7ffd595211cc items=0 ppid=1393 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.770000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 31 05:03:15.774000 audit[1468]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1468 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.774000 audit[1468]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffcfe2e4c0 a2=0 a3=7fffcfe2e4ac items=0 ppid=1393 pid=1468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.774000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 31 05:03:15.777000 audit[1470]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.777000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdc81d5820 a2=0 a3=7ffdc81d580c items=0 ppid=1393 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.777000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 31 05:03:15.780000 audit[1472]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.780000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd80a82070 a2=0 a3=7ffd80a8205c items=0 ppid=1393 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.780000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 31 05:03:15.793000 audit[1475]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.793000 audit[1475]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff0a41ead0 a2=0 a3=7fff0a41eabc items=0 ppid=1393 pid=1475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.793000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 31 05:03:15.798000 audit[1477]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1477 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.798000 audit[1477]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe1c54b000 a2=0 a3=7ffe1c54afec items=0 ppid=1393 pid=1477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.798000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 31 05:03:15.801000 audit[1479]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.801000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe9cec0dd0 a2=0 a3=7ffe9cec0dbc items=0 ppid=1393 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.801000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 31 05:03:15.804000 audit[1481]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.804000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe2e14ff0 a2=0 a3=7fffe2e14fdc items=0 ppid=1393 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.804000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 31 05:03:15.807413 systemd-networkd[1021]: docker0: Link UP Oct 31 05:03:15.816000 audit[1485]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.816000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe480edf20 a2=0 a3=7ffe480edf0c items=0 ppid=1393 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:03:15.822000 audit[1486]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:15.822000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdfb62ef40 a2=0 a3=7ffdfb62ef2c items=0 ppid=1393 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:15.822000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:03:15.825133 env[1393]: time="2025-10-31T05:03:15.825094949Z" level=info msg="Loading containers: done." Oct 31 05:03:15.847123 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck29333940-merged.mount: Deactivated successfully. Oct 31 05:03:15.869313 env[1393]: time="2025-10-31T05:03:15.869110333Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 31 05:03:15.871345 env[1393]: time="2025-10-31T05:03:15.871315947Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 31 05:03:15.871713 env[1393]: time="2025-10-31T05:03:15.871686733Z" level=info msg="Daemon has completed initialization" Oct 31 05:03:15.890270 systemd[1]: Started docker.service. Oct 31 05:03:15.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:15.903054 env[1393]: time="2025-10-31T05:03:15.902998905Z" level=info msg="API listen on /run/docker.sock" Oct 31 05:03:17.274206 env[1202]: time="2025-10-31T05:03:17.274093513Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.9\"" Oct 31 05:03:18.312508 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1274405350.mount: Deactivated successfully. Oct 31 05:03:19.523410 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 31 05:03:19.533555 kernel: kauditd_printk_skb: 84 callbacks suppressed Oct 31 05:03:19.533723 kernel: audit: type=1131 audit(1761886999.522:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:19.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:19.545000 audit: BPF prog-id=40 op=UNLOAD Oct 31 05:03:19.549289 kernel: audit: type=1334 audit(1761886999.545:253): prog-id=40 op=UNLOAD Oct 31 05:03:19.545000 audit: BPF prog-id=39 op=UNLOAD Oct 31 05:03:19.553074 kernel: audit: type=1334 audit(1761886999.545:254): prog-id=39 op=UNLOAD Oct 31 05:03:19.553170 kernel: audit: type=1334 audit(1761886999.545:255): prog-id=38 op=UNLOAD Oct 31 05:03:19.545000 audit: BPF prog-id=38 op=UNLOAD Oct 31 05:03:20.803980 env[1202]: time="2025-10-31T05:03:20.803892898Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:20.805965 env[1202]: time="2025-10-31T05:03:20.805931156Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:abd2b525baf428ffb8b8b7d1e09761dc5cdb7ed0c7896a9427e29e84f8eafc59,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:20.808283 env[1202]: time="2025-10-31T05:03:20.808234342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:20.810618 env[1202]: time="2025-10-31T05:03:20.810583575Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6df11cc2ad9679b1117be34d3a0230add88bc0a08fd7a3ebc26b680575e8de97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:20.811773 env[1202]: time="2025-10-31T05:03:20.811687755Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.9\" returns image reference \"sha256:abd2b525baf428ffb8b8b7d1e09761dc5cdb7ed0c7896a9427e29e84f8eafc59\"" Oct 31 05:03:20.812900 env[1202]: time="2025-10-31T05:03:20.812851915Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.9\"" Oct 31 05:03:21.256046 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Oct 31 05:03:21.267490 kernel: audit: type=1130 audit(1761887001.254:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:21.267568 kernel: audit: type=1131 audit(1761887001.254:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:21.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:21.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:21.256394 systemd[1]: Stopped kubelet.service. Oct 31 05:03:21.259720 systemd[1]: Starting kubelet.service... Oct 31 05:03:21.429636 systemd[1]: Started kubelet.service. Oct 31 05:03:21.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:21.437802 kernel: audit: type=1130 audit(1761887001.428:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:21.492771 kubelet[1528]: E1031 05:03:21.492675 1528 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:03:21.495170 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:03:21.495413 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:03:21.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:03:21.501791 kernel: audit: type=1131 audit(1761887001.494:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:03:23.789831 env[1202]: time="2025-10-31T05:03:23.789739940Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:23.792071 env[1202]: time="2025-10-31T05:03:23.792033637Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0debe32fbb7223500fcf8c312f2a568a5abd3ed9274d8ec6780cfb30b8861e91,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:23.794295 env[1202]: time="2025-10-31T05:03:23.794263664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:23.796642 env[1202]: time="2025-10-31T05:03:23.796608361Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:243c4b8e3bce271fcb1b78008ab996ab6976b1a20096deac08338fcd17979922,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:23.797858 env[1202]: time="2025-10-31T05:03:23.797798139Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.9\" returns image reference \"sha256:0debe32fbb7223500fcf8c312f2a568a5abd3ed9274d8ec6780cfb30b8861e91\"" Oct 31 05:03:23.798572 env[1202]: time="2025-10-31T05:03:23.798540389Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.9\"" Oct 31 05:03:26.430378 env[1202]: time="2025-10-31T05:03:26.430307867Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:26.433112 env[1202]: time="2025-10-31T05:03:26.433059658Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6934c23b154fcb9bf54ed5913782de746735a49f4daa4732285915050cd44ad5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:26.436997 env[1202]: time="2025-10-31T05:03:26.436935102Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:26.441642 env[1202]: time="2025-10-31T05:03:26.441589444Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.9\" returns image reference \"sha256:6934c23b154fcb9bf54ed5913782de746735a49f4daa4732285915050cd44ad5\"" Oct 31 05:03:26.442366 env[1202]: time="2025-10-31T05:03:26.442330406Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Oct 31 05:03:26.443437 env[1202]: time="2025-10-31T05:03:26.443370622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:50c49520dbd0e8b4076b6a5c77d8014df09ea3d59a73e8bafd2678d51ebb92d5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:28.272031 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1510334060.mount: Deactivated successfully. Oct 31 05:03:29.432524 env[1202]: time="2025-10-31T05:03:29.432433080Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:29.434651 env[1202]: time="2025-10-31T05:03:29.434592967Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:29.436383 env[1202]: time="2025-10-31T05:03:29.436330715Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:29.438171 env[1202]: time="2025-10-31T05:03:29.438137310Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:29.439153 env[1202]: time="2025-10-31T05:03:29.439117171Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f\"" Oct 31 05:03:29.439982 env[1202]: time="2025-10-31T05:03:29.439938845Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Oct 31 05:03:30.050385 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1622442198.mount: Deactivated successfully. Oct 31 05:03:31.506495 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Oct 31 05:03:31.516241 kernel: audit: type=1130 audit(1761887011.506:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:31.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:31.506975 systemd[1]: Stopped kubelet.service. Oct 31 05:03:31.514190 systemd[1]: Starting kubelet.service... Oct 31 05:03:31.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:31.522790 kernel: audit: type=1131 audit(1761887011.506:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:31.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:31.683275 systemd[1]: Started kubelet.service. Oct 31 05:03:31.691831 kernel: audit: type=1130 audit(1761887011.682:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:31.816903 kubelet[1537]: E1031 05:03:31.816217 1537 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:03:31.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:03:31.819541 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:03:31.819785 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:03:31.825940 kernel: audit: type=1131 audit(1761887011.819:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:03:33.197835 env[1202]: time="2025-10-31T05:03:33.197721889Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:33.200296 env[1202]: time="2025-10-31T05:03:33.200229237Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:33.204807 env[1202]: time="2025-10-31T05:03:33.204728921Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:33.207915 env[1202]: time="2025-10-31T05:03:33.207812297Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" Oct 31 05:03:33.208097 env[1202]: time="2025-10-31T05:03:33.208059188Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:33.211103 env[1202]: time="2025-10-31T05:03:33.211065700Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Oct 31 05:03:33.294361 update_engine[1195]: I1031 05:03:33.294236 1195 update_attempter.cc:509] Updating boot flags... Oct 31 05:03:33.899335 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2945238604.mount: Deactivated successfully. Oct 31 05:03:33.905271 env[1202]: time="2025-10-31T05:03:33.905183282Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:33.906992 env[1202]: time="2025-10-31T05:03:33.906953543Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:33.909612 env[1202]: time="2025-10-31T05:03:33.909056692Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:33.911131 env[1202]: time="2025-10-31T05:03:33.911094727Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:33.912169 env[1202]: time="2025-10-31T05:03:33.912117685Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Oct 31 05:03:33.913006 env[1202]: time="2025-10-31T05:03:33.912956821Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" Oct 31 05:03:34.725560 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount449125326.mount: Deactivated successfully. Oct 31 05:03:39.259908 env[1202]: time="2025-10-31T05:03:39.259839313Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:39.262590 env[1202]: time="2025-10-31T05:03:39.262554259Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:39.265325 env[1202]: time="2025-10-31T05:03:39.265282386Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:39.269286 env[1202]: time="2025-10-31T05:03:39.269244131Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:39.270668 env[1202]: time="2025-10-31T05:03:39.270611433Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" Oct 31 05:03:42.005905 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Oct 31 05:03:42.006207 systemd[1]: Stopped kubelet.service. Oct 31 05:03:42.014024 kernel: audit: type=1130 audit(1761887022.005:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:42.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:42.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:42.019795 kernel: audit: type=1131 audit(1761887022.005:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:42.019841 systemd[1]: Starting kubelet.service... Oct 31 05:03:42.512258 systemd[1]: Started kubelet.service. Oct 31 05:03:42.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:42.519867 kernel: audit: type=1130 audit(1761887022.511:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:42.609044 kubelet[1578]: E1031 05:03:42.608978 1578 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:03:42.610859 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:03:42.611116 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:03:42.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:03:42.616807 kernel: audit: type=1131 audit(1761887022.610:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:03:44.174523 systemd[1]: Stopped kubelet.service. Oct 31 05:03:44.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:44.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:44.185477 systemd[1]: Starting kubelet.service... Oct 31 05:03:44.188177 kernel: audit: type=1130 audit(1761887024.174:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:44.188315 kernel: audit: type=1131 audit(1761887024.177:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:44.231357 systemd[1]: Reloading. Oct 31 05:03:44.378696 /usr/lib/systemd/system-generators/torcx-generator[1610]: time="2025-10-31T05:03:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 05:03:44.381523 /usr/lib/systemd/system-generators/torcx-generator[1610]: time="2025-10-31T05:03:44Z" level=info msg="torcx already run" Oct 31 05:03:44.485485 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 05:03:44.486418 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 05:03:44.514603 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 05:03:44.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.633791 kernel: audit: type=1400 audit(1761887024.625:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.639789 kernel: audit: type=1400 audit(1761887024.625:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.648353 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 05:03:44.648431 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 31 05:03:44.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.632000 audit: BPF prog-id=43 op=LOAD Oct 31 05:03:44.638000 audit: BPF prog-id=41 op=UNLOAD Oct 31 05:03:44.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.639000 audit: BPF prog-id=44 op=LOAD Oct 31 05:03:44.639000 audit: BPF prog-id=24 op=UNLOAD Oct 31 05:03:44.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit: BPF prog-id=45 op=LOAD Oct 31 05:03:44.642000 audit: BPF prog-id=35 op=UNLOAD Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit: BPF prog-id=46 op=LOAD Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.642000 audit: BPF prog-id=47 op=LOAD Oct 31 05:03:44.642000 audit: BPF prog-id=36 op=UNLOAD Oct 31 05:03:44.642000 audit: BPF prog-id=37 op=UNLOAD Oct 31 05:03:44.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.650000 audit: BPF prog-id=33 op=UNLOAD Oct 31 05:03:44.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.650000 audit: BPF prog-id=49 op=LOAD Oct 31 05:03:44.651000 audit: BPF prog-id=34 op=UNLOAD Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit: BPF prog-id=50 op=LOAD Oct 31 05:03:44.651000 audit: BPF prog-id=25 op=UNLOAD Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.651000 audit: BPF prog-id=51 op=LOAD Oct 31 05:03:44.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.652000 audit: BPF prog-id=52 op=LOAD Oct 31 05:03:44.652000 audit: BPF prog-id=26 op=UNLOAD Oct 31 05:03:44.652000 audit: BPF prog-id=27 op=UNLOAD Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit: BPF prog-id=53 op=LOAD Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.653000 audit: BPF prog-id=54 op=LOAD Oct 31 05:03:44.653000 audit: BPF prog-id=28 op=UNLOAD Oct 31 05:03:44.653000 audit: BPF prog-id=29 op=UNLOAD Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit: BPF prog-id=55 op=LOAD Oct 31 05:03:44.657000 audit: BPF prog-id=30 op=UNLOAD Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit: BPF prog-id=56 op=LOAD Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:44.657000 audit: BPF prog-id=57 op=LOAD Oct 31 05:03:44.657000 audit: BPF prog-id=31 op=UNLOAD Oct 31 05:03:44.657000 audit: BPF prog-id=32 op=UNLOAD Oct 31 05:03:44.688960 systemd[1]: Started kubelet.service. Oct 31 05:03:44.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:44.695782 systemd[1]: Stopping kubelet.service... Oct 31 05:03:44.697609 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 05:03:44.698105 systemd[1]: Stopped kubelet.service. Oct 31 05:03:44.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:44.702116 systemd[1]: Starting kubelet.service... Oct 31 05:03:44.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:44.839830 systemd[1]: Started kubelet.service. Oct 31 05:03:44.987601 kubelet[1667]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 05:03:44.987601 kubelet[1667]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 05:03:44.987601 kubelet[1667]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 05:03:44.988358 kubelet[1667]: I1031 05:03:44.987669 1667 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 05:03:45.931737 kubelet[1667]: I1031 05:03:45.931689 1667 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Oct 31 05:03:45.932499 kubelet[1667]: I1031 05:03:45.931997 1667 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 05:03:45.932907 kubelet[1667]: I1031 05:03:45.932883 1667 server.go:954] "Client rotation is on, will bootstrap in background" Oct 31 05:03:45.978320 kubelet[1667]: E1031 05:03:45.978245 1667 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.230.52.158:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.230.52.158:6443: connect: connection refused" logger="UnhandledError" Oct 31 05:03:45.980017 kubelet[1667]: I1031 05:03:45.979989 1667 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 05:03:45.990322 kubelet[1667]: E1031 05:03:45.990290 1667 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 05:03:45.990862 kubelet[1667]: I1031 05:03:45.990836 1667 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 31 05:03:45.998074 kubelet[1667]: I1031 05:03:45.998050 1667 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 31 05:03:46.000491 kubelet[1667]: I1031 05:03:46.000447 1667 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 05:03:46.000992 kubelet[1667]: I1031 05:03:46.000604 1667 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-cjebs.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 05:03:46.001365 kubelet[1667]: I1031 05:03:46.001341 1667 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 05:03:46.001484 kubelet[1667]: I1031 05:03:46.001464 1667 container_manager_linux.go:304] "Creating device plugin manager" Oct 31 05:03:46.001896 kubelet[1667]: I1031 05:03:46.001855 1667 state_mem.go:36] "Initialized new in-memory state store" Oct 31 05:03:46.007905 kubelet[1667]: I1031 05:03:46.007868 1667 kubelet.go:446] "Attempting to sync node with API server" Oct 31 05:03:46.008053 kubelet[1667]: I1031 05:03:46.008030 1667 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 05:03:46.008199 kubelet[1667]: I1031 05:03:46.008177 1667 kubelet.go:352] "Adding apiserver pod source" Oct 31 05:03:46.008355 kubelet[1667]: I1031 05:03:46.008332 1667 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 05:03:46.017738 kubelet[1667]: I1031 05:03:46.017710 1667 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 05:03:46.018381 kubelet[1667]: I1031 05:03:46.018352 1667 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Oct 31 05:03:46.019308 kubelet[1667]: W1031 05:03:46.019275 1667 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 31 05:03:46.024309 kubelet[1667]: I1031 05:03:46.024270 1667 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 31 05:03:46.024411 kubelet[1667]: I1031 05:03:46.024333 1667 server.go:1287] "Started kubelet" Oct 31 05:03:46.025281 kubelet[1667]: W1031 05:03:46.024537 1667 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.52.158:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-cjebs.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.52.158:6443: connect: connection refused Oct 31 05:03:46.025281 kubelet[1667]: E1031 05:03:46.024617 1667 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.230.52.158:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-cjebs.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.230.52.158:6443: connect: connection refused" logger="UnhandledError" Oct 31 05:03:46.034238 kubelet[1667]: W1031 05:03:46.034180 1667 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.230.52.158:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.230.52.158:6443: connect: connection refused Oct 31 05:03:46.034415 kubelet[1667]: E1031 05:03:46.034382 1667 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.230.52.158:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.230.52.158:6443: connect: connection refused" logger="UnhandledError" Oct 31 05:03:46.034614 kubelet[1667]: I1031 05:03:46.034576 1667 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 05:03:46.038290 kubelet[1667]: I1031 05:03:46.038177 1667 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 05:03:46.039135 kubelet[1667]: I1031 05:03:46.038843 1667 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 05:03:46.041558 kubelet[1667]: E1031 05:03:46.039329 1667 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.230.52.158:6443/api/v1/namespaces/default/events\": dial tcp 10.230.52.158:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-cjebs.gb1.brightbox.com.18737aea508c3f07 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-cjebs.gb1.brightbox.com,UID:srv-cjebs.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-cjebs.gb1.brightbox.com,},FirstTimestamp:2025-10-31 05:03:46.024300295 +0000 UTC m=+1.178374953,LastTimestamp:2025-10-31 05:03:46.024300295 +0000 UTC m=+1.178374953,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-cjebs.gb1.brightbox.com,}" Oct 31 05:03:46.042949 kubelet[1667]: I1031 05:03:46.042684 1667 server.go:479] "Adding debug handlers to kubelet server" Oct 31 05:03:46.047000 audit[1667]: AVC avc: denied { mac_admin } for pid=1667 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:46.047000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:03:46.047000 audit[1667]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c01560 a1=c000928bb8 a2=c000c01530 a3=25 items=0 ppid=1 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.047000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:03:46.047000 audit[1667]: AVC avc: denied { mac_admin } for pid=1667 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:46.047000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:03:46.047000 audit[1667]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00055bf20 a1=c000928bd0 a2=c000c015f0 a3=25 items=0 ppid=1 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.047000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:03:46.049059 kubelet[1667]: I1031 05:03:46.048252 1667 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 05:03:46.049059 kubelet[1667]: I1031 05:03:46.048337 1667 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 05:03:46.049059 kubelet[1667]: I1031 05:03:46.048472 1667 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 05:03:46.049798 kubelet[1667]: I1031 05:03:46.049771 1667 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 05:03:46.051522 kubelet[1667]: I1031 05:03:46.051493 1667 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 31 05:03:46.051795 kubelet[1667]: E1031 05:03:46.051748 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:46.055915 kubelet[1667]: I1031 05:03:46.055890 1667 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 31 05:03:46.055983 kubelet[1667]: I1031 05:03:46.055972 1667 reconciler.go:26] "Reconciler: start to sync state" Oct 31 05:03:46.056404 kubelet[1667]: I1031 05:03:46.056371 1667 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 05:03:46.058174 kubelet[1667]: W1031 05:03:46.058113 1667 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.230.52.158:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.52.158:6443: connect: connection refused Oct 31 05:03:46.058290 kubelet[1667]: E1031 05:03:46.058192 1667 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.230.52.158:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.230.52.158:6443: connect: connection refused" logger="UnhandledError" Oct 31 05:03:46.057000 audit[1679]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:46.057000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb2298fb0 a2=0 a3=7ffeb2298f9c items=0 ppid=1667 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.058948 kubelet[1667]: I1031 05:03:46.058747 1667 factory.go:221] Registration of the containerd container factory successfully Oct 31 05:03:46.058948 kubelet[1667]: I1031 05:03:46.058781 1667 factory.go:221] Registration of the systemd container factory successfully Oct 31 05:03:46.057000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 05:03:46.060000 audit[1680]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:46.060000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed73f5160 a2=0 a3=7ffed73f514c items=0 ppid=1667 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 05:03:46.064000 audit[1682]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:46.064000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd00ff72a0 a2=0 a3=7ffd00ff728c items=0 ppid=1667 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 05:03:46.066769 kubelet[1667]: E1031 05:03:46.066739 1667 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 31 05:03:46.067000 audit[1684]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:46.067000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcf701bfc0 a2=0 a3=7ffcf701bfac items=0 ppid=1667 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 05:03:46.081000 audit[1687]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:46.081000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc87143fc0 a2=0 a3=7ffc87143fac items=0 ppid=1667 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 31 05:03:46.082154 kubelet[1667]: I1031 05:03:46.082084 1667 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 31 05:03:46.082000 audit[1688]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:03:46.082000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffef9c50ab0 a2=0 a3=7ffef9c50a9c items=0 ppid=1667 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 05:03:46.083594 kubelet[1667]: I1031 05:03:46.083488 1667 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 31 05:03:46.083594 kubelet[1667]: I1031 05:03:46.083543 1667 status_manager.go:227] "Starting to sync pod status with apiserver" Oct 31 05:03:46.083594 kubelet[1667]: I1031 05:03:46.083580 1667 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 05:03:46.083782 kubelet[1667]: I1031 05:03:46.083596 1667 kubelet.go:2382] "Starting kubelet main sync loop" Oct 31 05:03:46.083782 kubelet[1667]: E1031 05:03:46.083710 1667 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 31 05:03:46.084000 audit[1689]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:46.084000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd825d4820 a2=0 a3=7ffd825d480c items=0 ppid=1667 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 05:03:46.087000 audit[1691]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:46.087000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1d372a20 a2=0 a3=7ffe1d372a0c items=0 ppid=1667 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 05:03:46.087000 audit[1692]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:03:46.087000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe25425be0 a2=0 a3=7ffe25425bcc items=0 ppid=1667 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.087000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 05:03:46.089682 kubelet[1667]: E1031 05:03:46.089603 1667 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.52.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-cjebs.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.52.158:6443: connect: connection refused" interval="200ms" Oct 31 05:03:46.090987 kubelet[1667]: W1031 05:03:46.090929 1667 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.230.52.158:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.52.158:6443: connect: connection refused Oct 31 05:03:46.091100 kubelet[1667]: E1031 05:03:46.091005 1667 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.230.52.158:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.230.52.158:6443: connect: connection refused" logger="UnhandledError" Oct 31 05:03:46.091000 audit[1695]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:03:46.091000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff2716ada0 a2=0 a3=7fff2716ad8c items=0 ppid=1667 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.091000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 05:03:46.096000 audit[1696]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:03:46.096000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3d6253f0 a2=0 a3=7ffd3d6253dc items=0 ppid=1667 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.096000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 05:03:46.097000 audit[1697]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:03:46.097000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc1b0bb090 a2=0 a3=7ffc1b0bb07c items=0 ppid=1667 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.097000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 05:03:46.108594 kubelet[1667]: I1031 05:03:46.108568 1667 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 05:03:46.108594 kubelet[1667]: I1031 05:03:46.108590 1667 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 05:03:46.108801 kubelet[1667]: I1031 05:03:46.108624 1667 state_mem.go:36] "Initialized new in-memory state store" Oct 31 05:03:46.110697 kubelet[1667]: I1031 05:03:46.110670 1667 policy_none.go:49] "None policy: Start" Oct 31 05:03:46.110822 kubelet[1667]: I1031 05:03:46.110720 1667 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 31 05:03:46.110822 kubelet[1667]: I1031 05:03:46.110775 1667 state_mem.go:35] "Initializing new in-memory state store" Oct 31 05:03:46.118975 systemd[1]: Created slice kubepods.slice. Oct 31 05:03:46.125619 systemd[1]: Created slice kubepods-burstable.slice. Oct 31 05:03:46.134493 systemd[1]: Created slice kubepods-besteffort.slice. Oct 31 05:03:46.141945 kubelet[1667]: I1031 05:03:46.141902 1667 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 31 05:03:46.141000 audit[1667]: AVC avc: denied { mac_admin } for pid=1667 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:46.141000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:03:46.141000 audit[1667]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000deb2c0 a1=c000de3ed8 a2=c000deb290 a3=25 items=0 ppid=1 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:46.141000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:03:46.142433 kubelet[1667]: I1031 05:03:46.142038 1667 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Oct 31 05:03:46.142433 kubelet[1667]: I1031 05:03:46.142269 1667 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 05:03:46.142433 kubelet[1667]: I1031 05:03:46.142294 1667 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 05:03:46.143907 kubelet[1667]: I1031 05:03:46.143155 1667 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 05:03:46.146517 kubelet[1667]: E1031 05:03:46.146422 1667 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 05:03:46.147468 kubelet[1667]: E1031 05:03:46.147445 1667 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:46.197709 systemd[1]: Created slice kubepods-burstable-pod72c7567a619a67b2c209c48625108546.slice. Oct 31 05:03:46.213788 kubelet[1667]: E1031 05:03:46.213631 1667 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cjebs.gb1.brightbox.com\" not found" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.216932 systemd[1]: Created slice kubepods-burstable-pod0beb5d0099711e24c0a0401f0c1a28b1.slice. Oct 31 05:03:46.219092 kubelet[1667]: E1031 05:03:46.219058 1667 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cjebs.gb1.brightbox.com\" not found" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.227251 systemd[1]: Created slice kubepods-burstable-pod3a4e1d0c249173fcf6566deef8c8595d.slice. Oct 31 05:03:46.230910 kubelet[1667]: E1031 05:03:46.230874 1667 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cjebs.gb1.brightbox.com\" not found" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.245943 kubelet[1667]: I1031 05:03:46.245918 1667 kubelet_node_status.go:75] "Attempting to register node" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.246615 kubelet[1667]: E1031 05:03:46.246582 1667 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.230.52.158:6443/api/v1/nodes\": dial tcp 10.230.52.158:6443: connect: connection refused" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.290698 kubelet[1667]: E1031 05:03:46.290651 1667 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.52.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-cjebs.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.52.158:6443: connect: connection refused" interval="400ms" Oct 31 05:03:46.357027 kubelet[1667]: I1031 05:03:46.356969 1667 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3a4e1d0c249173fcf6566deef8c8595d-kubeconfig\") pod \"kube-scheduler-srv-cjebs.gb1.brightbox.com\" (UID: \"3a4e1d0c249173fcf6566deef8c8595d\") " pod="kube-system/kube-scheduler-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.357332 kubelet[1667]: I1031 05:03:46.357302 1667 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/72c7567a619a67b2c209c48625108546-ca-certs\") pod \"kube-apiserver-srv-cjebs.gb1.brightbox.com\" (UID: \"72c7567a619a67b2c209c48625108546\") " pod="kube-system/kube-apiserver-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.357484 kubelet[1667]: I1031 05:03:46.357456 1667 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/72c7567a619a67b2c209c48625108546-usr-share-ca-certificates\") pod \"kube-apiserver-srv-cjebs.gb1.brightbox.com\" (UID: \"72c7567a619a67b2c209c48625108546\") " pod="kube-system/kube-apiserver-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.357641 kubelet[1667]: I1031 05:03:46.357614 1667 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0beb5d0099711e24c0a0401f0c1a28b1-k8s-certs\") pod \"kube-controller-manager-srv-cjebs.gb1.brightbox.com\" (UID: \"0beb5d0099711e24c0a0401f0c1a28b1\") " pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.357836 kubelet[1667]: I1031 05:03:46.357795 1667 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0beb5d0099711e24c0a0401f0c1a28b1-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-cjebs.gb1.brightbox.com\" (UID: \"0beb5d0099711e24c0a0401f0c1a28b1\") " pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.358038 kubelet[1667]: I1031 05:03:46.358011 1667 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/72c7567a619a67b2c209c48625108546-k8s-certs\") pod \"kube-apiserver-srv-cjebs.gb1.brightbox.com\" (UID: \"72c7567a619a67b2c209c48625108546\") " pod="kube-system/kube-apiserver-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.358224 kubelet[1667]: I1031 05:03:46.358188 1667 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0beb5d0099711e24c0a0401f0c1a28b1-ca-certs\") pod \"kube-controller-manager-srv-cjebs.gb1.brightbox.com\" (UID: \"0beb5d0099711e24c0a0401f0c1a28b1\") " pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.358375 kubelet[1667]: I1031 05:03:46.358350 1667 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0beb5d0099711e24c0a0401f0c1a28b1-flexvolume-dir\") pod \"kube-controller-manager-srv-cjebs.gb1.brightbox.com\" (UID: \"0beb5d0099711e24c0a0401f0c1a28b1\") " pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.358533 kubelet[1667]: I1031 05:03:46.358508 1667 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0beb5d0099711e24c0a0401f0c1a28b1-kubeconfig\") pod \"kube-controller-manager-srv-cjebs.gb1.brightbox.com\" (UID: \"0beb5d0099711e24c0a0401f0c1a28b1\") " pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.449959 kubelet[1667]: I1031 05:03:46.449912 1667 kubelet_node_status.go:75] "Attempting to register node" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.450410 kubelet[1667]: E1031 05:03:46.450376 1667 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.230.52.158:6443/api/v1/nodes\": dial tcp 10.230.52.158:6443: connect: connection refused" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.518001 env[1202]: time="2025-10-31T05:03:46.517464996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-cjebs.gb1.brightbox.com,Uid:72c7567a619a67b2c209c48625108546,Namespace:kube-system,Attempt:0,}" Oct 31 05:03:46.520914 env[1202]: time="2025-10-31T05:03:46.520865293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-cjebs.gb1.brightbox.com,Uid:0beb5d0099711e24c0a0401f0c1a28b1,Namespace:kube-system,Attempt:0,}" Oct 31 05:03:46.532844 env[1202]: time="2025-10-31T05:03:46.532801985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-cjebs.gb1.brightbox.com,Uid:3a4e1d0c249173fcf6566deef8c8595d,Namespace:kube-system,Attempt:0,}" Oct 31 05:03:46.692155 kubelet[1667]: E1031 05:03:46.692105 1667 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.52.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-cjebs.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.52.158:6443: connect: connection refused" interval="800ms" Oct 31 05:03:46.854684 kubelet[1667]: I1031 05:03:46.854005 1667 kubelet_node_status.go:75] "Attempting to register node" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.854684 kubelet[1667]: E1031 05:03:46.854487 1667 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.230.52.158:6443/api/v1/nodes\": dial tcp 10.230.52.158:6443: connect: connection refused" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:46.971177 kubelet[1667]: W1031 05:03:46.971114 1667 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.230.52.158:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.52.158:6443: connect: connection refused Oct 31 05:03:46.971376 kubelet[1667]: E1031 05:03:46.971181 1667 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.230.52.158:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.230.52.158:6443: connect: connection refused" logger="UnhandledError" Oct 31 05:03:47.003386 kubelet[1667]: W1031 05:03:47.003265 1667 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.52.158:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-cjebs.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.52.158:6443: connect: connection refused Oct 31 05:03:47.003386 kubelet[1667]: E1031 05:03:47.003353 1667 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.230.52.158:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-cjebs.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.230.52.158:6443: connect: connection refused" logger="UnhandledError" Oct 31 05:03:47.177394 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount201655834.mount: Deactivated successfully. Oct 31 05:03:47.182982 env[1202]: time="2025-10-31T05:03:47.182925735Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:47.184138 env[1202]: time="2025-10-31T05:03:47.184101876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:47.186168 env[1202]: time="2025-10-31T05:03:47.186115957Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:47.189063 env[1202]: time="2025-10-31T05:03:47.189021357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:47.192335 env[1202]: time="2025-10-31T05:03:47.192303125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:47.194889 env[1202]: time="2025-10-31T05:03:47.194848637Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:47.199424 env[1202]: time="2025-10-31T05:03:47.199391158Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:47.200871 env[1202]: time="2025-10-31T05:03:47.200824201Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:47.202077 env[1202]: time="2025-10-31T05:03:47.202036614Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:47.203077 env[1202]: time="2025-10-31T05:03:47.203046023Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:47.215701 env[1202]: time="2025-10-31T05:03:47.215645922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:47.219950 env[1202]: time="2025-10-31T05:03:47.219902340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:03:47.259708 env[1202]: time="2025-10-31T05:03:47.259606682Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:03:47.260170 env[1202]: time="2025-10-31T05:03:47.260105609Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:03:47.260365 env[1202]: time="2025-10-31T05:03:47.260321256Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:03:47.260802 env[1202]: time="2025-10-31T05:03:47.260713677Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/03cc5fe98a74d8cdfd47b0615f033d15c9f4b8fb30a8cfdc012937bdf5b4b8e2 pid=1717 runtime=io.containerd.runc.v2 Oct 31 05:03:47.264855 env[1202]: time="2025-10-31T05:03:47.264713644Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:03:47.264855 env[1202]: time="2025-10-31T05:03:47.264809683Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:03:47.265029 env[1202]: time="2025-10-31T05:03:47.264829543Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:03:47.265211 env[1202]: time="2025-10-31T05:03:47.265011521Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f4a9cb1749828b979080739a24a986010bf20d0de36a9032386c655920f29d2 pid=1733 runtime=io.containerd.runc.v2 Oct 31 05:03:47.267997 env[1202]: time="2025-10-31T05:03:47.267902855Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:03:47.268228 env[1202]: time="2025-10-31T05:03:47.268156481Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:03:47.268406 env[1202]: time="2025-10-31T05:03:47.268364404Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:03:47.268909 env[1202]: time="2025-10-31T05:03:47.268842785Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f990932344b9f036f87fa18e39ed37bfd34e9e4527760ce0027fa761e56cb59 pid=1718 runtime=io.containerd.runc.v2 Oct 31 05:03:47.290667 kubelet[1667]: W1031 05:03:47.290504 1667 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.230.52.158:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.230.52.158:6443: connect: connection refused Oct 31 05:03:47.290667 kubelet[1667]: E1031 05:03:47.290612 1667 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.230.52.158:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.230.52.158:6443: connect: connection refused" logger="UnhandledError" Oct 31 05:03:47.301826 systemd[1]: Started cri-containerd-5f4a9cb1749828b979080739a24a986010bf20d0de36a9032386c655920f29d2.scope. Oct 31 05:03:47.324154 systemd[1]: Started cri-containerd-03cc5fe98a74d8cdfd47b0615f033d15c9f4b8fb30a8cfdc012937bdf5b4b8e2.scope. Oct 31 05:03:47.327965 systemd[1]: Started cri-containerd-2f990932344b9f036f87fa18e39ed37bfd34e9e4527760ce0027fa761e56cb59.scope. Oct 31 05:03:47.353254 kernel: kauditd_printk_skb: 223 callbacks suppressed Oct 31 05:03:47.353676 kernel: audit: type=1400 audit(1761887027.342:458): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.355296 kubelet[1667]: W1031 05:03:47.355094 1667 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.230.52.158:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.52.158:6443: connect: connection refused Oct 31 05:03:47.355296 kubelet[1667]: E1031 05:03:47.355244 1667 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.230.52.158:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.230.52.158:6443: connect: connection refused" logger="UnhandledError" Oct 31 05:03:47.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.363785 kernel: audit: type=1400 audit(1761887027.342:459): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.372790 kernel: audit: type=1400 audit(1761887027.342:460): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.384783 kernel: audit: type=1400 audit(1761887027.342:461): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.384883 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 05:03:47.384939 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Oct 31 05:03:47.385011 kernel: audit: backlog limit exceeded Oct 31 05:03:47.389877 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 05:03:47.389961 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 Oct 31 05:03:47.390013 kernel: audit: backlog limit exceeded Oct 31 05:03:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.342000 audit: BPF prog-id=58 op=LOAD Oct 31 05:03:47.355000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.355000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1733 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346139636231373439383238623937393038303733396132346139 Oct 31 05:03:47.355000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.355000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1733 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346139636231373439383238623937393038303733396132346139 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit: BPF prog-id=59 op=LOAD Oct 31 05:03:47.356000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003400a0 items=0 ppid=1733 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346139636231373439383238623937393038303733396132346139 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit: BPF prog-id=60 op=LOAD Oct 31 05:03:47.356000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003400e8 items=0 ppid=1733 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346139636231373439383238623937393038303733396132346139 Oct 31 05:03:47.356000 audit: BPF prog-id=60 op=UNLOAD Oct 31 05:03:47.356000 audit: BPF prog-id=59 op=UNLOAD Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.356000 audit: BPF prog-id=61 op=LOAD Oct 31 05:03:47.356000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003404f8 items=0 ppid=1733 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566346139636231373439383238623937393038303733396132346139 Oct 31 05:03:47.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.391000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.391000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1718 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393930393332333434623966303336663837666131386533396564 Oct 31 05:03:47.391000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.391000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1718 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393930393332333434623966303336663837666131386533396564 Oct 31 05:03:47.391000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.391000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.391000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.391000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.391000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.391000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000380260 items=0 ppid=1718 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393930393332333434623966303336663837666131386533396564 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit: BPF prog-id=64 op=LOAD Oct 31 05:03:47.397000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003802a8 items=0 ppid=1718 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393930393332333434623966303336663837666131386533396564 Oct 31 05:03:47.397000 audit: BPF prog-id=64 op=UNLOAD Oct 31 05:03:47.397000 audit: BPF prog-id=63 op=UNLOAD Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { perfmon } for pid=1753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit[1753]: AVC avc: denied { bpf } for pid=1753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.397000 audit: BPF prog-id=65 op=LOAD Oct 31 05:03:47.397000 audit[1753]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003806b8 items=0 ppid=1718 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393930393332333434623966303336663837666131386533396564 Oct 31 05:03:47.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.418000 audit: BPF prog-id=66 op=LOAD Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1717 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033636335666539386137346438636466643437623036313566303333 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1717 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033636335666539386137346438636466643437623036313566303333 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit: BPF prog-id=67 op=LOAD Oct 31 05:03:47.422000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000280910 items=0 ppid=1717 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033636335666539386137346438636466643437623036313566303333 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit: BPF prog-id=68 op=LOAD Oct 31 05:03:47.422000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000280958 items=0 ppid=1717 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033636335666539386137346438636466643437623036313566303333 Oct 31 05:03:47.422000 audit: BPF prog-id=68 op=UNLOAD Oct 31 05:03:47.422000 audit: BPF prog-id=67 op=UNLOAD Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.422000 audit: BPF prog-id=69 op=LOAD Oct 31 05:03:47.422000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000280d68 items=0 ppid=1717 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033636335666539386137346438636466643437623036313566303333 Oct 31 05:03:47.439269 env[1202]: time="2025-10-31T05:03:47.439094508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-cjebs.gb1.brightbox.com,Uid:72c7567a619a67b2c209c48625108546,Namespace:kube-system,Attempt:0,} returns sandbox id \"5f4a9cb1749828b979080739a24a986010bf20d0de36a9032386c655920f29d2\"" Oct 31 05:03:47.453257 env[1202]: time="2025-10-31T05:03:47.453211600Z" level=info msg="CreateContainer within sandbox \"5f4a9cb1749828b979080739a24a986010bf20d0de36a9032386c655920f29d2\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 31 05:03:47.470586 env[1202]: time="2025-10-31T05:03:47.470523962Z" level=info msg="CreateContainer within sandbox \"5f4a9cb1749828b979080739a24a986010bf20d0de36a9032386c655920f29d2\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"5b474a226154d1b34684fb463f98c46adfe7bf069289cb00d0d351f649f2b396\"" Oct 31 05:03:47.472203 env[1202]: time="2025-10-31T05:03:47.472157744Z" level=info msg="StartContainer for \"5b474a226154d1b34684fb463f98c46adfe7bf069289cb00d0d351f649f2b396\"" Oct 31 05:03:47.493990 kubelet[1667]: E1031 05:03:47.493909 1667 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.52.158:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-cjebs.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.52.158:6443: connect: connection refused" interval="1.6s" Oct 31 05:03:47.497382 env[1202]: time="2025-10-31T05:03:47.495493600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-cjebs.gb1.brightbox.com,Uid:3a4e1d0c249173fcf6566deef8c8595d,Namespace:kube-system,Attempt:0,} returns sandbox id \"2f990932344b9f036f87fa18e39ed37bfd34e9e4527760ce0027fa761e56cb59\"" Oct 31 05:03:47.499340 env[1202]: time="2025-10-31T05:03:47.499291716Z" level=info msg="CreateContainer within sandbox \"2f990932344b9f036f87fa18e39ed37bfd34e9e4527760ce0027fa761e56cb59\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 31 05:03:47.516960 systemd[1]: Started cri-containerd-5b474a226154d1b34684fb463f98c46adfe7bf069289cb00d0d351f649f2b396.scope. Oct 31 05:03:47.533948 env[1202]: time="2025-10-31T05:03:47.533866932Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-cjebs.gb1.brightbox.com,Uid:0beb5d0099711e24c0a0401f0c1a28b1,Namespace:kube-system,Attempt:0,} returns sandbox id \"03cc5fe98a74d8cdfd47b0615f033d15c9f4b8fb30a8cfdc012937bdf5b4b8e2\"" Oct 31 05:03:47.534827 env[1202]: time="2025-10-31T05:03:47.534667459Z" level=info msg="CreateContainer within sandbox \"2f990932344b9f036f87fa18e39ed37bfd34e9e4527760ce0027fa761e56cb59\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"341fca79e01ca7a101cd63825af33fafd00bdf73e1f250a0d71bc2fea662912e\"" Oct 31 05:03:47.536050 env[1202]: time="2025-10-31T05:03:47.536022113Z" level=info msg="StartContainer for \"341fca79e01ca7a101cd63825af33fafd00bdf73e1f250a0d71bc2fea662912e\"" Oct 31 05:03:47.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.539000 audit: BPF prog-id=70 op=LOAD Oct 31 05:03:47.541185 env[1202]: time="2025-10-31T05:03:47.540952014Z" level=info msg="CreateContainer within sandbox \"03cc5fe98a74d8cdfd47b0615f033d15c9f4b8fb30a8cfdc012937bdf5b4b8e2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 31 05:03:47.541000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.541000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1733 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343734613232363135346431623334363834666234363366393863 Oct 31 05:03:47.542000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.542000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1733 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343734613232363135346431623334363834666234363366393863 Oct 31 05:03:47.543000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.543000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.543000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.543000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.543000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.543000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.543000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.543000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.543000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.543000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.543000 audit: BPF prog-id=71 op=LOAD Oct 31 05:03:47.543000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000312de0 items=0 ppid=1733 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343734613232363135346431623334363834666234363366393863 Oct 31 05:03:47.544000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.544000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.544000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.544000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.544000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.544000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.544000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.544000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.544000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.544000 audit: BPF prog-id=72 op=LOAD Oct 31 05:03:47.544000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000312e28 items=0 ppid=1733 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343734613232363135346431623334363834666234363366393863 Oct 31 05:03:47.545000 audit: BPF prog-id=72 op=UNLOAD Oct 31 05:03:47.546000 audit: BPF prog-id=71 op=UNLOAD Oct 31 05:03:47.546000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.546000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.546000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.546000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.546000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.546000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.546000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.546000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.546000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.546000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.546000 audit: BPF prog-id=73 op=LOAD Oct 31 05:03:47.546000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000313238 items=0 ppid=1733 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343734613232363135346431623334363834666234363366393863 Oct 31 05:03:47.580558 env[1202]: time="2025-10-31T05:03:47.580498701Z" level=info msg="CreateContainer within sandbox \"03cc5fe98a74d8cdfd47b0615f033d15c9f4b8fb30a8cfdc012937bdf5b4b8e2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"c3f47b204568947265c73ba4d54f8ac16be74457cfc389f96f16ba506d5fdfad\"" Oct 31 05:03:47.581346 env[1202]: time="2025-10-31T05:03:47.581048593Z" level=info msg="StartContainer for \"c3f47b204568947265c73ba4d54f8ac16be74457cfc389f96f16ba506d5fdfad\"" Oct 31 05:03:47.585836 systemd[1]: Started cri-containerd-341fca79e01ca7a101cd63825af33fafd00bdf73e1f250a0d71bc2fea662912e.scope. Oct 31 05:03:47.611710 env[1202]: time="2025-10-31T05:03:47.611648116Z" level=info msg="StartContainer for \"5b474a226154d1b34684fb463f98c46adfe7bf069289cb00d0d351f649f2b396\" returns successfully" Oct 31 05:03:47.630745 systemd[1]: Started cri-containerd-c3f47b204568947265c73ba4d54f8ac16be74457cfc389f96f16ba506d5fdfad.scope. Oct 31 05:03:47.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.643000 audit: BPF prog-id=74 op=LOAD Oct 31 05:03:47.644000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.644000 audit[1855]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1718 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334316663613739653031636137613130316364363338323561663333 Oct 31 05:03:47.645000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.645000 audit[1855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1718 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334316663613739653031636137613130316364363338323561663333 Oct 31 05:03:47.646000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.646000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.646000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.646000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.646000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.646000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.646000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.646000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.646000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.646000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.646000 audit: BPF prog-id=75 op=LOAD Oct 31 05:03:47.646000 audit[1855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a1a10 items=0 ppid=1718 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334316663613739653031636137613130316364363338323561663333 Oct 31 05:03:47.647000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.647000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.647000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.647000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.647000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.647000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.647000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.647000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.647000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.647000 audit: BPF prog-id=76 op=LOAD Oct 31 05:03:47.647000 audit[1855]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a1a58 items=0 ppid=1718 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334316663613739653031636137613130316364363338323561663333 Oct 31 05:03:47.649000 audit: BPF prog-id=76 op=UNLOAD Oct 31 05:03:47.649000 audit: BPF prog-id=75 op=UNLOAD Oct 31 05:03:47.649000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.649000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.649000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.649000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.649000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.649000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.649000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.649000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.649000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.649000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.649000 audit: BPF prog-id=77 op=LOAD Oct 31 05:03:47.649000 audit[1855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a1e68 items=0 ppid=1718 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334316663613739653031636137613130316364363338323561663333 Oct 31 05:03:47.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.657000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.657000 audit: BPF prog-id=78 op=LOAD Oct 31 05:03:47.659000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.659000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1717 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663437623230343536383934373236356337336261346435346638 Oct 31 05:03:47.660000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.661305 kubelet[1667]: I1031 05:03:47.661225 1667 kubelet_node_status.go:75] "Attempting to register node" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:47.660000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1717 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.661674 kubelet[1667]: E1031 05:03:47.661612 1667 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.230.52.158:6443/api/v1/nodes\": dial tcp 10.230.52.158:6443: connect: connection refused" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:47.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663437623230343536383934373236356337336261346435346638 Oct 31 05:03:47.661000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.661000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.661000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.661000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.661000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.661000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.661000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.661000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.661000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.661000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.661000 audit: BPF prog-id=79 op=LOAD Oct 31 05:03:47.661000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002f6920 items=0 ppid=1717 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663437623230343536383934373236356337336261346435346638 Oct 31 05:03:47.663000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.663000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.663000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.663000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.663000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.663000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.663000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.663000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.663000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.663000 audit: BPF prog-id=80 op=LOAD Oct 31 05:03:47.663000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002f6968 items=0 ppid=1717 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663437623230343536383934373236356337336261346435346638 Oct 31 05:03:47.664000 audit: BPF prog-id=80 op=UNLOAD Oct 31 05:03:47.664000 audit: BPF prog-id=79 op=UNLOAD Oct 31 05:03:47.665000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.665000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.665000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.665000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.665000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.665000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.665000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.665000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.665000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.665000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:47.665000 audit: BPF prog-id=81 op=LOAD Oct 31 05:03:47.665000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002f6d78 items=0 ppid=1717 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:47.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663437623230343536383934373236356337336261346435346638 Oct 31 05:03:47.719925 env[1202]: time="2025-10-31T05:03:47.719739777Z" level=info msg="StartContainer for \"341fca79e01ca7a101cd63825af33fafd00bdf73e1f250a0d71bc2fea662912e\" returns successfully" Oct 31 05:03:47.724320 env[1202]: time="2025-10-31T05:03:47.724286195Z" level=info msg="StartContainer for \"c3f47b204568947265c73ba4d54f8ac16be74457cfc389f96f16ba506d5fdfad\" returns successfully" Oct 31 05:03:48.028956 kubelet[1667]: E1031 05:03:48.028907 1667 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.230.52.158:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.230.52.158:6443: connect: connection refused" logger="UnhandledError" Oct 31 05:03:48.109177 kubelet[1667]: E1031 05:03:48.109116 1667 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cjebs.gb1.brightbox.com\" not found" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:48.115548 kubelet[1667]: E1031 05:03:48.115349 1667 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cjebs.gb1.brightbox.com\" not found" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:48.121491 kubelet[1667]: E1031 05:03:48.121440 1667 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cjebs.gb1.brightbox.com\" not found" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:48.628243 kubelet[1667]: W1031 05:03:48.628134 1667 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.52.158:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-cjebs.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.52.158:6443: connect: connection refused Oct 31 05:03:48.628591 kubelet[1667]: E1031 05:03:48.628559 1667 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.230.52.158:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-cjebs.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.230.52.158:6443: connect: connection refused" logger="UnhandledError" Oct 31 05:03:49.124448 kubelet[1667]: E1031 05:03:49.124400 1667 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cjebs.gb1.brightbox.com\" not found" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:49.125472 kubelet[1667]: E1031 05:03:49.125376 1667 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cjebs.gb1.brightbox.com\" not found" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:49.242699 kubelet[1667]: E1031 05:03:49.242664 1667 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cjebs.gb1.brightbox.com\" not found" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:49.264027 kubelet[1667]: I1031 05:03:49.263989 1667 kubelet_node_status.go:75] "Attempting to register node" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:49.815000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:03:49.815000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0004da150 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:03:49.815000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:03:49.815000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:03:49.815000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00036a100 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:03:49.815000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:03:51.141000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:03:51.141000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c003f468a0 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:03:51.141000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:03:51.141000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:03:51.141000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0045ede80 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:03:51.141000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:03:51.145000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526391 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:03:51.145000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003d47710 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:03:51.145000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:03:51.149000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526397 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:03:51.149000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c003d479e0 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:03:51.149000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:03:51.200000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:03:51.200000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0066245a0 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:03:51.200000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:03:51.201000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:03:51.201000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c006068c30 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:03:51.201000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:03:51.336746 kubelet[1667]: I1031 05:03:51.336695 1667 kubelet_node_status.go:78] "Successfully registered node" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:51.337466 kubelet[1667]: E1031 05:03:51.337440 1667 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"srv-cjebs.gb1.brightbox.com\": node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:51.371091 kubelet[1667]: E1031 05:03:51.371045 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:51.384260 kubelet[1667]: E1031 05:03:51.384145 1667 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{srv-cjebs.gb1.brightbox.com.18737aea508c3f07 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-cjebs.gb1.brightbox.com,UID:srv-cjebs.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-cjebs.gb1.brightbox.com,},FirstTimestamp:2025-10-31 05:03:46.024300295 +0000 UTC m=+1.178374953,LastTimestamp:2025-10-31 05:03:46.024300295 +0000 UTC m=+1.178374953,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-cjebs.gb1.brightbox.com,}" Oct 31 05:03:51.394644 kubelet[1667]: E1031 05:03:51.394497 1667 controller.go:145] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="3.2s" Oct 31 05:03:51.472624 kubelet[1667]: E1031 05:03:51.472570 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:51.572999 kubelet[1667]: E1031 05:03:51.572953 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:51.673714 kubelet[1667]: E1031 05:03:51.673550 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:51.774437 kubelet[1667]: E1031 05:03:51.774369 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:51.874651 kubelet[1667]: E1031 05:03:51.874483 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:51.975792 kubelet[1667]: E1031 05:03:51.975610 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:52.076835 kubelet[1667]: E1031 05:03:52.076717 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:52.177849 kubelet[1667]: E1031 05:03:52.177783 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:52.278969 kubelet[1667]: E1031 05:03:52.278923 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:52.380023 kubelet[1667]: E1031 05:03:52.379948 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:52.480982 kubelet[1667]: E1031 05:03:52.480905 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:52.581402 kubelet[1667]: E1031 05:03:52.581250 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:52.682263 kubelet[1667]: E1031 05:03:52.682204 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:52.783240 kubelet[1667]: E1031 05:03:52.783145 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:52.884149 kubelet[1667]: E1031 05:03:52.883993 1667 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cjebs.gb1.brightbox.com\" not found" Oct 31 05:03:52.964540 kubelet[1667]: I1031 05:03:52.964492 1667 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:52.980192 kubelet[1667]: W1031 05:03:52.980165 1667 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 31 05:03:52.980536 kubelet[1667]: I1031 05:03:52.980502 1667 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:52.989658 kubelet[1667]: W1031 05:03:52.989631 1667 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 31 05:03:52.989919 kubelet[1667]: I1031 05:03:52.989892 1667 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:52.997168 kubelet[1667]: W1031 05:03:52.997108 1667 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 31 05:03:53.031192 kubelet[1667]: I1031 05:03:53.031095 1667 apiserver.go:52] "Watching apiserver" Oct 31 05:03:53.056492 kubelet[1667]: I1031 05:03:53.056423 1667 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 31 05:03:53.396038 systemd[1]: Reloading. Oct 31 05:03:53.538714 /usr/lib/systemd/system-generators/torcx-generator[1955]: time="2025-10-31T05:03:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 05:03:53.538808 /usr/lib/systemd/system-generators/torcx-generator[1955]: time="2025-10-31T05:03:53Z" level=info msg="torcx already run" Oct 31 05:03:53.644838 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 05:03:53.644871 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 05:03:53.673505 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 05:03:53.797575 kernel: kauditd_printk_skb: 374 callbacks suppressed Oct 31 05:03:53.797820 kernel: audit: type=1400 audit(1761887033.787:571): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.803794 kernel: audit: type=1400 audit(1761887033.787:572): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.816865 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 05:03:53.817016 kernel: audit: audit_lost=12 audit_rate_limit=0 audit_backlog_limit=64 Oct 31 05:03:53.817062 kernel: audit: type=1400 audit(1761887033.787:573): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.817129 kernel: audit: backlog limit exceeded Oct 31 05:03:53.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.822842 kernel: audit: type=1400 audit(1761887033.787:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.824513 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 31 05:03:53.826623 kernel: audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 Oct 31 05:03:53.826696 kernel: audit: backlog limit exceeded Oct 31 05:03:53.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.796000 audit: BPF prog-id=82 op=LOAD Oct 31 05:03:53.796000 audit: BPF prog-id=70 op=UNLOAD Oct 31 05:03:53.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.799000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.799000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.802000 audit: BPF prog-id=83 op=LOAD Oct 31 05:03:53.802000 audit: BPF prog-id=43 op=UNLOAD Oct 31 05:03:53.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.803000 audit: BPF prog-id=84 op=LOAD Oct 31 05:03:53.803000 audit: BPF prog-id=62 op=UNLOAD Oct 31 05:03:53.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.804000 audit: BPF prog-id=85 op=LOAD Oct 31 05:03:53.804000 audit: BPF prog-id=74 op=UNLOAD Oct 31 05:03:53.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.805000 audit: BPF prog-id=86 op=LOAD Oct 31 05:03:53.805000 audit: BPF prog-id=44 op=UNLOAD Oct 31 05:03:53.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.822000 audit: BPF prog-id=87 op=LOAD Oct 31 05:03:53.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.838000 audit: BPF prog-id=99 op=LOAD Oct 31 05:03:53.838000 audit: BPF prog-id=55 op=UNLOAD Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit: BPF prog-id=100 op=LOAD Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.839000 audit: BPF prog-id=101 op=LOAD Oct 31 05:03:53.839000 audit: BPF prog-id=56 op=UNLOAD Oct 31 05:03:53.839000 audit: BPF prog-id=57 op=UNLOAD Oct 31 05:03:53.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:53.840000 audit: BPF prog-id=102 op=LOAD Oct 31 05:03:53.840000 audit: BPF prog-id=78 op=UNLOAD Oct 31 05:03:53.864452 systemd[1]: Stopping kubelet.service... Oct 31 05:03:53.891341 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 05:03:53.891664 systemd[1]: Stopped kubelet.service. Oct 31 05:03:53.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:53.891805 systemd[1]: kubelet.service: Consumed 1.572s CPU time. Oct 31 05:03:53.896251 systemd[1]: Starting kubelet.service... Oct 31 05:03:55.253194 systemd[1]: Started kubelet.service. Oct 31 05:03:55.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:03:55.354153 kubelet[2006]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 05:03:55.354779 kubelet[2006]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 05:03:55.354905 kubelet[2006]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 05:03:55.355145 kubelet[2006]: I1031 05:03:55.355094 2006 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 05:03:55.370401 kubelet[2006]: I1031 05:03:55.369569 2006 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Oct 31 05:03:55.370401 kubelet[2006]: I1031 05:03:55.369602 2006 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 05:03:55.370401 kubelet[2006]: I1031 05:03:55.369942 2006 server.go:954] "Client rotation is on, will bootstrap in background" Oct 31 05:03:55.378771 kubelet[2006]: I1031 05:03:55.378189 2006 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 31 05:03:55.390084 kubelet[2006]: I1031 05:03:55.390033 2006 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 05:03:55.396144 kubelet[2006]: E1031 05:03:55.396106 2006 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 05:03:55.396144 kubelet[2006]: I1031 05:03:55.396144 2006 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 31 05:03:55.400634 kubelet[2006]: I1031 05:03:55.400602 2006 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 31 05:03:55.401050 kubelet[2006]: I1031 05:03:55.400988 2006 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 05:03:55.401240 kubelet[2006]: I1031 05:03:55.401046 2006 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-cjebs.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 05:03:55.401459 kubelet[2006]: I1031 05:03:55.401248 2006 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 05:03:55.401459 kubelet[2006]: I1031 05:03:55.401263 2006 container_manager_linux.go:304] "Creating device plugin manager" Oct 31 05:03:55.401459 kubelet[2006]: I1031 05:03:55.401339 2006 state_mem.go:36] "Initialized new in-memory state store" Oct 31 05:03:55.401618 kubelet[2006]: I1031 05:03:55.401528 2006 kubelet.go:446] "Attempting to sync node with API server" Oct 31 05:03:55.401618 kubelet[2006]: I1031 05:03:55.401555 2006 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 05:03:55.401618 kubelet[2006]: I1031 05:03:55.401578 2006 kubelet.go:352] "Adding apiserver pod source" Oct 31 05:03:55.401618 kubelet[2006]: I1031 05:03:55.401592 2006 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 05:03:55.405027 kubelet[2006]: I1031 05:03:55.404985 2006 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 05:03:55.415688 kubelet[2006]: I1031 05:03:55.415650 2006 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Oct 31 05:03:55.418343 kubelet[2006]: I1031 05:03:55.418310 2006 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 31 05:03:55.418513 kubelet[2006]: I1031 05:03:55.418491 2006 server.go:1287] "Started kubelet" Oct 31 05:03:55.428154 kubelet[2006]: I1031 05:03:55.428121 2006 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 05:03:55.427000 audit[2006]: AVC avc: denied { mac_admin } for pid=2006 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:55.427000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:03:55.427000 audit[2006]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000af18f0 a1=c000b9dad0 a2=c000af18c0 a3=25 items=0 ppid=1 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:55.427000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:03:55.427000 audit[2006]: AVC avc: denied { mac_admin } for pid=2006 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:55.427000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:03:55.427000 audit[2006]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003665e0 a1=c000b9dae8 a2=c000af1980 a3=25 items=0 ppid=1 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:55.427000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:03:55.431379 kubelet[2006]: I1031 05:03:55.431346 2006 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 05:03:55.431582 kubelet[2006]: I1031 05:03:55.431557 2006 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 05:03:55.442496 kubelet[2006]: I1031 05:03:55.442420 2006 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 05:03:55.444575 kubelet[2006]: I1031 05:03:55.444243 2006 server.go:479] "Adding debug handlers to kubelet server" Oct 31 05:03:55.446444 kubelet[2006]: I1031 05:03:55.445637 2006 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 05:03:55.446444 kubelet[2006]: I1031 05:03:55.445913 2006 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 05:03:55.464863 kubelet[2006]: I1031 05:03:55.464094 2006 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 31 05:03:55.473247 kubelet[2006]: I1031 05:03:55.472510 2006 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 31 05:03:55.473247 kubelet[2006]: I1031 05:03:55.472583 2006 status_manager.go:227] "Starting to sync pod status with apiserver" Oct 31 05:03:55.473247 kubelet[2006]: I1031 05:03:55.472653 2006 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 05:03:55.473247 kubelet[2006]: I1031 05:03:55.472681 2006 kubelet.go:2382] "Starting kubelet main sync loop" Oct 31 05:03:55.473247 kubelet[2006]: E1031 05:03:55.472835 2006 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 31 05:03:55.474722 kubelet[2006]: I1031 05:03:55.474679 2006 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 05:03:55.479735 kubelet[2006]: I1031 05:03:55.479706 2006 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 31 05:03:55.483046 kubelet[2006]: I1031 05:03:55.482985 2006 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 31 05:03:55.484024 kubelet[2006]: I1031 05:03:55.483569 2006 reconciler.go:26] "Reconciler: start to sync state" Oct 31 05:03:55.492821 kubelet[2006]: I1031 05:03:55.492387 2006 factory.go:221] Registration of the systemd container factory successfully Oct 31 05:03:55.492821 kubelet[2006]: I1031 05:03:55.492624 2006 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 05:03:55.496840 kubelet[2006]: I1031 05:03:55.496812 2006 factory.go:221] Registration of the containerd container factory successfully Oct 31 05:03:55.498305 kubelet[2006]: E1031 05:03:55.498251 2006 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 31 05:03:55.591633 kubelet[2006]: E1031 05:03:55.591279 2006 kubelet.go:2406] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 31 05:03:55.598526 kubelet[2006]: I1031 05:03:55.597601 2006 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 05:03:55.598526 kubelet[2006]: I1031 05:03:55.597657 2006 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 05:03:55.598526 kubelet[2006]: I1031 05:03:55.597711 2006 state_mem.go:36] "Initialized new in-memory state store" Oct 31 05:03:55.598526 kubelet[2006]: I1031 05:03:55.598102 2006 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 31 05:03:55.598526 kubelet[2006]: I1031 05:03:55.598125 2006 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 31 05:03:55.598526 kubelet[2006]: I1031 05:03:55.598171 2006 policy_none.go:49] "None policy: Start" Oct 31 05:03:55.598526 kubelet[2006]: I1031 05:03:55.598230 2006 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 31 05:03:55.598526 kubelet[2006]: I1031 05:03:55.598264 2006 state_mem.go:35] "Initializing new in-memory state store" Oct 31 05:03:55.598526 kubelet[2006]: I1031 05:03:55.598524 2006 state_mem.go:75] "Updated machine memory state" Oct 31 05:03:55.603000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:03:55.603000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00036bae0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:03:55.603000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:03:55.604000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:03:55.604000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00036bca0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:03:55.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:03:55.605000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:03:55.605000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00036be60 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:03:55.605000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:03:55.609000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:03:55.609000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b76de0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:03:55.609000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:03:55.616838 kubelet[2006]: I1031 05:03:55.616788 2006 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 31 05:03:55.616000 audit[2006]: AVC avc: denied { mac_admin } for pid=2006 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:03:55.616000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:03:55.616000 audit[2006]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001114780 a1=c0004d6fc0 a2=c001114750 a3=25 items=0 ppid=1 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:03:55.616000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:03:55.617360 kubelet[2006]: I1031 05:03:55.616911 2006 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Oct 31 05:03:55.617360 kubelet[2006]: I1031 05:03:55.617196 2006 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 05:03:55.617360 kubelet[2006]: I1031 05:03:55.617223 2006 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 05:03:55.623869 kubelet[2006]: I1031 05:03:55.622610 2006 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 05:03:55.630181 kubelet[2006]: E1031 05:03:55.629205 2006 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 05:03:55.757000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526422 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 31 05:03:55.757000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e058c0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:03:55.757000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:03:55.770376 kubelet[2006]: I1031 05:03:55.770322 2006 kubelet_node_status.go:75] "Attempting to register node" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.789696 kubelet[2006]: I1031 05:03:55.789644 2006 kubelet_node_status.go:124] "Node was previously registered" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.789907 kubelet[2006]: I1031 05:03:55.789746 2006 kubelet_node_status.go:78] "Successfully registered node" node="srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.802424 kubelet[2006]: I1031 05:03:55.802394 2006 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.803492 kubelet[2006]: I1031 05:03:55.802941 2006 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.803889 kubelet[2006]: I1031 05:03:55.803106 2006 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.816301 kubelet[2006]: W1031 05:03:55.816251 2006 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 31 05:03:55.816578 kubelet[2006]: E1031 05:03:55.816540 2006 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-cjebs.gb1.brightbox.com\" already exists" pod="kube-system/kube-scheduler-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.818222 kubelet[2006]: W1031 05:03:55.818198 2006 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 31 05:03:55.818387 kubelet[2006]: E1031 05:03:55.818352 2006 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-cjebs.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.818628 kubelet[2006]: W1031 05:03:55.818584 2006 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 31 05:03:55.818827 kubelet[2006]: E1031 05:03:55.818747 2006 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-srv-cjebs.gb1.brightbox.com\" already exists" pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.886973 kubelet[2006]: I1031 05:03:55.886840 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0beb5d0099711e24c0a0401f0c1a28b1-ca-certs\") pod \"kube-controller-manager-srv-cjebs.gb1.brightbox.com\" (UID: \"0beb5d0099711e24c0a0401f0c1a28b1\") " pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.887253 kubelet[2006]: I1031 05:03:55.887216 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0beb5d0099711e24c0a0401f0c1a28b1-k8s-certs\") pod \"kube-controller-manager-srv-cjebs.gb1.brightbox.com\" (UID: \"0beb5d0099711e24c0a0401f0c1a28b1\") " pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.887449 kubelet[2006]: I1031 05:03:55.887406 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0beb5d0099711e24c0a0401f0c1a28b1-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-cjebs.gb1.brightbox.com\" (UID: \"0beb5d0099711e24c0a0401f0c1a28b1\") " pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.887617 kubelet[2006]: I1031 05:03:55.887589 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3a4e1d0c249173fcf6566deef8c8595d-kubeconfig\") pod \"kube-scheduler-srv-cjebs.gb1.brightbox.com\" (UID: \"3a4e1d0c249173fcf6566deef8c8595d\") " pod="kube-system/kube-scheduler-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.887839 kubelet[2006]: I1031 05:03:55.887796 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/72c7567a619a67b2c209c48625108546-k8s-certs\") pod \"kube-apiserver-srv-cjebs.gb1.brightbox.com\" (UID: \"72c7567a619a67b2c209c48625108546\") " pod="kube-system/kube-apiserver-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.888000 kubelet[2006]: I1031 05:03:55.887974 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/72c7567a619a67b2c209c48625108546-usr-share-ca-certificates\") pod \"kube-apiserver-srv-cjebs.gb1.brightbox.com\" (UID: \"72c7567a619a67b2c209c48625108546\") " pod="kube-system/kube-apiserver-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.888170 kubelet[2006]: I1031 05:03:55.888144 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/72c7567a619a67b2c209c48625108546-ca-certs\") pod \"kube-apiserver-srv-cjebs.gb1.brightbox.com\" (UID: \"72c7567a619a67b2c209c48625108546\") " pod="kube-system/kube-apiserver-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.888329 kubelet[2006]: I1031 05:03:55.888303 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0beb5d0099711e24c0a0401f0c1a28b1-flexvolume-dir\") pod \"kube-controller-manager-srv-cjebs.gb1.brightbox.com\" (UID: \"0beb5d0099711e24c0a0401f0c1a28b1\") " pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:55.888518 kubelet[2006]: I1031 05:03:55.888492 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0beb5d0099711e24c0a0401f0c1a28b1-kubeconfig\") pod \"kube-controller-manager-srv-cjebs.gb1.brightbox.com\" (UID: \"0beb5d0099711e24c0a0401f0c1a28b1\") " pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" Oct 31 05:03:56.414458 kubelet[2006]: I1031 05:03:56.414401 2006 apiserver.go:52] "Watching apiserver" Oct 31 05:03:56.484137 kubelet[2006]: I1031 05:03:56.484092 2006 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 31 05:03:56.587929 kubelet[2006]: I1031 05:03:56.587782 2006 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-cjebs.gb1.brightbox.com" podStartSLOduration=4.587701522 podStartE2EDuration="4.587701522s" podCreationTimestamp="2025-10-31 05:03:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:03:56.57353685 +0000 UTC m=+1.304429175" watchObservedRunningTime="2025-10-31 05:03:56.587701522 +0000 UTC m=+1.318593839" Oct 31 05:03:56.588333 kubelet[2006]: I1031 05:03:56.588293 2006 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-cjebs.gb1.brightbox.com" podStartSLOduration=4.588283789 podStartE2EDuration="4.588283789s" podCreationTimestamp="2025-10-31 05:03:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:03:56.588145988 +0000 UTC m=+1.319038310" watchObservedRunningTime="2025-10-31 05:03:56.588283789 +0000 UTC m=+1.319176117" Oct 31 05:03:56.604231 kubelet[2006]: I1031 05:03:56.604174 2006 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-cjebs.gb1.brightbox.com" podStartSLOduration=4.604156648 podStartE2EDuration="4.604156648s" podCreationTimestamp="2025-10-31 05:03:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:03:56.602551665 +0000 UTC m=+1.333443990" watchObservedRunningTime="2025-10-31 05:03:56.604156648 +0000 UTC m=+1.335048970" Oct 31 05:04:00.176147 kubelet[2006]: I1031 05:04:00.176092 2006 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 31 05:04:00.177376 env[1202]: time="2025-10-31T05:04:00.177284097Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 31 05:04:00.177876 kubelet[2006]: I1031 05:04:00.177652 2006 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 31 05:04:00.964480 systemd[1]: Created slice kubepods-besteffort-pod8c854d12_ae9e_44d5_9d8f_85136b2c9315.slice. Oct 31 05:04:01.021169 kubelet[2006]: I1031 05:04:01.021118 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-94trb\" (UniqueName: \"kubernetes.io/projected/8c854d12-ae9e-44d5-9d8f-85136b2c9315-kube-api-access-94trb\") pod \"kube-proxy-79zwt\" (UID: \"8c854d12-ae9e-44d5-9d8f-85136b2c9315\") " pod="kube-system/kube-proxy-79zwt" Oct 31 05:04:01.021469 kubelet[2006]: I1031 05:04:01.021439 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8c854d12-ae9e-44d5-9d8f-85136b2c9315-kube-proxy\") pod \"kube-proxy-79zwt\" (UID: \"8c854d12-ae9e-44d5-9d8f-85136b2c9315\") " pod="kube-system/kube-proxy-79zwt" Oct 31 05:04:01.021624 kubelet[2006]: I1031 05:04:01.021598 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8c854d12-ae9e-44d5-9d8f-85136b2c9315-xtables-lock\") pod \"kube-proxy-79zwt\" (UID: \"8c854d12-ae9e-44d5-9d8f-85136b2c9315\") " pod="kube-system/kube-proxy-79zwt" Oct 31 05:04:01.021787 kubelet[2006]: I1031 05:04:01.021740 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8c854d12-ae9e-44d5-9d8f-85136b2c9315-lib-modules\") pod \"kube-proxy-79zwt\" (UID: \"8c854d12-ae9e-44d5-9d8f-85136b2c9315\") " pod="kube-system/kube-proxy-79zwt" Oct 31 05:04:01.134156 kubelet[2006]: I1031 05:04:01.134050 2006 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 31 05:04:01.276090 env[1202]: time="2025-10-31T05:04:01.275975036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-79zwt,Uid:8c854d12-ae9e-44d5-9d8f-85136b2c9315,Namespace:kube-system,Attempt:0,}" Oct 31 05:04:01.300494 env[1202]: time="2025-10-31T05:04:01.300344922Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:04:01.300745 env[1202]: time="2025-10-31T05:04:01.300443788Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:04:01.300745 env[1202]: time="2025-10-31T05:04:01.300462091Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:04:01.301352 env[1202]: time="2025-10-31T05:04:01.300929528Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/034b4d938d053b4f4c63ea8a78389723c0274013f8c1ce17e3ed4e1fc1356158 pid=2059 runtime=io.containerd.runc.v2 Oct 31 05:04:01.363060 systemd[1]: run-containerd-runc-k8s.io-034b4d938d053b4f4c63ea8a78389723c0274013f8c1ce17e3ed4e1fc1356158-runc.LBrtIW.mount: Deactivated successfully. Oct 31 05:04:01.366034 systemd[1]: Started cri-containerd-034b4d938d053b4f4c63ea8a78389723c0274013f8c1ce17e3ed4e1fc1356158.scope. Oct 31 05:04:01.388235 systemd[1]: Created slice kubepods-besteffort-podab677656_1e1c_441e_9c86_cc4cbf73b31f.slice. Oct 31 05:04:01.424879 kubelet[2006]: I1031 05:04:01.424716 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ab677656-1e1c-441e-9c86-cc4cbf73b31f-var-lib-calico\") pod \"tigera-operator-7dcd859c48-8cdf4\" (UID: \"ab677656-1e1c-441e-9c86-cc4cbf73b31f\") " pod="tigera-operator/tigera-operator-7dcd859c48-8cdf4" Oct 31 05:04:01.424879 kubelet[2006]: I1031 05:04:01.424791 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lp2zd\" (UniqueName: \"kubernetes.io/projected/ab677656-1e1c-441e-9c86-cc4cbf73b31f-kube-api-access-lp2zd\") pod \"tigera-operator-7dcd859c48-8cdf4\" (UID: \"ab677656-1e1c-441e-9c86-cc4cbf73b31f\") " pod="tigera-operator/tigera-operator-7dcd859c48-8cdf4" Oct 31 05:04:01.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.430575 kernel: kauditd_printk_skb: 519 callbacks suppressed Oct 31 05:04:01.430687 kernel: audit: type=1400 audit(1761887041.424:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.441938 kernel: audit: type=1400 audit(1761887041.424:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.456067 kernel: audit: type=1400 audit(1761887041.424:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.456171 kernel: audit: type=1400 audit(1761887041.424:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.462817 kernel: audit: type=1400 audit(1761887041.424:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.468776 kernel: audit: type=1400 audit(1761887041.424:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.479346 kernel: audit: type=1400 audit(1761887041.424:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.479437 kernel: audit: type=1400 audit(1761887041.424:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.485788 kernel: audit: type=1400 audit(1761887041.424:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.488339 env[1202]: time="2025-10-31T05:04:01.488283059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-79zwt,Uid:8c854d12-ae9e-44d5-9d8f-85136b2c9315,Namespace:kube-system,Attempt:0,} returns sandbox id \"034b4d938d053b4f4c63ea8a78389723c0274013f8c1ce17e3ed4e1fc1356158\"" Oct 31 05:04:01.492314 kernel: audit: type=1400 audit(1761887041.424:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.493306 env[1202]: time="2025-10-31T05:04:01.493264957Z" level=info msg="CreateContainer within sandbox \"034b4d938d053b4f4c63ea8a78389723c0274013f8c1ce17e3ed4e1fc1356158\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 31 05:04:01.424000 audit: BPF prog-id=103 op=LOAD Oct 31 05:04:01.428000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.428000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2059 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346234643933386430353362346634633633656138613738333839 Oct 31 05:04:01.428000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.428000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2059 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346234643933386430353362346634633633656138613738333839 Oct 31 05:04:01.428000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.428000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.428000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.428000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.428000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.428000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.428000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.428000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.428000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.428000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.428000 audit: BPF prog-id=104 op=LOAD Oct 31 05:04:01.428000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000283100 items=0 ppid=2059 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346234643933386430353362346634633633656138613738333839 Oct 31 05:04:01.436000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.436000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.436000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.436000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.436000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.436000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.436000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.436000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.436000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.436000 audit: BPF prog-id=105 op=LOAD Oct 31 05:04:01.436000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000283148 items=0 ppid=2059 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346234643933386430353362346634633633656138613738333839 Oct 31 05:04:01.440000 audit: BPF prog-id=105 op=UNLOAD Oct 31 05:04:01.441000 audit: BPF prog-id=104 op=UNLOAD Oct 31 05:04:01.441000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.441000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.441000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.441000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.441000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.441000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.441000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.441000 audit[2070]: AVC avc: denied { perfmon } for pid=2070 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.441000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.441000 audit[2070]: AVC avc: denied { bpf } for pid=2070 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.441000 audit: BPF prog-id=106 op=LOAD Oct 31 05:04:01.441000 audit[2070]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000283558 items=0 ppid=2059 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346234643933386430353362346634633633656138613738333839 Oct 31 05:04:01.512865 env[1202]: time="2025-10-31T05:04:01.512809120Z" level=info msg="CreateContainer within sandbox \"034b4d938d053b4f4c63ea8a78389723c0274013f8c1ce17e3ed4e1fc1356158\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"907b6a44551c95c42cc27f5f01064a93149340610e032d44a2efd672a0bd2480\"" Oct 31 05:04:01.514481 env[1202]: time="2025-10-31T05:04:01.514443323Z" level=info msg="StartContainer for \"907b6a44551c95c42cc27f5f01064a93149340610e032d44a2efd672a0bd2480\"" Oct 31 05:04:01.554799 systemd[1]: Started cri-containerd-907b6a44551c95c42cc27f5f01064a93149340610e032d44a2efd672a0bd2480.scope. Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fbeb0b858f8 items=0 ppid=2059 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930376236613434353531633935633432636332376635663031303634 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit: BPF prog-id=107 op=LOAD Oct 31 05:04:01.595000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00017dd88 items=0 ppid=2059 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930376236613434353531633935633432636332376635663031303634 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.595000 audit: BPF prog-id=108 op=LOAD Oct 31 05:04:01.595000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00017ddd8 items=0 ppid=2059 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930376236613434353531633935633432636332376635663031303634 Oct 31 05:04:01.596000 audit: BPF prog-id=108 op=UNLOAD Oct 31 05:04:01.596000 audit: BPF prog-id=107 op=UNLOAD Oct 31 05:04:01.596000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.596000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.596000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.596000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.596000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.596000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.596000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.596000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.596000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.596000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.596000 audit: BPF prog-id=109 op=LOAD Oct 31 05:04:01.596000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00017de68 items=0 ppid=2059 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930376236613434353531633935633432636332376635663031303634 Oct 31 05:04:01.616611 env[1202]: time="2025-10-31T05:04:01.616544106Z" level=info msg="StartContainer for \"907b6a44551c95c42cc27f5f01064a93149340610e032d44a2efd672a0bd2480\" returns successfully" Oct 31 05:04:01.694142 env[1202]: time="2025-10-31T05:04:01.694078978Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-8cdf4,Uid:ab677656-1e1c-441e-9c86-cc4cbf73b31f,Namespace:tigera-operator,Attempt:0,}" Oct 31 05:04:01.717280 env[1202]: time="2025-10-31T05:04:01.717159571Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:04:01.717280 env[1202]: time="2025-10-31T05:04:01.717240726Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:04:01.717738 env[1202]: time="2025-10-31T05:04:01.717258361Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:04:01.718088 env[1202]: time="2025-10-31T05:04:01.717898021Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c9d93bee6e8bce2d58d8d6e1481c1e2a386bbd566c59497a68c8c7b189e1e4d9 pid=2135 runtime=io.containerd.runc.v2 Oct 31 05:04:01.740379 systemd[1]: Started cri-containerd-c9d93bee6e8bce2d58d8d6e1481c1e2a386bbd566c59497a68c8c7b189e1e4d9.scope. Oct 31 05:04:01.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.780000 audit: BPF prog-id=110 op=LOAD Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2135 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339643933626565366538626365326435386438643665313438316331 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2135 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339643933626565366538626365326435386438643665313438316331 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit: BPF prog-id=111 op=LOAD Oct 31 05:04:01.781000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d0490 items=0 ppid=2135 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339643933626565366538626365326435386438643665313438316331 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.781000 audit: BPF prog-id=112 op=LOAD Oct 31 05:04:01.781000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d04d8 items=0 ppid=2135 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339643933626565366538626365326435386438643665313438316331 Oct 31 05:04:01.781000 audit: BPF prog-id=112 op=UNLOAD Oct 31 05:04:01.781000 audit: BPF prog-id=111 op=UNLOAD Oct 31 05:04:01.782000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.782000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.782000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.782000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.782000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.782000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.782000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.782000 audit[2145]: AVC avc: denied { perfmon } for pid=2145 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.782000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.782000 audit[2145]: AVC avc: denied { bpf } for pid=2145 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:01.782000 audit: BPF prog-id=113 op=LOAD Oct 31 05:04:01.782000 audit[2145]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d08e8 items=0 ppid=2135 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:01.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339643933626565366538626365326435386438643665313438316331 Oct 31 05:04:01.824325 env[1202]: time="2025-10-31T05:04:01.824182039Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-8cdf4,Uid:ab677656-1e1c-441e-9c86-cc4cbf73b31f,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c9d93bee6e8bce2d58d8d6e1481c1e2a386bbd566c59497a68c8c7b189e1e4d9\"" Oct 31 05:04:01.830775 env[1202]: time="2025-10-31T05:04:01.829847042Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\"" Oct 31 05:04:02.091000 audit[2202]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.091000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7dd120c0 a2=0 a3=7ffd7dd120ac items=0 ppid=2114 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 05:04:02.093000 audit[2203]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.093000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6f6941d0 a2=0 a3=7ffc6f6941bc items=0 ppid=2114 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 05:04:02.095000 audit[2204]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.095000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd631439e0 a2=0 a3=7ffd631439cc items=0 ppid=2114 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 05:04:02.098000 audit[2205]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.098000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdae084360 a2=0 a3=7ffdae08434c items=0 ppid=2114 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.098000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 05:04:02.104000 audit[2206]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.104000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc41e39e80 a2=0 a3=7ffc41e39e6c items=0 ppid=2114 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.104000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 05:04:02.109000 audit[2207]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.109000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd38235e00 a2=0 a3=7ffd38235dec items=0 ppid=2114 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.109000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 05:04:02.200000 audit[2208]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.200000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc7a5b13f0 a2=0 a3=7ffc7a5b13dc items=0 ppid=2114 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 05:04:02.206000 audit[2210]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.206000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc6f790a70 a2=0 a3=7ffc6f790a5c items=0 ppid=2114 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 31 05:04:02.218000 audit[2213]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.218000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc85bb4e60 a2=0 a3=7ffc85bb4e4c items=0 ppid=2114 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 31 05:04:02.220000 audit[2214]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.220000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe71984140 a2=0 a3=7ffe7198412c items=0 ppid=2114 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 05:04:02.225000 audit[2216]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.225000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff0f42f810 a2=0 a3=7fff0f42f7fc items=0 ppid=2114 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 05:04:02.228000 audit[2217]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.228000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbe10ad30 a2=0 a3=7fffbe10ad1c items=0 ppid=2114 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 05:04:02.232000 audit[2219]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.232000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd650b8990 a2=0 a3=7ffd650b897c items=0 ppid=2114 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 05:04:02.237000 audit[2222]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.237000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcd0065da0 a2=0 a3=7ffcd0065d8c items=0 ppid=2114 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.237000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 31 05:04:02.240000 audit[2223]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.240000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdec91acf0 a2=0 a3=7ffdec91acdc items=0 ppid=2114 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.240000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 05:04:02.244000 audit[2225]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.244000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffc04d0d80 a2=0 a3=7fffc04d0d6c items=0 ppid=2114 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 05:04:02.246000 audit[2226]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.246000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc5181cb0 a2=0 a3=7ffcc5181c9c items=0 ppid=2114 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 05:04:02.250000 audit[2228]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.250000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd49425870 a2=0 a3=7ffd4942585c items=0 ppid=2114 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.250000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 05:04:02.259000 audit[2231]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.259000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe691a98c0 a2=0 a3=7ffe691a98ac items=0 ppid=2114 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 05:04:02.266000 audit[2234]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.266000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1be655e0 a2=0 a3=7ffe1be655cc items=0 ppid=2114 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 05:04:02.268000 audit[2235]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.268000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd7ea64620 a2=0 a3=7ffd7ea6460c items=0 ppid=2114 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 05:04:02.273000 audit[2237]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.273000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd48f5e330 a2=0 a3=7ffd48f5e31c items=0 ppid=2114 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:04:02.278000 audit[2240]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.278000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd530aa5b0 a2=0 a3=7ffd530aa59c items=0 ppid=2114 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.278000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:04:02.280000 audit[2241]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.280000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7540ddc0 a2=0 a3=7ffc7540ddac items=0 ppid=2114 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 05:04:02.285000 audit[2243]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:04:02.285000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd656b5100 a2=0 a3=7ffd656b50ec items=0 ppid=2114 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 05:04:02.326000 audit[2249]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:02.326000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff05edc0e0 a2=0 a3=7fff05edc0cc items=0 ppid=2114 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.326000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:02.337000 audit[2249]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:02.337000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff05edc0e0 a2=0 a3=7fff05edc0cc items=0 ppid=2114 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:02.339000 audit[2254]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.339000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc2e68f190 a2=0 a3=7ffc2e68f17c items=0 ppid=2114 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 05:04:02.343000 audit[2256]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.343000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffec56cd4c0 a2=0 a3=7ffec56cd4ac items=0 ppid=2114 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 31 05:04:02.350000 audit[2259]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.350000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcf9a36230 a2=0 a3=7ffcf9a3621c items=0 ppid=2114 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 31 05:04:02.352000 audit[2260]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.352000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff88941840 a2=0 a3=7fff8894182c items=0 ppid=2114 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 05:04:02.357000 audit[2262]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.357000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd608cd4f0 a2=0 a3=7ffd608cd4dc items=0 ppid=2114 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.357000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 05:04:02.359000 audit[2263]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.359000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb7237ed0 a2=0 a3=7ffeb7237ebc items=0 ppid=2114 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.359000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 05:04:02.363000 audit[2265]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.363000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcc9e6bfa0 a2=0 a3=7ffcc9e6bf8c items=0 ppid=2114 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 31 05:04:02.369000 audit[2268]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.369000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc052dd200 a2=0 a3=7ffc052dd1ec items=0 ppid=2114 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 05:04:02.371000 audit[2269]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.371000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc8a4dd00 a2=0 a3=7ffdc8a4dcec items=0 ppid=2114 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 05:04:02.375000 audit[2271]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.375000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb8c82d70 a2=0 a3=7ffeb8c82d5c items=0 ppid=2114 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 05:04:02.377000 audit[2272]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.377000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc2229460 a2=0 a3=7fffc222944c items=0 ppid=2114 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 05:04:02.381000 audit[2274]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.381000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc62f920c0 a2=0 a3=7ffc62f920ac items=0 ppid=2114 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 05:04:02.387000 audit[2277]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.387000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff87e6ac00 a2=0 a3=7fff87e6abec items=0 ppid=2114 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.387000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 05:04:02.395000 audit[2280]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.395000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc19a9be80 a2=0 a3=7ffc19a9be6c items=0 ppid=2114 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 31 05:04:02.396000 audit[2281]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.396000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd71b951f0 a2=0 a3=7ffd71b951dc items=0 ppid=2114 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.396000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 05:04:02.400000 audit[2283]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.400000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff169cd6f0 a2=0 a3=7fff169cd6dc items=0 ppid=2114 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:04:02.406000 audit[2286]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.406000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeb26c74b0 a2=0 a3=7ffeb26c749c items=0 ppid=2114 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.406000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:04:02.408000 audit[2288]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.408000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff196b0250 a2=0 a3=7fff196b023c items=0 ppid=2114 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 05:04:02.413000 audit[2290]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.413000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff6f8291a0 a2=0 a3=7fff6f82918c items=0 ppid=2114 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 05:04:02.415000 audit[2291]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.415000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4cae16e0 a2=0 a3=7ffe4cae16cc items=0 ppid=2114 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 05:04:02.419000 audit[2293]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.419000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff6a235c00 a2=0 a3=7fff6a235bec items=0 ppid=2114 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.419000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 05:04:02.424000 audit[2296]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:04:02.424000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdaa09d090 a2=0 a3=7ffdaa09d07c items=0 ppid=2114 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 05:04:02.428000 audit[2298]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 05:04:02.428000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffc2bd7020 a2=0 a3=7fffc2bd700c items=0 ppid=2114 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.428000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:02.429000 audit[2298]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 05:04:02.429000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffc2bd7020 a2=0 a3=7fffc2bd700c items=0 ppid=2114 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:02.429000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:02.570525 kubelet[2006]: I1031 05:04:02.570453 2006 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-79zwt" podStartSLOduration=2.570433403 podStartE2EDuration="2.570433403s" podCreationTimestamp="2025-10-31 05:04:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:04:02.569434516 +0000 UTC m=+7.300326853" watchObservedRunningTime="2025-10-31 05:04:02.570433403 +0000 UTC m=+7.301325727" Oct 31 05:04:04.134471 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2004509401.mount: Deactivated successfully. Oct 31 05:04:05.597696 env[1202]: time="2025-10-31T05:04:05.597614926Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:05.602196 env[1202]: time="2025-10-31T05:04:05.602155564Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:05.605507 env[1202]: time="2025-10-31T05:04:05.605452664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:05.610526 env[1202]: time="2025-10-31T05:04:05.610488419Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:1b629a1403f5b6d7243f7dd523d04b8a50352a33c1d4d6970b6002a8733acf2e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:05.611166 env[1202]: time="2025-10-31T05:04:05.611128349Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\" returns image reference \"sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1\"" Oct 31 05:04:05.617033 env[1202]: time="2025-10-31T05:04:05.616977817Z" level=info msg="CreateContainer within sandbox \"c9d93bee6e8bce2d58d8d6e1481c1e2a386bbd566c59497a68c8c7b189e1e4d9\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 31 05:04:05.632048 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2837417590.mount: Deactivated successfully. Oct 31 05:04:05.645315 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3983688668.mount: Deactivated successfully. Oct 31 05:04:05.650177 env[1202]: time="2025-10-31T05:04:05.650107785Z" level=info msg="CreateContainer within sandbox \"c9d93bee6e8bce2d58d8d6e1481c1e2a386bbd566c59497a68c8c7b189e1e4d9\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"8dfd5992c747d9983430dd8fdbdca5c2728e312fbd8b8d7ec3c3deff779204cc\"" Oct 31 05:04:05.652927 env[1202]: time="2025-10-31T05:04:05.652889065Z" level=info msg="StartContainer for \"8dfd5992c747d9983430dd8fdbdca5c2728e312fbd8b8d7ec3c3deff779204cc\"" Oct 31 05:04:05.679673 systemd[1]: Started cri-containerd-8dfd5992c747d9983430dd8fdbdca5c2728e312fbd8b8d7ec3c3deff779204cc.scope. Oct 31 05:04:05.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit: BPF prog-id=114 op=LOAD Oct 31 05:04:05.711000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2135 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:05.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864666435393932633734376439393833343330646438666462646361 Oct 31 05:04:05.711000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=2135 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:05.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864666435393932633734376439393833343330646438666462646361 Oct 31 05:04:05.711000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.711000 audit: BPF prog-id=115 op=LOAD Oct 31 05:04:05.711000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c000349d00 items=0 ppid=2135 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:05.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864666435393932633734376439393833343330646438666462646361 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit: BPF prog-id=116 op=LOAD Oct 31 05:04:05.712000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000349d48 items=0 ppid=2135 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:05.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864666435393932633734376439393833343330646438666462646361 Oct 31 05:04:05.712000 audit: BPF prog-id=116 op=UNLOAD Oct 31 05:04:05.712000 audit: BPF prog-id=115 op=UNLOAD Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:05.712000 audit: BPF prog-id=117 op=LOAD Oct 31 05:04:05.712000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00039e158 items=0 ppid=2135 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:05.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864666435393932633734376439393833343330646438666462646361 Oct 31 05:04:05.750363 env[1202]: time="2025-10-31T05:04:05.749843889Z" level=info msg="StartContainer for \"8dfd5992c747d9983430dd8fdbdca5c2728e312fbd8b8d7ec3c3deff779204cc\" returns successfully" Oct 31 05:04:06.594520 kubelet[2006]: I1031 05:04:06.594442 2006 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7dcd859c48-8cdf4" podStartSLOduration=1.809676794 podStartE2EDuration="5.594408052s" podCreationTimestamp="2025-10-31 05:04:01 +0000 UTC" firstStartedPulling="2025-10-31 05:04:01.82841785 +0000 UTC m=+6.559310170" lastFinishedPulling="2025-10-31 05:04:05.613149116 +0000 UTC m=+10.344041428" observedRunningTime="2025-10-31 05:04:06.578349718 +0000 UTC m=+11.309242050" watchObservedRunningTime="2025-10-31 05:04:06.594408052 +0000 UTC m=+11.325300374" Oct 31 05:04:12.945903 sudo[1383]: pam_unix(sudo:session): session closed for user root Oct 31 05:04:12.958795 kernel: kauditd_printk_skb: 357 callbacks suppressed Oct 31 05:04:12.959478 kernel: audit: type=1106 audit(1761887052.945:808): pid=1383 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:04:12.945000 audit[1383]: USER_END pid=1383 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:04:12.945000 audit[1383]: CRED_DISP pid=1383 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:04:12.966175 kernel: audit: type=1104 audit(1761887052.945:809): pid=1383 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:04:13.127918 sshd[1380]: pam_unix(sshd:session): session closed for user core Oct 31 05:04:13.134000 audit[1380]: USER_END pid=1380 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:04:13.144937 kernel: audit: type=1106 audit(1761887053.134:810): pid=1380 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:04:13.147446 systemd-logind[1193]: Session 9 logged out. Waiting for processes to exit. Oct 31 05:04:13.149376 systemd[1]: sshd@8-10.230.52.158:22-139.178.68.195:35970.service: Deactivated successfully. Oct 31 05:04:13.150466 systemd[1]: session-9.scope: Deactivated successfully. Oct 31 05:04:13.150706 systemd[1]: session-9.scope: Consumed 7.101s CPU time. Oct 31 05:04:13.159083 kernel: audit: type=1104 audit(1761887053.143:811): pid=1380 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:04:13.143000 audit[1380]: CRED_DISP pid=1380 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:04:13.158416 systemd-logind[1193]: Removed session 9. Oct 31 05:04:13.168028 kernel: audit: type=1131 audit(1761887053.149:812): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.52.158:22-139.178.68.195:35970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:04:13.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.52.158:22-139.178.68.195:35970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:04:14.161000 audit[2385]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:14.176394 kernel: audit: type=1325 audit(1761887054.161:813): table=filter:89 family=2 entries=14 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:14.176519 kernel: audit: type=1300 audit(1761887054.161:813): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd19824290 a2=0 a3=7ffd1982427c items=0 ppid=2114 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:14.161000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd19824290 a2=0 a3=7ffd1982427c items=0 ppid=2114 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:14.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:14.182795 kernel: audit: type=1327 audit(1761887054.161:813): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:14.185000 audit[2385]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:14.190783 kernel: audit: type=1325 audit(1761887054.185:814): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:14.185000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd19824290 a2=0 a3=0 items=0 ppid=2114 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:14.200804 kernel: audit: type=1300 audit(1761887054.185:814): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd19824290 a2=0 a3=0 items=0 ppid=2114 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:14.185000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:14.234000 audit[2387]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:14.234000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdb8860ff0 a2=0 a3=7ffdb8860fdc items=0 ppid=2114 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:14.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:14.238000 audit[2387]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:14.238000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb8860ff0 a2=0 a3=0 items=0 ppid=2114 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:14.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:17.154000 audit[2390]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:17.154000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff83907d30 a2=0 a3=7fff83907d1c items=0 ppid=2114 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:17.154000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:17.161000 audit[2390]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:17.161000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff83907d30 a2=0 a3=0 items=0 ppid=2114 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:17.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:17.185000 audit[2392]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:17.185000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fffb54f7ae0 a2=0 a3=7fffb54f7acc items=0 ppid=2114 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:17.185000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:17.193000 audit[2392]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:17.193000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffb54f7ae0 a2=0 a3=0 items=0 ppid=2114 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:17.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:18.219847 kernel: kauditd_printk_skb: 19 callbacks suppressed Oct 31 05:04:18.220192 kernel: audit: type=1325 audit(1761887058.214:821): table=filter:97 family=2 entries=19 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:18.214000 audit[2395]: NETFILTER_CFG table=filter:97 family=2 entries=19 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:18.214000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc4a295580 a2=0 a3=7ffc4a29556c items=0 ppid=2114 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:18.244135 kernel: audit: type=1300 audit(1761887058.214:821): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc4a295580 a2=0 a3=7ffc4a29556c items=0 ppid=2114 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:18.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:18.245000 audit[2395]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:18.253234 kernel: audit: type=1327 audit(1761887058.214:821): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:18.253309 kernel: audit: type=1325 audit(1761887058.245:822): table=nat:98 family=2 entries=12 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:18.245000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc4a295580 a2=0 a3=0 items=0 ppid=2114 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:18.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:18.275333 kernel: audit: type=1300 audit(1761887058.245:822): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc4a295580 a2=0 a3=0 items=0 ppid=2114 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:18.275430 kernel: audit: type=1327 audit(1761887058.245:822): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:19.309000 audit[2397]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:19.318787 kernel: audit: type=1325 audit(1761887059.309:823): table=filter:99 family=2 entries=21 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:19.309000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe0ce62770 a2=0 a3=7ffe0ce6275c items=0 ppid=2114 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:19.331843 kernel: audit: type=1300 audit(1761887059.309:823): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe0ce62770 a2=0 a3=7ffe0ce6275c items=0 ppid=2114 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:19.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:19.337794 kernel: audit: type=1327 audit(1761887059.309:823): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:19.337000 audit[2397]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:19.363776 kernel: audit: type=1325 audit(1761887059.337:824): table=nat:100 family=2 entries=12 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:19.337000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe0ce62770 a2=0 a3=0 items=0 ppid=2114 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:19.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:19.374373 kubelet[2006]: I1031 05:04:19.374331 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d80dd1e6-60ef-4eea-877b-8046f54262b0-tigera-ca-bundle\") pod \"calico-typha-57499ddc45-8b8t6\" (UID: \"d80dd1e6-60ef-4eea-877b-8046f54262b0\") " pod="calico-system/calico-typha-57499ddc45-8b8t6" Oct 31 05:04:19.375031 kubelet[2006]: I1031 05:04:19.375002 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d80dd1e6-60ef-4eea-877b-8046f54262b0-typha-certs\") pod \"calico-typha-57499ddc45-8b8t6\" (UID: \"d80dd1e6-60ef-4eea-877b-8046f54262b0\") " pod="calico-system/calico-typha-57499ddc45-8b8t6" Oct 31 05:04:19.375210 kubelet[2006]: I1031 05:04:19.375184 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4b6sz\" (UniqueName: \"kubernetes.io/projected/d80dd1e6-60ef-4eea-877b-8046f54262b0-kube-api-access-4b6sz\") pod \"calico-typha-57499ddc45-8b8t6\" (UID: \"d80dd1e6-60ef-4eea-877b-8046f54262b0\") " pod="calico-system/calico-typha-57499ddc45-8b8t6" Oct 31 05:04:19.375343 systemd[1]: Created slice kubepods-besteffort-podd80dd1e6_60ef_4eea_877b_8046f54262b0.slice. Oct 31 05:04:19.672408 systemd[1]: Created slice kubepods-besteffort-pod243adc6d_df4d_479b_9b38_0a2d0710dcb2.slice. Oct 31 05:04:19.677168 kubelet[2006]: I1031 05:04:19.677135 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/243adc6d-df4d-479b-9b38-0a2d0710dcb2-node-certs\") pod \"calico-node-jqtzb\" (UID: \"243adc6d-df4d-479b-9b38-0a2d0710dcb2\") " pod="calico-system/calico-node-jqtzb" Oct 31 05:04:19.677463 kubelet[2006]: I1031 05:04:19.677436 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/243adc6d-df4d-479b-9b38-0a2d0710dcb2-cni-net-dir\") pod \"calico-node-jqtzb\" (UID: \"243adc6d-df4d-479b-9b38-0a2d0710dcb2\") " pod="calico-system/calico-node-jqtzb" Oct 31 05:04:19.677622 kubelet[2006]: I1031 05:04:19.677595 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/243adc6d-df4d-479b-9b38-0a2d0710dcb2-var-lib-calico\") pod \"calico-node-jqtzb\" (UID: \"243adc6d-df4d-479b-9b38-0a2d0710dcb2\") " pod="calico-system/calico-node-jqtzb" Oct 31 05:04:19.677827 kubelet[2006]: I1031 05:04:19.677740 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/243adc6d-df4d-479b-9b38-0a2d0710dcb2-policysync\") pod \"calico-node-jqtzb\" (UID: \"243adc6d-df4d-479b-9b38-0a2d0710dcb2\") " pod="calico-system/calico-node-jqtzb" Oct 31 05:04:19.677971 kubelet[2006]: I1031 05:04:19.677933 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j7d9z\" (UniqueName: \"kubernetes.io/projected/243adc6d-df4d-479b-9b38-0a2d0710dcb2-kube-api-access-j7d9z\") pod \"calico-node-jqtzb\" (UID: \"243adc6d-df4d-479b-9b38-0a2d0710dcb2\") " pod="calico-system/calico-node-jqtzb" Oct 31 05:04:19.678123 kubelet[2006]: I1031 05:04:19.678096 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/243adc6d-df4d-479b-9b38-0a2d0710dcb2-flexvol-driver-host\") pod \"calico-node-jqtzb\" (UID: \"243adc6d-df4d-479b-9b38-0a2d0710dcb2\") " pod="calico-system/calico-node-jqtzb" Oct 31 05:04:19.678271 kubelet[2006]: I1031 05:04:19.678228 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/243adc6d-df4d-479b-9b38-0a2d0710dcb2-var-run-calico\") pod \"calico-node-jqtzb\" (UID: \"243adc6d-df4d-479b-9b38-0a2d0710dcb2\") " pod="calico-system/calico-node-jqtzb" Oct 31 05:04:19.678440 kubelet[2006]: I1031 05:04:19.678408 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/243adc6d-df4d-479b-9b38-0a2d0710dcb2-cni-log-dir\") pod \"calico-node-jqtzb\" (UID: \"243adc6d-df4d-479b-9b38-0a2d0710dcb2\") " pod="calico-system/calico-node-jqtzb" Oct 31 05:04:19.678654 kubelet[2006]: I1031 05:04:19.678628 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/243adc6d-df4d-479b-9b38-0a2d0710dcb2-lib-modules\") pod \"calico-node-jqtzb\" (UID: \"243adc6d-df4d-479b-9b38-0a2d0710dcb2\") " pod="calico-system/calico-node-jqtzb" Oct 31 05:04:19.678826 kubelet[2006]: I1031 05:04:19.678796 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/243adc6d-df4d-479b-9b38-0a2d0710dcb2-cni-bin-dir\") pod \"calico-node-jqtzb\" (UID: \"243adc6d-df4d-479b-9b38-0a2d0710dcb2\") " pod="calico-system/calico-node-jqtzb" Oct 31 05:04:19.678993 kubelet[2006]: I1031 05:04:19.678967 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/243adc6d-df4d-479b-9b38-0a2d0710dcb2-tigera-ca-bundle\") pod \"calico-node-jqtzb\" (UID: \"243adc6d-df4d-479b-9b38-0a2d0710dcb2\") " pod="calico-system/calico-node-jqtzb" Oct 31 05:04:19.679149 kubelet[2006]: I1031 05:04:19.679115 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/243adc6d-df4d-479b-9b38-0a2d0710dcb2-xtables-lock\") pod \"calico-node-jqtzb\" (UID: \"243adc6d-df4d-479b-9b38-0a2d0710dcb2\") " pod="calico-system/calico-node-jqtzb" Oct 31 05:04:19.685566 env[1202]: time="2025-10-31T05:04:19.684888064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57499ddc45-8b8t6,Uid:d80dd1e6-60ef-4eea-877b-8046f54262b0,Namespace:calico-system,Attempt:0,}" Oct 31 05:04:19.724761 env[1202]: time="2025-10-31T05:04:19.724644773Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:04:19.725013 env[1202]: time="2025-10-31T05:04:19.724772017Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:04:19.725013 env[1202]: time="2025-10-31T05:04:19.724835023Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:04:19.725199 env[1202]: time="2025-10-31T05:04:19.725118244Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7e46243b54a4e38dea81df14cd7820d4071f6fd2f70e2ef4befe8d69090770df pid=2406 runtime=io.containerd.runc.v2 Oct 31 05:04:19.765892 systemd[1]: Started cri-containerd-7e46243b54a4e38dea81df14cd7820d4071f6fd2f70e2ef4befe8d69090770df.scope. Oct 31 05:04:19.788551 kubelet[2006]: E1031 05:04:19.788507 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.788795 kubelet[2006]: W1031 05:04:19.788762 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.789900 kubelet[2006]: E1031 05:04:19.789876 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.790031 kubelet[2006]: W1031 05:04:19.790006 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.790519 kubelet[2006]: E1031 05:04:19.790488 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.790662 kubelet[2006]: E1031 05:04:19.790637 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.814683 kubelet[2006]: E1031 05:04:19.814646 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.814927 kubelet[2006]: W1031 05:04:19.814896 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.815051 kubelet[2006]: E1031 05:04:19.815026 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.906254 kubelet[2006]: E1031 05:04:19.906194 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:04:19.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.906000 audit: BPF prog-id=118 op=LOAD Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2406 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:19.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343632343362353461346533386465613831646631346364373832 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2406 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:19.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343632343362353461346533386465613831646631346364373832 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit: BPF prog-id=119 op=LOAD Oct 31 05:04:19.908000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002908e0 items=0 ppid=2406 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:19.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343632343362353461346533386465613831646631346364373832 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit: BPF prog-id=120 op=LOAD Oct 31 05:04:19.908000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000290928 items=0 ppid=2406 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:19.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343632343362353461346533386465613831646631346364373832 Oct 31 05:04:19.908000 audit: BPF prog-id=120 op=UNLOAD Oct 31 05:04:19.908000 audit: BPF prog-id=119 op=UNLOAD Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:19.908000 audit: BPF prog-id=121 op=LOAD Oct 31 05:04:19.908000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000290d38 items=0 ppid=2406 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:19.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765343632343362353461346533386465613831646631346364373832 Oct 31 05:04:19.975458 env[1202]: time="2025-10-31T05:04:19.975308666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57499ddc45-8b8t6,Uid:d80dd1e6-60ef-4eea-877b-8046f54262b0,Namespace:calico-system,Attempt:0,} returns sandbox id \"7e46243b54a4e38dea81df14cd7820d4071f6fd2f70e2ef4befe8d69090770df\"" Oct 31 05:04:19.977399 env[1202]: time="2025-10-31T05:04:19.977367238Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\"" Oct 31 05:04:19.979303 kubelet[2006]: E1031 05:04:19.979276 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.979468 kubelet[2006]: W1031 05:04:19.979441 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.979622 kubelet[2006]: E1031 05:04:19.979596 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.979936 env[1202]: time="2025-10-31T05:04:19.979899055Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jqtzb,Uid:243adc6d-df4d-479b-9b38-0a2d0710dcb2,Namespace:calico-system,Attempt:0,}" Oct 31 05:04:19.980355 kubelet[2006]: E1031 05:04:19.980333 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.980881 kubelet[2006]: W1031 05:04:19.980856 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.981033 kubelet[2006]: E1031 05:04:19.980999 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.981399 kubelet[2006]: E1031 05:04:19.981378 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.981539 kubelet[2006]: W1031 05:04:19.981515 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.981693 kubelet[2006]: E1031 05:04:19.981669 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.982276 kubelet[2006]: E1031 05:04:19.982242 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.982402 kubelet[2006]: W1031 05:04:19.982378 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.982548 kubelet[2006]: E1031 05:04:19.982523 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.982958 kubelet[2006]: E1031 05:04:19.982938 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.983091 kubelet[2006]: W1031 05:04:19.983067 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.983255 kubelet[2006]: E1031 05:04:19.983220 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.983654 kubelet[2006]: E1031 05:04:19.983633 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.983797 kubelet[2006]: W1031 05:04:19.983764 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.983961 kubelet[2006]: E1031 05:04:19.983936 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.988109 kubelet[2006]: E1031 05:04:19.988068 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.988246 kubelet[2006]: W1031 05:04:19.988222 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.988507 kubelet[2006]: E1031 05:04:19.988450 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.989211 kubelet[2006]: E1031 05:04:19.989190 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.989361 kubelet[2006]: W1031 05:04:19.989324 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.989533 kubelet[2006]: E1031 05:04:19.989508 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.992075 kubelet[2006]: E1031 05:04:19.992044 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.992219 kubelet[2006]: W1031 05:04:19.992194 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.992398 kubelet[2006]: E1031 05:04:19.992363 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.992866 kubelet[2006]: E1031 05:04:19.992847 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.993022 kubelet[2006]: W1031 05:04:19.992999 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.993223 kubelet[2006]: E1031 05:04:19.993190 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.993618 kubelet[2006]: E1031 05:04:19.993598 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.993744 kubelet[2006]: W1031 05:04:19.993720 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.993935 kubelet[2006]: E1031 05:04:19.993911 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.994376 kubelet[2006]: E1031 05:04:19.994357 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.994557 kubelet[2006]: W1031 05:04:19.994532 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.994714 kubelet[2006]: E1031 05:04:19.994691 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.995194 kubelet[2006]: E1031 05:04:19.995175 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.995357 kubelet[2006]: W1031 05:04:19.995334 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.995543 kubelet[2006]: E1031 05:04:19.995520 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.998272 kubelet[2006]: E1031 05:04:19.998250 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.998428 kubelet[2006]: W1031 05:04:19.998403 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.998598 kubelet[2006]: E1031 05:04:19.998573 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:19.999028 kubelet[2006]: E1031 05:04:19.999007 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:19.999296 kubelet[2006]: W1031 05:04:19.999166 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:19.999465 kubelet[2006]: E1031 05:04:19.999441 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.001232 kubelet[2006]: E1031 05:04:20.001211 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.001656 kubelet[2006]: W1031 05:04:20.001631 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.001798 kubelet[2006]: E1031 05:04:20.001773 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.002264 kubelet[2006]: E1031 05:04:20.002238 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.002391 kubelet[2006]: W1031 05:04:20.002367 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.002532 kubelet[2006]: E1031 05:04:20.002508 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.003993 kubelet[2006]: E1031 05:04:20.003971 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.004164 kubelet[2006]: W1031 05:04:20.004132 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.004312 kubelet[2006]: E1031 05:04:20.004288 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.004696 kubelet[2006]: E1031 05:04:20.004674 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.004856 kubelet[2006]: W1031 05:04:20.004820 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.004980 kubelet[2006]: E1031 05:04:20.004957 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.005332 kubelet[2006]: E1031 05:04:20.005312 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.005450 kubelet[2006]: W1031 05:04:20.005428 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.005589 kubelet[2006]: E1031 05:04:20.005566 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.006982 kubelet[2006]: E1031 05:04:20.006960 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.007102 kubelet[2006]: W1031 05:04:20.007078 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.007244 kubelet[2006]: E1031 05:04:20.007220 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.007387 kubelet[2006]: I1031 05:04:20.007357 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hgdhp\" (UniqueName: \"kubernetes.io/projected/f35619da-c214-4156-aacf-d0404664f402-kube-api-access-hgdhp\") pod \"csi-node-driver-mtt9j\" (UID: \"f35619da-c214-4156-aacf-d0404664f402\") " pod="calico-system/csi-node-driver-mtt9j" Oct 31 05:04:20.009980 env[1202]: time="2025-10-31T05:04:20.008495220Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:04:20.009980 env[1202]: time="2025-10-31T05:04:20.008943625Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:04:20.009980 env[1202]: time="2025-10-31T05:04:20.009005893Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:04:20.009980 env[1202]: time="2025-10-31T05:04:20.009256372Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/efb6af060a98507f06238d8ce03f6dc665e6bbe28d19f797184889c26628ab3b pid=2469 runtime=io.containerd.runc.v2 Oct 31 05:04:20.010260 kubelet[2006]: E1031 05:04:20.009799 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.010260 kubelet[2006]: W1031 05:04:20.009817 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.010260 kubelet[2006]: E1031 05:04:20.009841 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.010566 kubelet[2006]: E1031 05:04:20.010545 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.010683 kubelet[2006]: W1031 05:04:20.010660 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.010867 kubelet[2006]: E1031 05:04:20.010832 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.011174 kubelet[2006]: E1031 05:04:20.011153 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.011303 kubelet[2006]: W1031 05:04:20.011280 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.011517 kubelet[2006]: E1031 05:04:20.011492 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.011657 kubelet[2006]: I1031 05:04:20.011632 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f35619da-c214-4156-aacf-d0404664f402-kubelet-dir\") pod \"csi-node-driver-mtt9j\" (UID: \"f35619da-c214-4156-aacf-d0404664f402\") " pod="calico-system/csi-node-driver-mtt9j" Oct 31 05:04:20.015780 kubelet[2006]: E1031 05:04:20.013738 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.015780 kubelet[2006]: W1031 05:04:20.013774 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.015780 kubelet[2006]: E1031 05:04:20.013802 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.019937 kubelet[2006]: E1031 05:04:20.019896 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.019937 kubelet[2006]: W1031 05:04:20.019929 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.020216 kubelet[2006]: E1031 05:04:20.020183 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.020370 kubelet[2006]: E1031 05:04:20.020265 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.020528 kubelet[2006]: W1031 05:04:20.020502 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.020676 kubelet[2006]: E1031 05:04:20.020652 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.020917 kubelet[2006]: I1031 05:04:20.020882 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f35619da-c214-4156-aacf-d0404664f402-registration-dir\") pod \"csi-node-driver-mtt9j\" (UID: \"f35619da-c214-4156-aacf-d0404664f402\") " pod="calico-system/csi-node-driver-mtt9j" Oct 31 05:04:20.022922 kubelet[2006]: E1031 05:04:20.022898 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.022922 kubelet[2006]: W1031 05:04:20.022919 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.023095 kubelet[2006]: E1031 05:04:20.023021 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.023311 kubelet[2006]: E1031 05:04:20.023276 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.023311 kubelet[2006]: W1031 05:04:20.023296 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.023311 kubelet[2006]: E1031 05:04:20.023312 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.023848 kubelet[2006]: E1031 05:04:20.023816 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.023848 kubelet[2006]: W1031 05:04:20.023834 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.023986 kubelet[2006]: E1031 05:04:20.023853 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.023986 kubelet[2006]: I1031 05:04:20.023885 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f35619da-c214-4156-aacf-d0404664f402-varrun\") pod \"csi-node-driver-mtt9j\" (UID: \"f35619da-c214-4156-aacf-d0404664f402\") " pod="calico-system/csi-node-driver-mtt9j" Oct 31 05:04:20.024202 kubelet[2006]: E1031 05:04:20.024149 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.024202 kubelet[2006]: W1031 05:04:20.024171 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.024202 kubelet[2006]: E1031 05:04:20.024187 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.024888 kubelet[2006]: I1031 05:04:20.024208 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f35619da-c214-4156-aacf-d0404664f402-socket-dir\") pod \"csi-node-driver-mtt9j\" (UID: \"f35619da-c214-4156-aacf-d0404664f402\") " pod="calico-system/csi-node-driver-mtt9j" Oct 31 05:04:20.025795 kubelet[2006]: E1031 05:04:20.025744 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.025795 kubelet[2006]: W1031 05:04:20.025791 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.026013 kubelet[2006]: E1031 05:04:20.025819 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.026293 kubelet[2006]: E1031 05:04:20.026268 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.026293 kubelet[2006]: W1031 05:04:20.026287 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.026524 kubelet[2006]: E1031 05:04:20.026455 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.029232 kubelet[2006]: E1031 05:04:20.029203 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.029232 kubelet[2006]: W1031 05:04:20.029224 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.029353 kubelet[2006]: E1031 05:04:20.029242 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.029956 kubelet[2006]: E1031 05:04:20.029931 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.029956 kubelet[2006]: W1031 05:04:20.029950 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.030164 kubelet[2006]: E1031 05:04:20.029966 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.041830 systemd[1]: Started cri-containerd-efb6af060a98507f06238d8ce03f6dc665e6bbe28d19f797184889c26628ab3b.scope. Oct 31 05:04:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.097000 audit: BPF prog-id=122 op=LOAD Oct 31 05:04:20.099000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.099000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2469 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:20.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623661663036306139383530376630363233386438636530336636 Oct 31 05:04:20.099000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.099000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2469 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:20.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623661663036306139383530376630363233386438636530336636 Oct 31 05:04:20.100000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.100000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.100000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.100000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.100000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.100000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.100000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.100000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.100000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.100000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.100000 audit: BPF prog-id=123 op=LOAD Oct 31 05:04:20.100000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000309200 items=0 ppid=2469 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:20.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623661663036306139383530376630363233386438636530336636 Oct 31 05:04:20.101000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.101000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.101000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.101000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.101000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.101000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.101000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.101000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.101000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.101000 audit: BPF prog-id=124 op=LOAD Oct 31 05:04:20.101000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000309248 items=0 ppid=2469 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:20.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623661663036306139383530376630363233386438636530336636 Oct 31 05:04:20.102000 audit: BPF prog-id=124 op=UNLOAD Oct 31 05:04:20.102000 audit: BPF prog-id=123 op=UNLOAD Oct 31 05:04:20.102000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.102000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.102000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.102000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.102000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.102000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.102000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.102000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.102000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.102000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:20.102000 audit: BPF prog-id=125 op=LOAD Oct 31 05:04:20.102000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000309658 items=0 ppid=2469 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:20.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623661663036306139383530376630363233386438636530336636 Oct 31 05:04:20.125396 kubelet[2006]: E1031 05:04:20.125194 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.125396 kubelet[2006]: W1031 05:04:20.125218 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.125396 kubelet[2006]: E1031 05:04:20.125241 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.126779 kubelet[2006]: E1031 05:04:20.126692 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.126779 kubelet[2006]: W1031 05:04:20.126710 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.126779 kubelet[2006]: E1031 05:04:20.126736 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.127046 kubelet[2006]: E1031 05:04:20.127019 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.127046 kubelet[2006]: W1031 05:04:20.127042 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.127198 kubelet[2006]: E1031 05:04:20.127072 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.127511 kubelet[2006]: E1031 05:04:20.127486 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.127511 kubelet[2006]: W1031 05:04:20.127506 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.127647 kubelet[2006]: E1031 05:04:20.127529 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.127845 kubelet[2006]: E1031 05:04:20.127822 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.127845 kubelet[2006]: W1031 05:04:20.127840 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.128037 kubelet[2006]: E1031 05:04:20.127863 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.128215 kubelet[2006]: E1031 05:04:20.128163 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.128215 kubelet[2006]: W1031 05:04:20.128182 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.128215 kubelet[2006]: E1031 05:04:20.128210 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.130305 kubelet[2006]: E1031 05:04:20.128710 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.130305 kubelet[2006]: W1031 05:04:20.128724 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.130305 kubelet[2006]: E1031 05:04:20.128810 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.130305 kubelet[2006]: E1031 05:04:20.129111 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.130305 kubelet[2006]: W1031 05:04:20.129125 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.130305 kubelet[2006]: E1031 05:04:20.129139 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.130305 kubelet[2006]: E1031 05:04:20.129487 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.130305 kubelet[2006]: W1031 05:04:20.129501 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.130305 kubelet[2006]: E1031 05:04:20.129516 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.130305 kubelet[2006]: E1031 05:04:20.129779 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.131409 kubelet[2006]: W1031 05:04:20.129802 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.131409 kubelet[2006]: E1031 05:04:20.129817 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.131409 kubelet[2006]: E1031 05:04:20.130054 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.131409 kubelet[2006]: W1031 05:04:20.130091 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.131409 kubelet[2006]: E1031 05:04:20.130108 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.131409 kubelet[2006]: E1031 05:04:20.130408 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.131409 kubelet[2006]: W1031 05:04:20.130422 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.131409 kubelet[2006]: E1031 05:04:20.130436 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.137482 kubelet[2006]: E1031 05:04:20.132083 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.137482 kubelet[2006]: W1031 05:04:20.132101 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.137482 kubelet[2006]: E1031 05:04:20.132126 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.137482 kubelet[2006]: E1031 05:04:20.133836 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.137482 kubelet[2006]: W1031 05:04:20.133852 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.137482 kubelet[2006]: E1031 05:04:20.133997 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.137482 kubelet[2006]: E1031 05:04:20.134189 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.137482 kubelet[2006]: W1031 05:04:20.134202 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.137482 kubelet[2006]: E1031 05:04:20.134299 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.137482 kubelet[2006]: E1031 05:04:20.134499 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.138087 env[1202]: time="2025-10-31T05:04:20.132538015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jqtzb,Uid:243adc6d-df4d-479b-9b38-0a2d0710dcb2,Namespace:calico-system,Attempt:0,} returns sandbox id \"efb6af060a98507f06238d8ce03f6dc665e6bbe28d19f797184889c26628ab3b\"" Oct 31 05:04:20.138166 kubelet[2006]: W1031 05:04:20.134513 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.138166 kubelet[2006]: E1031 05:04:20.134609 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.138166 kubelet[2006]: E1031 05:04:20.134769 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.138166 kubelet[2006]: W1031 05:04:20.134783 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.138166 kubelet[2006]: E1031 05:04:20.134877 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.138166 kubelet[2006]: E1031 05:04:20.135025 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.138166 kubelet[2006]: W1031 05:04:20.135041 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.138166 kubelet[2006]: E1031 05:04:20.135062 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.138166 kubelet[2006]: E1031 05:04:20.135393 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.138166 kubelet[2006]: W1031 05:04:20.135408 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.138621 kubelet[2006]: E1031 05:04:20.135428 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.138621 kubelet[2006]: E1031 05:04:20.135668 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.138621 kubelet[2006]: W1031 05:04:20.135681 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.138621 kubelet[2006]: E1031 05:04:20.135701 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.138621 kubelet[2006]: E1031 05:04:20.135967 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.138621 kubelet[2006]: W1031 05:04:20.135980 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.138621 kubelet[2006]: E1031 05:04:20.135999 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.138621 kubelet[2006]: E1031 05:04:20.136300 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.138621 kubelet[2006]: W1031 05:04:20.136314 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.138621 kubelet[2006]: E1031 05:04:20.136463 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.139186 kubelet[2006]: E1031 05:04:20.136641 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.139186 kubelet[2006]: W1031 05:04:20.136653 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.139186 kubelet[2006]: E1031 05:04:20.136677 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.139186 kubelet[2006]: E1031 05:04:20.136925 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.139186 kubelet[2006]: W1031 05:04:20.136937 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.139186 kubelet[2006]: E1031 05:04:20.136953 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.139186 kubelet[2006]: E1031 05:04:20.138544 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.139186 kubelet[2006]: W1031 05:04:20.138558 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.139186 kubelet[2006]: E1031 05:04:20.138583 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.144714 kubelet[2006]: E1031 05:04:20.144678 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:20.144714 kubelet[2006]: W1031 05:04:20.144704 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:20.144905 kubelet[2006]: E1031 05:04:20.144748 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:20.425000 audit[2552]: NETFILTER_CFG table=filter:101 family=2 entries=22 op=nft_register_rule pid=2552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:20.425000 audit[2552]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffcad2b0c20 a2=0 a3=7ffcad2b0c0c items=0 ppid=2114 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:20.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:20.431000 audit[2552]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=2552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:20.431000 audit[2552]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcad2b0c20 a2=0 a3=0 items=0 ppid=2114 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:20.431000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:20.494959 systemd[1]: run-containerd-runc-k8s.io-7e46243b54a4e38dea81df14cd7820d4071f6fd2f70e2ef4befe8d69090770df-runc.cKgc9Y.mount: Deactivated successfully. Oct 31 05:04:21.476136 kubelet[2006]: E1031 05:04:21.473896 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:04:21.664295 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3918844954.mount: Deactivated successfully. Oct 31 05:04:23.475118 kubelet[2006]: E1031 05:04:23.474234 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:04:23.717798 env[1202]: time="2025-10-31T05:04:23.717694617Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:23.720923 env[1202]: time="2025-10-31T05:04:23.720886842Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:23.723602 env[1202]: time="2025-10-31T05:04:23.723569439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:23.727738 env[1202]: time="2025-10-31T05:04:23.727637094Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:6f437220b5b3c627fb4a0fc8dc323363101f3c22a8f337612c2a1ddfb73b810c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:23.728340 env[1202]: time="2025-10-31T05:04:23.728299354Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\" returns image reference \"sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958\"" Oct 31 05:04:23.730556 env[1202]: time="2025-10-31T05:04:23.730522333Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 31 05:04:23.754740 env[1202]: time="2025-10-31T05:04:23.754680706Z" level=info msg="CreateContainer within sandbox \"7e46243b54a4e38dea81df14cd7820d4071f6fd2f70e2ef4befe8d69090770df\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 31 05:04:23.773206 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1985532343.mount: Deactivated successfully. Oct 31 05:04:23.785441 env[1202]: time="2025-10-31T05:04:23.785373279Z" level=info msg="CreateContainer within sandbox \"7e46243b54a4e38dea81df14cd7820d4071f6fd2f70e2ef4befe8d69090770df\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f0a32464c6bf3fd6f9dbc6b350084b94a59e48a04a379aa48bfbef0f12b673fd\"" Oct 31 05:04:23.786681 env[1202]: time="2025-10-31T05:04:23.786645546Z" level=info msg="StartContainer for \"f0a32464c6bf3fd6f9dbc6b350084b94a59e48a04a379aa48bfbef0f12b673fd\"" Oct 31 05:04:23.823202 systemd[1]: Started cri-containerd-f0a32464c6bf3fd6f9dbc6b350084b94a59e48a04a379aa48bfbef0f12b673fd.scope. Oct 31 05:04:23.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.860421 kernel: kauditd_printk_skb: 122 callbacks suppressed Oct 31 05:04:23.860531 kernel: audit: type=1400 audit(1761887063.855:863): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870010 kernel: audit: type=1400 audit(1761887063.855:864): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.877868 kernel: audit: type=1400 audit(1761887063.859:865): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.888593 kernel: audit: type=1400 audit(1761887063.859:866): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.888686 kernel: audit: type=1400 audit(1761887063.859:867): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.900827 kernel: audit: type=1400 audit(1761887063.859:868): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.900936 kernel: audit: type=1400 audit(1761887063.859:869): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.911878 kernel: audit: type=1400 audit(1761887063.859:870): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.911985 kernel: audit: type=1400 audit(1761887063.859:871): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.917826 kernel: audit: type=1400 audit(1761887063.864:872): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.864000 audit: BPF prog-id=126 op=LOAD Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2406 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:23.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630613332343634633662663366643666396462633662333530303834 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2406 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:23.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630613332343634633662663366643666396462633662333530303834 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit: BPF prog-id=127 op=LOAD Oct 31 05:04:23.870000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002dde70 items=0 ppid=2406 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:23.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630613332343634633662663366643666396462633662333530303834 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.870000 audit: BPF prog-id=128 op=LOAD Oct 31 05:04:23.870000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002ddeb8 items=0 ppid=2406 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:23.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630613332343634633662663366643666396462633662333530303834 Oct 31 05:04:23.871000 audit: BPF prog-id=128 op=UNLOAD Oct 31 05:04:23.871000 audit: BPF prog-id=127 op=UNLOAD Oct 31 05:04:23.871000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.871000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.871000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.871000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.871000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.871000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.871000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.871000 audit[2563]: AVC avc: denied { perfmon } for pid=2563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.871000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.871000 audit[2563]: AVC avc: denied { bpf } for pid=2563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:23.871000 audit: BPF prog-id=129 op=LOAD Oct 31 05:04:23.871000 audit[2563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003542c8 items=0 ppid=2406 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:23.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630613332343634633662663366643666396462633662333530303834 Oct 31 05:04:23.943427 env[1202]: time="2025-10-31T05:04:23.943358893Z" level=info msg="StartContainer for \"f0a32464c6bf3fd6f9dbc6b350084b94a59e48a04a379aa48bfbef0f12b673fd\" returns successfully" Oct 31 05:04:24.683550 kubelet[2006]: I1031 05:04:24.683463 2006 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-57499ddc45-8b8t6" podStartSLOduration=1.930191749 podStartE2EDuration="5.683439163s" podCreationTimestamp="2025-10-31 05:04:19 +0000 UTC" firstStartedPulling="2025-10-31 05:04:19.976850815 +0000 UTC m=+24.707743125" lastFinishedPulling="2025-10-31 05:04:23.730098212 +0000 UTC m=+28.460990539" observedRunningTime="2025-10-31 05:04:24.668224939 +0000 UTC m=+29.399117265" watchObservedRunningTime="2025-10-31 05:04:24.683439163 +0000 UTC m=+29.414331479" Oct 31 05:04:24.700521 kubelet[2006]: E1031 05:04:24.700479 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.700521 kubelet[2006]: W1031 05:04:24.700513 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.700757 kubelet[2006]: E1031 05:04:24.700549 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.700856 kubelet[2006]: E1031 05:04:24.700839 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.700856 kubelet[2006]: W1031 05:04:24.700853 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.700982 kubelet[2006]: E1031 05:04:24.700868 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.701128 kubelet[2006]: E1031 05:04:24.701100 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.701128 kubelet[2006]: W1031 05:04:24.701118 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.701250 kubelet[2006]: E1031 05:04:24.701133 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.701456 kubelet[2006]: E1031 05:04:24.701433 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.701456 kubelet[2006]: W1031 05:04:24.701454 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.701583 kubelet[2006]: E1031 05:04:24.701470 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.701732 kubelet[2006]: E1031 05:04:24.701709 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.701732 kubelet[2006]: W1031 05:04:24.701729 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.701909 kubelet[2006]: E1031 05:04:24.701745 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.702002 kubelet[2006]: E1031 05:04:24.701978 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.702002 kubelet[2006]: W1031 05:04:24.701997 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.702170 kubelet[2006]: E1031 05:04:24.702013 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.702307 kubelet[2006]: E1031 05:04:24.702284 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.702307 kubelet[2006]: W1031 05:04:24.702304 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.702461 kubelet[2006]: E1031 05:04:24.702319 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.702591 kubelet[2006]: E1031 05:04:24.702549 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.702591 kubelet[2006]: W1031 05:04:24.702568 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.702591 kubelet[2006]: E1031 05:04:24.702584 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.702848 kubelet[2006]: E1031 05:04:24.702824 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.702848 kubelet[2006]: W1031 05:04:24.702844 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.702987 kubelet[2006]: E1031 05:04:24.702858 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.703127 kubelet[2006]: E1031 05:04:24.703104 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.703127 kubelet[2006]: W1031 05:04:24.703124 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.703276 kubelet[2006]: E1031 05:04:24.703139 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.703379 kubelet[2006]: E1031 05:04:24.703347 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.703379 kubelet[2006]: W1031 05:04:24.703376 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.703512 kubelet[2006]: E1031 05:04:24.703391 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.703650 kubelet[2006]: E1031 05:04:24.703615 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.703650 kubelet[2006]: W1031 05:04:24.703646 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.703808 kubelet[2006]: E1031 05:04:24.703661 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.703931 kubelet[2006]: E1031 05:04:24.703908 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.703931 kubelet[2006]: W1031 05:04:24.703928 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.704072 kubelet[2006]: E1031 05:04:24.703943 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.704181 kubelet[2006]: E1031 05:04:24.704158 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.704181 kubelet[2006]: W1031 05:04:24.704177 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.704323 kubelet[2006]: E1031 05:04:24.704193 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.704441 kubelet[2006]: E1031 05:04:24.704418 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.704441 kubelet[2006]: W1031 05:04:24.704437 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.704576 kubelet[2006]: E1031 05:04:24.704451 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.713000 audit[2612]: NETFILTER_CFG table=filter:103 family=2 entries=21 op=nft_register_rule pid=2612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:24.713000 audit[2612]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc667714c0 a2=0 a3=7ffc667714ac items=0 ppid=2114 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:24.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:24.718000 audit[2612]: NETFILTER_CFG table=nat:104 family=2 entries=19 op=nft_register_chain pid=2612 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:24.718000 audit[2612]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc667714c0 a2=0 a3=7ffc667714ac items=0 ppid=2114 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:24.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:24.762251 kubelet[2006]: E1031 05:04:24.762214 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.762251 kubelet[2006]: W1031 05:04:24.762244 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.762486 kubelet[2006]: E1031 05:04:24.762271 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.762585 kubelet[2006]: E1031 05:04:24.762559 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.762585 kubelet[2006]: W1031 05:04:24.762580 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.762715 kubelet[2006]: E1031 05:04:24.762600 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.763323 kubelet[2006]: E1031 05:04:24.762861 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.763323 kubelet[2006]: W1031 05:04:24.762881 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.763323 kubelet[2006]: E1031 05:04:24.762903 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.763323 kubelet[2006]: E1031 05:04:24.763221 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.763323 kubelet[2006]: W1031 05:04:24.763235 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.763323 kubelet[2006]: E1031 05:04:24.763249 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.763705 kubelet[2006]: E1031 05:04:24.763539 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.763705 kubelet[2006]: W1031 05:04:24.763553 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.763705 kubelet[2006]: E1031 05:04:24.763568 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.763940 kubelet[2006]: E1031 05:04:24.763803 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.763940 kubelet[2006]: W1031 05:04:24.763817 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.763940 kubelet[2006]: E1031 05:04:24.763839 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.764146 kubelet[2006]: E1031 05:04:24.764097 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.764146 kubelet[2006]: W1031 05:04:24.764110 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.764146 kubelet[2006]: E1031 05:04:24.764124 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.765179 kubelet[2006]: E1031 05:04:24.764888 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.765179 kubelet[2006]: W1031 05:04:24.764910 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.765179 kubelet[2006]: E1031 05:04:24.764926 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.765661 kubelet[2006]: E1031 05:04:24.765347 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.765661 kubelet[2006]: W1031 05:04:24.765563 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.765661 kubelet[2006]: E1031 05:04:24.765585 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.765975 kubelet[2006]: E1031 05:04:24.765829 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.765975 kubelet[2006]: W1031 05:04:24.765855 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.765975 kubelet[2006]: E1031 05:04:24.765871 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.766258 kubelet[2006]: E1031 05:04:24.766195 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.766258 kubelet[2006]: W1031 05:04:24.766208 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.766612 kubelet[2006]: E1031 05:04:24.766424 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.766612 kubelet[2006]: E1031 05:04:24.766462 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.766612 kubelet[2006]: W1031 05:04:24.766476 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.766612 kubelet[2006]: E1031 05:04:24.766496 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.767304 kubelet[2006]: E1031 05:04:24.767277 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.767304 kubelet[2006]: W1031 05:04:24.767297 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.767460 kubelet[2006]: E1031 05:04:24.767322 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.767887 kubelet[2006]: E1031 05:04:24.767573 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.767887 kubelet[2006]: W1031 05:04:24.767595 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.767887 kubelet[2006]: E1031 05:04:24.767612 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.767887 kubelet[2006]: E1031 05:04:24.767885 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.768167 kubelet[2006]: W1031 05:04:24.767900 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.768167 kubelet[2006]: E1031 05:04:24.767914 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.769045 kubelet[2006]: E1031 05:04:24.768694 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.769045 kubelet[2006]: W1031 05:04:24.768711 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.769045 kubelet[2006]: E1031 05:04:24.768777 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.769253 kubelet[2006]: E1031 05:04:24.769065 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.769253 kubelet[2006]: W1031 05:04:24.769079 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.769253 kubelet[2006]: E1031 05:04:24.769099 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:24.769409 kubelet[2006]: E1031 05:04:24.769355 2006 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:04:24.769409 kubelet[2006]: W1031 05:04:24.769393 2006 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:04:24.769508 kubelet[2006]: E1031 05:04:24.769408 2006 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:04:25.313901 env[1202]: time="2025-10-31T05:04:25.313820294Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:25.316824 env[1202]: time="2025-10-31T05:04:25.316791326Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:25.319701 env[1202]: time="2025-10-31T05:04:25.319668584Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:25.322411 env[1202]: time="2025-10-31T05:04:25.322377142Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:25.323414 env[1202]: time="2025-10-31T05:04:25.323378629Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 31 05:04:25.330406 env[1202]: time="2025-10-31T05:04:25.330365438Z" level=info msg="CreateContainer within sandbox \"efb6af060a98507f06238d8ce03f6dc665e6bbe28d19f797184889c26628ab3b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 31 05:04:25.347676 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount665463866.mount: Deactivated successfully. Oct 31 05:04:25.355298 env[1202]: time="2025-10-31T05:04:25.355244639Z" level=info msg="CreateContainer within sandbox \"efb6af060a98507f06238d8ce03f6dc665e6bbe28d19f797184889c26628ab3b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c92f858b1b8d643812259e6d1b331adc8266f480b955c35c028c0d890e1201ec\"" Oct 31 05:04:25.357474 env[1202]: time="2025-10-31T05:04:25.357392888Z" level=info msg="StartContainer for \"c92f858b1b8d643812259e6d1b331adc8266f480b955c35c028c0d890e1201ec\"" Oct 31 05:04:25.398082 systemd[1]: Started cri-containerd-c92f858b1b8d643812259e6d1b331adc8266f480b955c35c028c0d890e1201ec.scope. Oct 31 05:04:25.424000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.424000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe48e55f0a8 items=0 ppid=2469 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:25.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339326638353862316238643634333831323235396536643162333331 Oct 31 05:04:25.424000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.424000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.424000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.424000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.424000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.424000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.424000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.424000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.424000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.424000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.424000 audit: BPF prog-id=130 op=LOAD Oct 31 05:04:25.424000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8718 items=0 ppid=2469 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:25.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339326638353862316238643634333831323235396536643162333331 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit: BPF prog-id=131 op=LOAD Oct 31 05:04:25.425000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8768 items=0 ppid=2469 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:25.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339326638353862316238643634333831323235396536643162333331 Oct 31 05:04:25.425000 audit: BPF prog-id=131 op=UNLOAD Oct 31 05:04:25.425000 audit: BPF prog-id=130 op=UNLOAD Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { perfmon } for pid=2639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit[2639]: AVC avc: denied { bpf } for pid=2639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:25.425000 audit: BPF prog-id=132 op=LOAD Oct 31 05:04:25.425000 audit[2639]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f87f8 items=0 ppid=2469 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:25.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339326638353862316238643634333831323235396536643162333331 Oct 31 05:04:25.453478 env[1202]: time="2025-10-31T05:04:25.453417240Z" level=info msg="StartContainer for \"c92f858b1b8d643812259e6d1b331adc8266f480b955c35c028c0d890e1201ec\" returns successfully" Oct 31 05:04:25.466019 systemd[1]: cri-containerd-c92f858b1b8d643812259e6d1b331adc8266f480b955c35c028c0d890e1201ec.scope: Deactivated successfully. Oct 31 05:04:25.468000 audit: BPF prog-id=132 op=UNLOAD Oct 31 05:04:25.475172 kubelet[2006]: E1031 05:04:25.474633 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:04:25.666538 env[1202]: time="2025-10-31T05:04:25.663482737Z" level=info msg="shim disconnected" id=c92f858b1b8d643812259e6d1b331adc8266f480b955c35c028c0d890e1201ec Oct 31 05:04:25.666538 env[1202]: time="2025-10-31T05:04:25.663627861Z" level=warning msg="cleaning up after shim disconnected" id=c92f858b1b8d643812259e6d1b331adc8266f480b955c35c028c0d890e1201ec namespace=k8s.io Oct 31 05:04:25.666538 env[1202]: time="2025-10-31T05:04:25.663648926Z" level=info msg="cleaning up dead shim" Oct 31 05:04:25.685379 env[1202]: time="2025-10-31T05:04:25.685285075Z" level=warning msg="cleanup warnings time=\"2025-10-31T05:04:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2676 runtime=io.containerd.runc.v2\n" Oct 31 05:04:25.740845 systemd[1]: run-containerd-runc-k8s.io-c92f858b1b8d643812259e6d1b331adc8266f480b955c35c028c0d890e1201ec-runc.INkqCp.mount: Deactivated successfully. Oct 31 05:04:25.741041 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c92f858b1b8d643812259e6d1b331adc8266f480b955c35c028c0d890e1201ec-rootfs.mount: Deactivated successfully. Oct 31 05:04:26.657398 env[1202]: time="2025-10-31T05:04:26.657062540Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 31 05:04:27.474192 kubelet[2006]: E1031 05:04:27.474120 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:04:29.476816 kubelet[2006]: E1031 05:04:29.476248 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:04:31.475392 kubelet[2006]: E1031 05:04:31.475224 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:04:32.892590 env[1202]: time="2025-10-31T05:04:32.892503463Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:32.894515 env[1202]: time="2025-10-31T05:04:32.894459024Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:32.897331 env[1202]: time="2025-10-31T05:04:32.897279413Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:32.899138 env[1202]: time="2025-10-31T05:04:32.899104410Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:32.900009 env[1202]: time="2025-10-31T05:04:32.899953406Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 31 05:04:32.904164 env[1202]: time="2025-10-31T05:04:32.903498534Z" level=info msg="CreateContainer within sandbox \"efb6af060a98507f06238d8ce03f6dc665e6bbe28d19f797184889c26628ab3b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 31 05:04:32.926787 env[1202]: time="2025-10-31T05:04:32.926025413Z" level=info msg="CreateContainer within sandbox \"efb6af060a98507f06238d8ce03f6dc665e6bbe28d19f797184889c26628ab3b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6e04ea0093353a0b9db670876e92b947d90ad9d7ae24dd6f5ad06f9b4ccb4848\"" Oct 31 05:04:32.928517 env[1202]: time="2025-10-31T05:04:32.927184382Z" level=info msg="StartContainer for \"6e04ea0093353a0b9db670876e92b947d90ad9d7ae24dd6f5ad06f9b4ccb4848\"" Oct 31 05:04:32.962699 systemd[1]: Started cri-containerd-6e04ea0093353a0b9db670876e92b947d90ad9d7ae24dd6f5ad06f9b4ccb4848.scope. Oct 31 05:04:32.972946 systemd[1]: run-containerd-runc-k8s.io-6e04ea0093353a0b9db670876e92b947d90ad9d7ae24dd6f5ad06f9b4ccb4848-runc.lsIrVE.mount: Deactivated successfully. Oct 31 05:04:33.008000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.016502 kernel: kauditd_printk_skb: 97 callbacks suppressed Oct 31 05:04:33.016693 kernel: audit: type=1400 audit(1761887073.008:890): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.008000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f45cd56d8f8 items=0 ppid=2469 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:33.029287 kernel: audit: type=1300 audit(1761887073.008:890): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f45cd56d8f8 items=0 ppid=2469 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:33.029441 kernel: audit: type=1327 audit(1761887073.008:890): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665303465613030393333353361306239646236373038373665393262 Oct 31 05:04:33.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665303465613030393333353361306239646236373038373665393262 Oct 31 05:04:33.035717 kernel: audit: type=1400 audit(1761887073.008:891): avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.008000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.008000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.045519 kernel: audit: type=1400 audit(1761887073.008:891): avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.045612 kernel: audit: type=1400 audit(1761887073.008:891): avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.008000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.050128 kernel: audit: type=1400 audit(1761887073.008:891): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.008000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.055000 kernel: audit: type=1400 audit(1761887073.008:891): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.008000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.008000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.069563 kernel: audit: type=1400 audit(1761887073.008:891): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.069670 kernel: audit: type=1400 audit(1761887073.008:891): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.008000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.008000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.008000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.008000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.008000 audit: BPF prog-id=133 op=LOAD Oct 31 05:04:33.008000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e3bc8 items=0 ppid=2469 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:33.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665303465613030393333353361306239646236373038373665393262 Oct 31 05:04:33.020000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.020000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.020000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.020000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.020000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.020000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.020000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.020000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.020000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.020000 audit: BPF prog-id=134 op=LOAD Oct 31 05:04:33.020000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e3c18 items=0 ppid=2469 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:33.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665303465613030393333353361306239646236373038373665393262 Oct 31 05:04:33.039000 audit: BPF prog-id=134 op=UNLOAD Oct 31 05:04:33.039000 audit: BPF prog-id=133 op=UNLOAD Oct 31 05:04:33.039000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.039000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.039000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.039000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.039000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.039000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.039000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.039000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.039000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.039000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:33.039000 audit: BPF prog-id=135 op=LOAD Oct 31 05:04:33.039000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e3ca8 items=0 ppid=2469 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:33.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665303465613030393333353361306239646236373038373665393262 Oct 31 05:04:33.095591 env[1202]: time="2025-10-31T05:04:33.095023231Z" level=info msg="StartContainer for \"6e04ea0093353a0b9db670876e92b947d90ad9d7ae24dd6f5ad06f9b4ccb4848\" returns successfully" Oct 31 05:04:33.475325 kubelet[2006]: E1031 05:04:33.473793 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:04:34.252607 env[1202]: time="2025-10-31T05:04:34.252531946Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 05:04:34.258980 kubelet[2006]: I1031 05:04:34.258931 2006 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Oct 31 05:04:34.264284 systemd[1]: cri-containerd-6e04ea0093353a0b9db670876e92b947d90ad9d7ae24dd6f5ad06f9b4ccb4848.scope: Deactivated successfully. Oct 31 05:04:34.267000 audit: BPF prog-id=135 op=UNLOAD Oct 31 05:04:34.307452 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6e04ea0093353a0b9db670876e92b947d90ad9d7ae24dd6f5ad06f9b4ccb4848-rootfs.mount: Deactivated successfully. Oct 31 05:04:34.340693 env[1202]: time="2025-10-31T05:04:34.340616645Z" level=info msg="shim disconnected" id=6e04ea0093353a0b9db670876e92b947d90ad9d7ae24dd6f5ad06f9b4ccb4848 Oct 31 05:04:34.340693 env[1202]: time="2025-10-31T05:04:34.340687090Z" level=warning msg="cleaning up after shim disconnected" id=6e04ea0093353a0b9db670876e92b947d90ad9d7ae24dd6f5ad06f9b4ccb4848 namespace=k8s.io Oct 31 05:04:34.340693 env[1202]: time="2025-10-31T05:04:34.340704854Z" level=info msg="cleaning up dead shim" Oct 31 05:04:34.362104 env[1202]: time="2025-10-31T05:04:34.361866576Z" level=warning msg="cleanup warnings time=\"2025-10-31T05:04:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2745 runtime=io.containerd.runc.v2\n" Oct 31 05:04:34.364440 kubelet[2006]: I1031 05:04:34.364154 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b4fc44f0-a36e-4bf3-903a-44dcc680ff0d-config-volume\") pod \"coredns-668d6bf9bc-92jt8\" (UID: \"b4fc44f0-a36e-4bf3-903a-44dcc680ff0d\") " pod="kube-system/coredns-668d6bf9bc-92jt8" Oct 31 05:04:34.364440 kubelet[2006]: I1031 05:04:34.364215 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bbhgn\" (UniqueName: \"kubernetes.io/projected/b4fc44f0-a36e-4bf3-903a-44dcc680ff0d-kube-api-access-bbhgn\") pod \"coredns-668d6bf9bc-92jt8\" (UID: \"b4fc44f0-a36e-4bf3-903a-44dcc680ff0d\") " pod="kube-system/coredns-668d6bf9bc-92jt8" Oct 31 05:04:34.367417 systemd[1]: Created slice kubepods-burstable-podb4fc44f0_a36e_4bf3_903a_44dcc680ff0d.slice. Oct 31 05:04:34.389688 systemd[1]: Created slice kubepods-besteffort-pod5110e5cb_a9c4_46f6_b5b1_6ad1537c4a4f.slice. Oct 31 05:04:34.400161 systemd[1]: Created slice kubepods-besteffort-pod1790b000_669c_4853_a4f7_2a387055fce3.slice. Oct 31 05:04:34.412692 kubelet[2006]: W1031 05:04:34.412641 2006 reflector.go:569] object-"calico-system"/"goldmane-ca-bundle": failed to list *v1.ConfigMap: configmaps "goldmane-ca-bundle" is forbidden: User "system:node:srv-cjebs.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'srv-cjebs.gb1.brightbox.com' and this object Oct 31 05:04:34.412865 kubelet[2006]: E1031 05:04:34.412731 2006 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"goldmane-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"goldmane-ca-bundle\" is forbidden: User \"system:node:srv-cjebs.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-cjebs.gb1.brightbox.com' and this object" logger="UnhandledError" Oct 31 05:04:34.425233 systemd[1]: Created slice kubepods-besteffort-podbc8a8ec6_0963_4bd0_9ebd_1371d51f1bc0.slice. Oct 31 05:04:34.438293 systemd[1]: Created slice kubepods-besteffort-poda2df8d92_63e1_4c8f_ad2f_5941fc3f36c8.slice. Oct 31 05:04:34.445460 systemd[1]: Created slice kubepods-besteffort-podcc9bffc4_0639_44ba_8e71_6f37149ca54e.slice. Oct 31 05:04:34.455350 systemd[1]: Created slice kubepods-burstable-poddaaa5498_a71c_46db_8be5_9aa4926d4d61.slice. Oct 31 05:04:34.464771 kubelet[2006]: I1031 05:04:34.464716 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/1790b000-669c-4853-a4f7-2a387055fce3-goldmane-key-pair\") pod \"goldmane-666569f655-xm6v4\" (UID: \"1790b000-669c-4853-a4f7-2a387055fce3\") " pod="calico-system/goldmane-666569f655-xm6v4" Oct 31 05:04:34.465096 kubelet[2006]: I1031 05:04:34.465061 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/daaa5498-a71c-46db-8be5-9aa4926d4d61-config-volume\") pod \"coredns-668d6bf9bc-gmmg4\" (UID: \"daaa5498-a71c-46db-8be5-9aa4926d4d61\") " pod="kube-system/coredns-668d6bf9bc-gmmg4" Oct 31 05:04:34.465326 kubelet[2006]: I1031 05:04:34.465299 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2mbzx\" (UniqueName: \"kubernetes.io/projected/daaa5498-a71c-46db-8be5-9aa4926d4d61-kube-api-access-2mbzx\") pod \"coredns-668d6bf9bc-gmmg4\" (UID: \"daaa5498-a71c-46db-8be5-9aa4926d4d61\") " pod="kube-system/coredns-668d6bf9bc-gmmg4" Oct 31 05:04:34.465958 kubelet[2006]: I1031 05:04:34.465604 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0-calico-apiserver-certs\") pod \"calico-apiserver-55bb969bf9-slz9n\" (UID: \"bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0\") " pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" Oct 31 05:04:34.466898 kubelet[2006]: I1031 05:04:34.466869 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-24cwm\" (UniqueName: \"kubernetes.io/projected/cc9bffc4-0639-44ba-8e71-6f37149ca54e-kube-api-access-24cwm\") pod \"calico-apiserver-55bb969bf9-zh2rr\" (UID: \"cc9bffc4-0639-44ba-8e71-6f37149ca54e\") " pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" Oct 31 05:04:34.467127 kubelet[2006]: I1031 05:04:34.467089 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1790b000-669c-4853-a4f7-2a387055fce3-goldmane-ca-bundle\") pod \"goldmane-666569f655-xm6v4\" (UID: \"1790b000-669c-4853-a4f7-2a387055fce3\") " pod="calico-system/goldmane-666569f655-xm6v4" Oct 31 05:04:34.468169 kubelet[2006]: I1031 05:04:34.468141 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/1790b000-669c-4853-a4f7-2a387055fce3-config\") pod \"goldmane-666569f655-xm6v4\" (UID: \"1790b000-669c-4853-a4f7-2a387055fce3\") " pod="calico-system/goldmane-666569f655-xm6v4" Oct 31 05:04:34.468363 kubelet[2006]: I1031 05:04:34.468321 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8-tigera-ca-bundle\") pod \"calico-kube-controllers-68b55d66b7-gbk97\" (UID: \"a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8\") " pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" Oct 31 05:04:34.468583 kubelet[2006]: I1031 05:04:34.468556 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lfjq6\" (UniqueName: \"kubernetes.io/projected/bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0-kube-api-access-lfjq6\") pod \"calico-apiserver-55bb969bf9-slz9n\" (UID: \"bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0\") " pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" Oct 31 05:04:34.468776 kubelet[2006]: I1031 05:04:34.468726 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/cc9bffc4-0639-44ba-8e71-6f37149ca54e-calico-apiserver-certs\") pod \"calico-apiserver-55bb969bf9-zh2rr\" (UID: \"cc9bffc4-0639-44ba-8e71-6f37149ca54e\") " pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" Oct 31 05:04:34.468955 kubelet[2006]: I1031 05:04:34.468917 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f-whisker-backend-key-pair\") pod \"whisker-5b848cf96c-gh5gn\" (UID: \"5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f\") " pod="calico-system/whisker-5b848cf96c-gh5gn" Oct 31 05:04:34.469150 kubelet[2006]: I1031 05:04:34.469107 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f-whisker-ca-bundle\") pod \"whisker-5b848cf96c-gh5gn\" (UID: \"5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f\") " pod="calico-system/whisker-5b848cf96c-gh5gn" Oct 31 05:04:34.469300 kubelet[2006]: I1031 05:04:34.469272 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h8bpd\" (UniqueName: \"kubernetes.io/projected/a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8-kube-api-access-h8bpd\") pod \"calico-kube-controllers-68b55d66b7-gbk97\" (UID: \"a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8\") " pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" Oct 31 05:04:34.469486 kubelet[2006]: I1031 05:04:34.469447 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kmvcs\" (UniqueName: \"kubernetes.io/projected/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f-kube-api-access-kmvcs\") pod \"whisker-5b848cf96c-gh5gn\" (UID: \"5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f\") " pod="calico-system/whisker-5b848cf96c-gh5gn" Oct 31 05:04:34.469673 kubelet[2006]: I1031 05:04:34.469647 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4nn4g\" (UniqueName: \"kubernetes.io/projected/1790b000-669c-4853-a4f7-2a387055fce3-kube-api-access-4nn4g\") pod \"goldmane-666569f655-xm6v4\" (UID: \"1790b000-669c-4853-a4f7-2a387055fce3\") " pod="calico-system/goldmane-666569f655-xm6v4" Oct 31 05:04:34.679494 env[1202]: time="2025-10-31T05:04:34.679427434Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-92jt8,Uid:b4fc44f0-a36e-4bf3-903a-44dcc680ff0d,Namespace:kube-system,Attempt:0,}" Oct 31 05:04:34.687966 env[1202]: time="2025-10-31T05:04:34.687807174Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 31 05:04:34.697187 env[1202]: time="2025-10-31T05:04:34.696629644Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5b848cf96c-gh5gn,Uid:5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f,Namespace:calico-system,Attempt:0,}" Oct 31 05:04:34.737670 env[1202]: time="2025-10-31T05:04:34.737608673Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55bb969bf9-slz9n,Uid:bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0,Namespace:calico-apiserver,Attempt:0,}" Oct 31 05:04:34.752648 env[1202]: time="2025-10-31T05:04:34.752595535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68b55d66b7-gbk97,Uid:a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8,Namespace:calico-system,Attempt:0,}" Oct 31 05:04:34.755633 env[1202]: time="2025-10-31T05:04:34.755595456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55bb969bf9-zh2rr,Uid:cc9bffc4-0639-44ba-8e71-6f37149ca54e,Namespace:calico-apiserver,Attempt:0,}" Oct 31 05:04:34.771366 env[1202]: time="2025-10-31T05:04:34.771312418Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-gmmg4,Uid:daaa5498-a71c-46db-8be5-9aa4926d4d61,Namespace:kube-system,Attempt:0,}" Oct 31 05:04:35.023403 env[1202]: time="2025-10-31T05:04:35.023288652Z" level=error msg="Failed to destroy network for sandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.023930 env[1202]: time="2025-10-31T05:04:35.023875029Z" level=error msg="encountered an error cleaning up failed sandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.024495 env[1202]: time="2025-10-31T05:04:35.023947308Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-92jt8,Uid:b4fc44f0-a36e-4bf3-903a-44dcc680ff0d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.026906 kubelet[2006]: E1031 05:04:35.024456 2006 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.027487 kubelet[2006]: E1031 05:04:35.027002 2006 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-92jt8" Oct 31 05:04:35.027487 kubelet[2006]: E1031 05:04:35.027061 2006 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-92jt8" Oct 31 05:04:35.027996 kubelet[2006]: E1031 05:04:35.027268 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-92jt8_kube-system(b4fc44f0-a36e-4bf3-903a-44dcc680ff0d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-92jt8_kube-system(b4fc44f0-a36e-4bf3-903a-44dcc680ff0d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-92jt8" podUID="b4fc44f0-a36e-4bf3-903a-44dcc680ff0d" Oct 31 05:04:35.066706 env[1202]: time="2025-10-31T05:04:35.066629389Z" level=error msg="Failed to destroy network for sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.067335 env[1202]: time="2025-10-31T05:04:35.067289903Z" level=error msg="encountered an error cleaning up failed sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.067436 env[1202]: time="2025-10-31T05:04:35.067366116Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55bb969bf9-slz9n,Uid:bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.068085 kubelet[2006]: E1031 05:04:35.067784 2006 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.068085 kubelet[2006]: E1031 05:04:35.067886 2006 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" Oct 31 05:04:35.068085 kubelet[2006]: E1031 05:04:35.067922 2006 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" Oct 31 05:04:35.068446 kubelet[2006]: E1031 05:04:35.068009 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-55bb969bf9-slz9n_calico-apiserver(bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-55bb969bf9-slz9n_calico-apiserver(bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:04:35.073055 env[1202]: time="2025-10-31T05:04:35.073000526Z" level=error msg="Failed to destroy network for sandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.073476 env[1202]: time="2025-10-31T05:04:35.073404471Z" level=error msg="encountered an error cleaning up failed sandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.073615 env[1202]: time="2025-10-31T05:04:35.073482135Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5b848cf96c-gh5gn,Uid:5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.073775 kubelet[2006]: E1031 05:04:35.073713 2006 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.073880 kubelet[2006]: E1031 05:04:35.073803 2006 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-5b848cf96c-gh5gn" Oct 31 05:04:35.073880 kubelet[2006]: E1031 05:04:35.073837 2006 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-5b848cf96c-gh5gn" Oct 31 05:04:35.074049 kubelet[2006]: E1031 05:04:35.073899 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-5b848cf96c-gh5gn_calico-system(5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-5b848cf96c-gh5gn_calico-system(5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-5b848cf96c-gh5gn" podUID="5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f" Oct 31 05:04:35.098992 env[1202]: time="2025-10-31T05:04:35.098859441Z" level=error msg="Failed to destroy network for sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.099857 env[1202]: time="2025-10-31T05:04:35.099812540Z" level=error msg="encountered an error cleaning up failed sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.100111 env[1202]: time="2025-10-31T05:04:35.100044999Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68b55d66b7-gbk97,Uid:a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.100596 kubelet[2006]: E1031 05:04:35.100541 2006 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.100711 kubelet[2006]: E1031 05:04:35.100622 2006 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" Oct 31 05:04:35.100711 kubelet[2006]: E1031 05:04:35.100657 2006 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" Oct 31 05:04:35.100863 kubelet[2006]: E1031 05:04:35.100722 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-68b55d66b7-gbk97_calico-system(a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-68b55d66b7-gbk97_calico-system(a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:04:35.125797 env[1202]: time="2025-10-31T05:04:35.125708551Z" level=error msg="Failed to destroy network for sandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.126630 env[1202]: time="2025-10-31T05:04:35.126585247Z" level=error msg="encountered an error cleaning up failed sandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.126855 env[1202]: time="2025-10-31T05:04:35.126795791Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55bb969bf9-zh2rr,Uid:cc9bffc4-0639-44ba-8e71-6f37149ca54e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.127364 kubelet[2006]: E1031 05:04:35.127294 2006 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.127494 kubelet[2006]: E1031 05:04:35.127391 2006 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" Oct 31 05:04:35.127494 kubelet[2006]: E1031 05:04:35.127424 2006 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" Oct 31 05:04:35.127734 kubelet[2006]: E1031 05:04:35.127484 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-55bb969bf9-zh2rr_calico-apiserver(cc9bffc4-0639-44ba-8e71-6f37149ca54e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-55bb969bf9-zh2rr_calico-apiserver(cc9bffc4-0639-44ba-8e71-6f37149ca54e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:04:35.132239 env[1202]: time="2025-10-31T05:04:35.132166220Z" level=error msg="Failed to destroy network for sandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.132712 env[1202]: time="2025-10-31T05:04:35.132668370Z" level=error msg="encountered an error cleaning up failed sandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.132820 env[1202]: time="2025-10-31T05:04:35.132740814Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-gmmg4,Uid:daaa5498-a71c-46db-8be5-9aa4926d4d61,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.133009 kubelet[2006]: E1031 05:04:35.132971 2006 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.133089 kubelet[2006]: E1031 05:04:35.133025 2006 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-gmmg4" Oct 31 05:04:35.133089 kubelet[2006]: E1031 05:04:35.133053 2006 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-gmmg4" Oct 31 05:04:35.133223 kubelet[2006]: E1031 05:04:35.133094 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-gmmg4_kube-system(daaa5498-a71c-46db-8be5-9aa4926d4d61)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-gmmg4_kube-system(daaa5498-a71c-46db-8be5-9aa4926d4d61)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-gmmg4" podUID="daaa5498-a71c-46db-8be5-9aa4926d4d61" Oct 31 05:04:35.482590 systemd[1]: Created slice kubepods-besteffort-podf35619da_c214_4156_aacf_d0404664f402.slice. Oct 31 05:04:35.487408 env[1202]: time="2025-10-31T05:04:35.487331306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mtt9j,Uid:f35619da-c214-4156-aacf-d0404664f402,Namespace:calico-system,Attempt:0,}" Oct 31 05:04:35.574681 kubelet[2006]: E1031 05:04:35.574331 2006 configmap.go:193] Couldn't get configMap calico-system/goldmane-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Oct 31 05:04:35.580384 kubelet[2006]: E1031 05:04:35.580340 2006 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/1790b000-669c-4853-a4f7-2a387055fce3-goldmane-ca-bundle podName:1790b000-669c-4853-a4f7-2a387055fce3 nodeName:}" failed. No retries permitted until 2025-10-31 05:04:36.074507964 +0000 UTC m=+40.805400282 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "goldmane-ca-bundle" (UniqueName: "kubernetes.io/configmap/1790b000-669c-4853-a4f7-2a387055fce3-goldmane-ca-bundle") pod "goldmane-666569f655-xm6v4" (UID: "1790b000-669c-4853-a4f7-2a387055fce3") : failed to sync configmap cache: timed out waiting for the condition Oct 31 05:04:35.588264 env[1202]: time="2025-10-31T05:04:35.588172912Z" level=error msg="Failed to destroy network for sandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.594058 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997-shm.mount: Deactivated successfully. Oct 31 05:04:35.595880 env[1202]: time="2025-10-31T05:04:35.595822073Z" level=error msg="encountered an error cleaning up failed sandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.595978 env[1202]: time="2025-10-31T05:04:35.595909627Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mtt9j,Uid:f35619da-c214-4156-aacf-d0404664f402,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.596260 kubelet[2006]: E1031 05:04:35.596205 2006 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.596386 kubelet[2006]: E1031 05:04:35.596283 2006 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mtt9j" Oct 31 05:04:35.596386 kubelet[2006]: E1031 05:04:35.596334 2006 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-mtt9j" Oct 31 05:04:35.598954 kubelet[2006]: E1031 05:04:35.596424 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-mtt9j_calico-system(f35619da-c214-4156-aacf-d0404664f402)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-mtt9j_calico-system(f35619da-c214-4156-aacf-d0404664f402)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:04:35.691880 kubelet[2006]: I1031 05:04:35.691307 2006 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:35.696898 env[1202]: time="2025-10-31T05:04:35.696839720Z" level=info msg="StopPodSandbox for \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\"" Oct 31 05:04:35.699577 kubelet[2006]: I1031 05:04:35.699496 2006 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:35.700768 env[1202]: time="2025-10-31T05:04:35.700716798Z" level=info msg="StopPodSandbox for \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\"" Oct 31 05:04:35.702597 kubelet[2006]: I1031 05:04:35.702570 2006 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:35.706599 env[1202]: time="2025-10-31T05:04:35.706563044Z" level=info msg="StopPodSandbox for \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\"" Oct 31 05:04:35.711998 kubelet[2006]: I1031 05:04:35.711970 2006 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:04:35.714362 env[1202]: time="2025-10-31T05:04:35.713625001Z" level=info msg="StopPodSandbox for \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\"" Oct 31 05:04:35.717855 kubelet[2006]: I1031 05:04:35.717827 2006 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:35.726772 env[1202]: time="2025-10-31T05:04:35.725928599Z" level=info msg="StopPodSandbox for \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\"" Oct 31 05:04:35.748856 kubelet[2006]: I1031 05:04:35.746578 2006 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:35.749501 env[1202]: time="2025-10-31T05:04:35.749456082Z" level=info msg="StopPodSandbox for \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\"" Oct 31 05:04:35.751908 kubelet[2006]: I1031 05:04:35.751795 2006 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:04:35.752507 env[1202]: time="2025-10-31T05:04:35.752300959Z" level=info msg="StopPodSandbox for \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\"" Oct 31 05:04:35.888218 env[1202]: time="2025-10-31T05:04:35.888079537Z" level=error msg="StopPodSandbox for \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\" failed" error="failed to destroy network for sandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.889338 kubelet[2006]: E1031 05:04:35.888999 2006 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:35.889338 kubelet[2006]: E1031 05:04:35.889131 2006 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668"} Oct 31 05:04:35.889338 kubelet[2006]: E1031 05:04:35.889256 2006 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b4fc44f0-a36e-4bf3-903a-44dcc680ff0d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:04:35.889338 kubelet[2006]: E1031 05:04:35.889293 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b4fc44f0-a36e-4bf3-903a-44dcc680ff0d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-92jt8" podUID="b4fc44f0-a36e-4bf3-903a-44dcc680ff0d" Oct 31 05:04:35.893897 env[1202]: time="2025-10-31T05:04:35.893852664Z" level=error msg="StopPodSandbox for \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\" failed" error="failed to destroy network for sandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.894401 kubelet[2006]: E1031 05:04:35.894177 2006 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:35.894401 kubelet[2006]: E1031 05:04:35.894252 2006 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997"} Oct 31 05:04:35.894401 kubelet[2006]: E1031 05:04:35.894314 2006 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f35619da-c214-4156-aacf-d0404664f402\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:04:35.894401 kubelet[2006]: E1031 05:04:35.894360 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f35619da-c214-4156-aacf-d0404664f402\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:04:35.922783 env[1202]: time="2025-10-31T05:04:35.922658481Z" level=error msg="StopPodSandbox for \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\" failed" error="failed to destroy network for sandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.923642 kubelet[2006]: E1031 05:04:35.923426 2006 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:35.923642 kubelet[2006]: E1031 05:04:35.923608 2006 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c"} Oct 31 05:04:35.923919 kubelet[2006]: E1031 05:04:35.923699 2006 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:04:35.923919 kubelet[2006]: E1031 05:04:35.923738 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-5b848cf96c-gh5gn" podUID="5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f" Oct 31 05:04:35.934883 env[1202]: time="2025-10-31T05:04:35.934801623Z" level=error msg="StopPodSandbox for \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\" failed" error="failed to destroy network for sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.935325 kubelet[2006]: E1031 05:04:35.935257 2006 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:04:35.935412 kubelet[2006]: E1031 05:04:35.935333 2006 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687"} Oct 31 05:04:35.935412 kubelet[2006]: E1031 05:04:35.935379 2006 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:04:35.935572 kubelet[2006]: E1031 05:04:35.935412 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:04:35.957494 env[1202]: time="2025-10-31T05:04:35.957406970Z" level=error msg="StopPodSandbox for \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\" failed" error="failed to destroy network for sandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.957821 kubelet[2006]: E1031 05:04:35.957778 2006 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:35.957930 kubelet[2006]: E1031 05:04:35.957848 2006 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec"} Oct 31 05:04:35.957930 kubelet[2006]: E1031 05:04:35.957902 2006 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cc9bffc4-0639-44ba-8e71-6f37149ca54e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:04:35.958114 kubelet[2006]: E1031 05:04:35.957938 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cc9bffc4-0639-44ba-8e71-6f37149ca54e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:04:35.964491 env[1202]: time="2025-10-31T05:04:35.964418949Z" level=error msg="StopPodSandbox for \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\" failed" error="failed to destroy network for sandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.965136 kubelet[2006]: E1031 05:04:35.964909 2006 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:35.965136 kubelet[2006]: E1031 05:04:35.964954 2006 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2"} Oct 31 05:04:35.965136 kubelet[2006]: E1031 05:04:35.965032 2006 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"daaa5498-a71c-46db-8be5-9aa4926d4d61\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:04:35.965136 kubelet[2006]: E1031 05:04:35.965088 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"daaa5498-a71c-46db-8be5-9aa4926d4d61\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-gmmg4" podUID="daaa5498-a71c-46db-8be5-9aa4926d4d61" Oct 31 05:04:35.966076 env[1202]: time="2025-10-31T05:04:35.966022625Z" level=error msg="StopPodSandbox for \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\" failed" error="failed to destroy network for sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:35.966565 kubelet[2006]: E1031 05:04:35.966365 2006 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:04:35.966565 kubelet[2006]: E1031 05:04:35.966410 2006 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9"} Oct 31 05:04:35.966565 kubelet[2006]: E1031 05:04:35.966464 2006 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:04:35.966565 kubelet[2006]: E1031 05:04:35.966513 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:04:36.208655 env[1202]: time="2025-10-31T05:04:36.208599223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-xm6v4,Uid:1790b000-669c-4853-a4f7-2a387055fce3,Namespace:calico-system,Attempt:0,}" Oct 31 05:04:36.354920 env[1202]: time="2025-10-31T05:04:36.354771362Z" level=error msg="Failed to destroy network for sandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:36.363294 env[1202]: time="2025-10-31T05:04:36.355413803Z" level=error msg="encountered an error cleaning up failed sandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:36.363294 env[1202]: time="2025-10-31T05:04:36.355514658Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-xm6v4,Uid:1790b000-669c-4853-a4f7-2a387055fce3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:36.361834 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc-shm.mount: Deactivated successfully. Oct 31 05:04:36.364591 kubelet[2006]: E1031 05:04:36.364515 2006 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:36.367674 kubelet[2006]: E1031 05:04:36.364634 2006 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-xm6v4" Oct 31 05:04:36.367674 kubelet[2006]: E1031 05:04:36.364692 2006 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-xm6v4" Oct 31 05:04:36.367674 kubelet[2006]: E1031 05:04:36.365135 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-666569f655-xm6v4_calico-system(1790b000-669c-4853-a4f7-2a387055fce3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-666569f655-xm6v4_calico-system(1790b000-669c-4853-a4f7-2a387055fce3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:04:36.756468 kubelet[2006]: I1031 05:04:36.756381 2006 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:36.757497 env[1202]: time="2025-10-31T05:04:36.757453583Z" level=info msg="StopPodSandbox for \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\"" Oct 31 05:04:36.812484 env[1202]: time="2025-10-31T05:04:36.812341076Z" level=error msg="StopPodSandbox for \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\" failed" error="failed to destroy network for sandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:36.812852 kubelet[2006]: E1031 05:04:36.812786 2006 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:36.813521 kubelet[2006]: E1031 05:04:36.812864 2006 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc"} Oct 31 05:04:36.813521 kubelet[2006]: E1031 05:04:36.812946 2006 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1790b000-669c-4853-a4f7-2a387055fce3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:04:36.813521 kubelet[2006]: E1031 05:04:36.813003 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1790b000-669c-4853-a4f7-2a387055fce3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:04:46.476603 env[1202]: time="2025-10-31T05:04:46.476540825Z" level=info msg="StopPodSandbox for \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\"" Oct 31 05:04:46.489419 env[1202]: time="2025-10-31T05:04:46.489362707Z" level=info msg="StopPodSandbox for \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\"" Oct 31 05:04:46.556144 env[1202]: time="2025-10-31T05:04:46.556041361Z" level=error msg="StopPodSandbox for \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\" failed" error="failed to destroy network for sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:46.556767 kubelet[2006]: E1031 05:04:46.556480 2006 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:04:46.556767 kubelet[2006]: E1031 05:04:46.556579 2006 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687"} Oct 31 05:04:46.556767 kubelet[2006]: E1031 05:04:46.556648 2006 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:04:46.556767 kubelet[2006]: E1031 05:04:46.556696 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:04:46.580073 env[1202]: time="2025-10-31T05:04:46.579996406Z" level=error msg="StopPodSandbox for \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\" failed" error="failed to destroy network for sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:04:46.580562 kubelet[2006]: E1031 05:04:46.580428 2006 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:04:46.580562 kubelet[2006]: E1031 05:04:46.580494 2006 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9"} Oct 31 05:04:46.580562 kubelet[2006]: E1031 05:04:46.580538 2006 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:04:46.580861 kubelet[2006]: E1031 05:04:46.580568 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:04:46.585165 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1342603901.mount: Deactivated successfully. Oct 31 05:04:46.626664 env[1202]: time="2025-10-31T05:04:46.626553382Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:46.628602 env[1202]: time="2025-10-31T05:04:46.628561357Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:46.631398 env[1202]: time="2025-10-31T05:04:46.631361152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:46.634358 env[1202]: time="2025-10-31T05:04:46.633478666Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:04:46.634742 env[1202]: time="2025-10-31T05:04:46.634316074Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 31 05:04:46.676868 env[1202]: time="2025-10-31T05:04:46.676815403Z" level=info msg="CreateContainer within sandbox \"efb6af060a98507f06238d8ce03f6dc665e6bbe28d19f797184889c26628ab3b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 31 05:04:46.701708 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1568774309.mount: Deactivated successfully. Oct 31 05:04:46.706486 env[1202]: time="2025-10-31T05:04:46.706410245Z" level=info msg="CreateContainer within sandbox \"efb6af060a98507f06238d8ce03f6dc665e6bbe28d19f797184889c26628ab3b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a1ceedce063cf46f9faf5b741490b25b94cf051b79377fd7fa1e870809d65170\"" Oct 31 05:04:46.708838 env[1202]: time="2025-10-31T05:04:46.708801053Z" level=info msg="StartContainer for \"a1ceedce063cf46f9faf5b741490b25b94cf051b79377fd7fa1e870809d65170\"" Oct 31 05:04:46.747424 systemd[1]: Started cri-containerd-a1ceedce063cf46f9faf5b741490b25b94cf051b79377fd7fa1e870809d65170.scope. Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.917551 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 31 05:04:46.918446 kernel: audit: type=1400 audit(1761887086.911:897): avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f63ba462ab8 items=0 ppid=2469 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:46.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131636565646365303633636634366639666166356237343134393062 Oct 31 05:04:46.934582 kernel: audit: type=1300 audit(1761887086.911:897): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f63ba462ab8 items=0 ppid=2469 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:46.934692 kernel: audit: type=1327 audit(1761887086.911:897): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131636565646365303633636634366639666166356237343134393062 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.940784 kernel: audit: type=1400 audit(1761887086.911:898): avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.951236 kernel: audit: type=1400 audit(1761887086.911:898): avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.951506 kernel: audit: type=1400 audit(1761887086.911:898): avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.967568 kernel: audit: type=1400 audit(1761887086.911:898): avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.967711 kernel: audit: type=1400 audit(1761887086.911:898): avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.974496 kernel: audit: type=1400 audit(1761887086.911:898): avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.974676 kernel: audit: type=1400 audit(1761887086.911:898): avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit: BPF prog-id=136 op=LOAD Oct 31 05:04:46.911000 audit[3148]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000aa208 items=0 ppid=2469 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:46.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131636565646365303633636634366639666166356237343134393062 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit: BPF prog-id=137 op=LOAD Oct 31 05:04:46.911000 audit[3148]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000aa258 items=0 ppid=2469 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:46.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131636565646365303633636634366639666166356237343134393062 Oct 31 05:04:46.911000 audit: BPF prog-id=137 op=UNLOAD Oct 31 05:04:46.911000 audit: BPF prog-id=136 op=UNLOAD Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:46.911000 audit: BPF prog-id=138 op=LOAD Oct 31 05:04:46.911000 audit[3148]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000aa2e8 items=0 ppid=2469 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:46.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131636565646365303633636634366639666166356237343134393062 Oct 31 05:04:46.985499 env[1202]: time="2025-10-31T05:04:46.985448712Z" level=info msg="StartContainer for \"a1ceedce063cf46f9faf5b741490b25b94cf051b79377fd7fa1e870809d65170\" returns successfully" Oct 31 05:04:47.461332 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 31 05:04:47.461594 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 31 05:04:47.694819 env[1202]: time="2025-10-31T05:04:47.694767935Z" level=info msg="StopPodSandbox for \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\"" Oct 31 05:04:47.851423 kubelet[2006]: I1031 05:04:47.847599 2006 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-jqtzb" podStartSLOduration=2.347001515 podStartE2EDuration="28.843304826s" podCreationTimestamp="2025-10-31 05:04:19 +0000 UTC" firstStartedPulling="2025-10-31 05:04:20.140044225 +0000 UTC m=+24.870936541" lastFinishedPulling="2025-10-31 05:04:46.636347542 +0000 UTC m=+51.367239852" observedRunningTime="2025-10-31 05:04:47.842856196 +0000 UTC m=+52.573748540" watchObservedRunningTime="2025-10-31 05:04:47.843304826 +0000 UTC m=+52.574197157" Oct 31 05:04:47.872193 systemd[1]: run-containerd-runc-k8s.io-a1ceedce063cf46f9faf5b741490b25b94cf051b79377fd7fa1e870809d65170-runc.5va8VJ.mount: Deactivated successfully. Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:47.882 [INFO][3207] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:47.883 [INFO][3207] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" iface="eth0" netns="/var/run/netns/cni-0a55dedc-c3d7-5075-8c53-af6344e0dc63" Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:47.884 [INFO][3207] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" iface="eth0" netns="/var/run/netns/cni-0a55dedc-c3d7-5075-8c53-af6344e0dc63" Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:47.890 [INFO][3207] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" iface="eth0" netns="/var/run/netns/cni-0a55dedc-c3d7-5075-8c53-af6344e0dc63" Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:47.891 [INFO][3207] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:47.891 [INFO][3207] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:48.091 [INFO][3222] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" HandleID="k8s-pod-network.2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Workload="srv--cjebs.gb1.brightbox.com-k8s-whisker--5b848cf96c--gh5gn-eth0" Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:48.094 [INFO][3222] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:48.095 [INFO][3222] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:48.123 [WARNING][3222] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" HandleID="k8s-pod-network.2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Workload="srv--cjebs.gb1.brightbox.com-k8s-whisker--5b848cf96c--gh5gn-eth0" Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:48.123 [INFO][3222] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" HandleID="k8s-pod-network.2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Workload="srv--cjebs.gb1.brightbox.com-k8s-whisker--5b848cf96c--gh5gn-eth0" Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:48.126 [INFO][3222] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:48.131876 env[1202]: 2025-10-31 05:04:48.129 [INFO][3207] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:48.138333 env[1202]: time="2025-10-31T05:04:48.137499385Z" level=info msg="TearDown network for sandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\" successfully" Oct 31 05:04:48.138333 env[1202]: time="2025-10-31T05:04:48.137555250Z" level=info msg="StopPodSandbox for \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\" returns successfully" Oct 31 05:04:48.135713 systemd[1]: run-netns-cni\x2d0a55dedc\x2dc3d7\x2d5075\x2d8c53\x2daf6344e0dc63.mount: Deactivated successfully. Oct 31 05:04:48.191117 kubelet[2006]: I1031 05:04:48.191048 2006 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f-whisker-backend-key-pair\") pod \"5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f\" (UID: \"5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f\") " Oct 31 05:04:48.191558 kubelet[2006]: I1031 05:04:48.191506 2006 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-kmvcs\" (UniqueName: \"kubernetes.io/projected/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f-kube-api-access-kmvcs\") pod \"5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f\" (UID: \"5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f\") " Oct 31 05:04:48.191772 kubelet[2006]: I1031 05:04:48.191730 2006 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f-whisker-ca-bundle\") pod \"5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f\" (UID: \"5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f\") " Oct 31 05:04:48.199516 kubelet[2006]: I1031 05:04:48.199450 2006 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f" (UID: "5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Oct 31 05:04:48.206433 kubelet[2006]: I1031 05:04:48.205916 2006 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f" (UID: "5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Oct 31 05:04:48.206912 kubelet[2006]: I1031 05:04:48.206880 2006 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f-kube-api-access-kmvcs" (OuterVolumeSpecName: "kube-api-access-kmvcs") pod "5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f" (UID: "5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f"). InnerVolumeSpecName "kube-api-access-kmvcs". PluginName "kubernetes.io/projected", VolumeGIDValue "" Oct 31 05:04:48.293718 kubelet[2006]: I1031 05:04:48.293672 2006 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-kmvcs\" (UniqueName: \"kubernetes.io/projected/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f-kube-api-access-kmvcs\") on node \"srv-cjebs.gb1.brightbox.com\" DevicePath \"\"" Oct 31 05:04:48.294034 kubelet[2006]: I1031 05:04:48.294009 2006 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f-whisker-ca-bundle\") on node \"srv-cjebs.gb1.brightbox.com\" DevicePath \"\"" Oct 31 05:04:48.294574 kubelet[2006]: I1031 05:04:48.294244 2006 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f-whisker-backend-key-pair\") on node \"srv-cjebs.gb1.brightbox.com\" DevicePath \"\"" Oct 31 05:04:48.476314 env[1202]: time="2025-10-31T05:04:48.474246931Z" level=info msg="StopPodSandbox for \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\"" Oct 31 05:04:48.477606 env[1202]: time="2025-10-31T05:04:48.477543030Z" level=info msg="StopPodSandbox for \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\"" Oct 31 05:04:48.586478 systemd[1]: var-lib-kubelet-pods-5110e5cb\x2da9c4\x2d46f6\x2db5b1\x2d6ad1537c4a4f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dkmvcs.mount: Deactivated successfully. Oct 31 05:04:48.586674 systemd[1]: var-lib-kubelet-pods-5110e5cb\x2da9c4\x2d46f6\x2db5b1\x2d6ad1537c4a4f-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.549 [INFO][3274] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.549 [INFO][3274] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" iface="eth0" netns="/var/run/netns/cni-9c696f7f-96da-74d9-862a-b105ce16c734" Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.550 [INFO][3274] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" iface="eth0" netns="/var/run/netns/cni-9c696f7f-96da-74d9-862a-b105ce16c734" Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.559 [INFO][3274] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" iface="eth0" netns="/var/run/netns/cni-9c696f7f-96da-74d9-862a-b105ce16c734" Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.559 [INFO][3274] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.559 [INFO][3274] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.629 [INFO][3287] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" HandleID="k8s-pod-network.d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.631 [INFO][3287] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.631 [INFO][3287] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.639 [WARNING][3287] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" HandleID="k8s-pod-network.d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.639 [INFO][3287] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" HandleID="k8s-pod-network.d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.641 [INFO][3287] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:48.649202 env[1202]: 2025-10-31 05:04:48.646 [INFO][3274] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:48.654638 env[1202]: time="2025-10-31T05:04:48.652802372Z" level=info msg="TearDown network for sandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\" successfully" Oct 31 05:04:48.654638 env[1202]: time="2025-10-31T05:04:48.653261649Z" level=info msg="StopPodSandbox for \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\" returns successfully" Oct 31 05:04:48.652506 systemd[1]: run-netns-cni\x2d9c696f7f\x2d96da\x2d74d9\x2d862a\x2db105ce16c734.mount: Deactivated successfully. Oct 31 05:04:48.655585 env[1202]: time="2025-10-31T05:04:48.655521750Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55bb969bf9-zh2rr,Uid:cc9bffc4-0639-44ba-8e71-6f37149ca54e,Namespace:calico-apiserver,Attempt:1,}" Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.589 [INFO][3279] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.589 [INFO][3279] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" iface="eth0" netns="/var/run/netns/cni-c6410693-5763-b5b7-5ba7-c81559f75b51" Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.590 [INFO][3279] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" iface="eth0" netns="/var/run/netns/cni-c6410693-5763-b5b7-5ba7-c81559f75b51" Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.590 [INFO][3279] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" iface="eth0" netns="/var/run/netns/cni-c6410693-5763-b5b7-5ba7-c81559f75b51" Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.590 [INFO][3279] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.590 [INFO][3279] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.634 [INFO][3292] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" HandleID="k8s-pod-network.bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.635 [INFO][3292] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.641 [INFO][3292] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.658 [WARNING][3292] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" HandleID="k8s-pod-network.bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.658 [INFO][3292] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" HandleID="k8s-pod-network.bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.662 [INFO][3292] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:48.671101 env[1202]: 2025-10-31 05:04:48.665 [INFO][3279] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:48.670975 systemd[1]: run-netns-cni\x2dc6410693\x2d5763\x2db5b7\x2d5ba7\x2dc81559f75b51.mount: Deactivated successfully. Oct 31 05:04:48.680776 env[1202]: time="2025-10-31T05:04:48.680697745Z" level=info msg="TearDown network for sandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\" successfully" Oct 31 05:04:48.680776 env[1202]: time="2025-10-31T05:04:48.680744557Z" level=info msg="StopPodSandbox for \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\" returns successfully" Oct 31 05:04:48.681718 env[1202]: time="2025-10-31T05:04:48.681650593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-gmmg4,Uid:daaa5498-a71c-46db-8be5-9aa4926d4d61,Namespace:kube-system,Attempt:1,}" Oct 31 05:04:48.820885 systemd[1]: Removed slice kubepods-besteffort-pod5110e5cb_a9c4_46f6_b5b1_6ad1537c4a4f.slice. Oct 31 05:04:48.970230 systemd[1]: Created slice kubepods-besteffort-pod3ce94692_be26_453d_ab7d_92c59a810174.slice. Oct 31 05:04:49.001064 kubelet[2006]: I1031 05:04:49.001007 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/3ce94692-be26-453d-ab7d-92c59a810174-whisker-backend-key-pair\") pod \"whisker-568f7b959f-rlltz\" (UID: \"3ce94692-be26-453d-ab7d-92c59a810174\") " pod="calico-system/whisker-568f7b959f-rlltz" Oct 31 05:04:49.001771 kubelet[2006]: I1031 05:04:49.001733 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3ce94692-be26-453d-ab7d-92c59a810174-whisker-ca-bundle\") pod \"whisker-568f7b959f-rlltz\" (UID: \"3ce94692-be26-453d-ab7d-92c59a810174\") " pod="calico-system/whisker-568f7b959f-rlltz" Oct 31 05:04:49.001946 kubelet[2006]: I1031 05:04:49.001918 2006 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8llcg\" (UniqueName: \"kubernetes.io/projected/3ce94692-be26-453d-ab7d-92c59a810174-kube-api-access-8llcg\") pod \"whisker-568f7b959f-rlltz\" (UID: \"3ce94692-be26-453d-ab7d-92c59a810174\") " pod="calico-system/whisker-568f7b959f-rlltz" Oct 31 05:04:49.052557 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 05:04:49.053256 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2b83d237fa7: link becomes ready Oct 31 05:04:49.059405 systemd-networkd[1021]: cali2b83d237fa7: Link UP Oct 31 05:04:49.060935 systemd-networkd[1021]: cali2b83d237fa7: Gained carrier Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.761 [INFO][3300] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.782 [INFO][3300] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0 calico-apiserver-55bb969bf9- calico-apiserver cc9bffc4-0639-44ba-8e71-6f37149ca54e 933 0 2025-10-31 05:04:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:55bb969bf9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-cjebs.gb1.brightbox.com calico-apiserver-55bb969bf9-zh2rr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2b83d237fa7 [] [] }} ContainerID="2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-zh2rr" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-" Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.782 [INFO][3300] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-zh2rr" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.888 [INFO][3322] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" HandleID="k8s-pod-network.2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.890 [INFO][3322] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" HandleID="k8s-pod-network.2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c97e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-cjebs.gb1.brightbox.com", "pod":"calico-apiserver-55bb969bf9-zh2rr", "timestamp":"2025-10-31 05:04:48.887998997 +0000 UTC"}, Hostname:"srv-cjebs.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.890 [INFO][3322] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.891 [INFO][3322] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.891 [INFO][3322] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cjebs.gb1.brightbox.com' Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.928 [INFO][3322] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.967 [INFO][3322] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.984 [INFO][3322] ipam/ipam.go 511: Trying affinity for 192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.991 [INFO][3322] ipam/ipam.go 158: Attempting to load block cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:48.996 [INFO][3322] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:49.000 [INFO][3322] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:49.004 [INFO][3322] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7 Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:49.010 [INFO][3322] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:49.021 [INFO][3322] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.21.1/26] block=192.168.21.0/26 handle="k8s-pod-network.2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:49.022 [INFO][3322] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.21.1/26] handle="k8s-pod-network.2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:49.022 [INFO][3322] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:49.115875 env[1202]: 2025-10-31 05:04:49.022 [INFO][3322] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.21.1/26] IPv6=[] ContainerID="2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" HandleID="k8s-pod-network.2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:49.118326 env[1202]: 2025-10-31 05:04:49.025 [INFO][3300] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-zh2rr" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0", GenerateName:"calico-apiserver-55bb969bf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"cc9bffc4-0639-44ba-8e71-6f37149ca54e", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55bb969bf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-55bb969bf9-zh2rr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2b83d237fa7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:49.118326 env[1202]: 2025-10-31 05:04:49.026 [INFO][3300] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.21.1/32] ContainerID="2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-zh2rr" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:49.118326 env[1202]: 2025-10-31 05:04:49.026 [INFO][3300] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2b83d237fa7 ContainerID="2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-zh2rr" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:49.118326 env[1202]: 2025-10-31 05:04:49.053 [INFO][3300] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-zh2rr" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:49.118326 env[1202]: 2025-10-31 05:04:49.061 [INFO][3300] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-zh2rr" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0", GenerateName:"calico-apiserver-55bb969bf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"cc9bffc4-0639-44ba-8e71-6f37149ca54e", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55bb969bf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7", Pod:"calico-apiserver-55bb969bf9-zh2rr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2b83d237fa7", MAC:"4e:cf:48:b2:1c:47", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:49.118326 env[1202]: 2025-10-31 05:04:49.083 [INFO][3300] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-zh2rr" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:49.173279 systemd-networkd[1021]: cali9d33131a9c6: Link UP Oct 31 05:04:49.176445 systemd-networkd[1021]: cali9d33131a9c6: Gained carrier Oct 31 05:04:49.176859 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9d33131a9c6: link becomes ready Oct 31 05:04:49.188823 env[1202]: time="2025-10-31T05:04:49.187572613Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:04:49.188823 env[1202]: time="2025-10-31T05:04:49.187682010Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:04:49.188823 env[1202]: time="2025-10-31T05:04:49.187699653Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:04:49.188823 env[1202]: time="2025-10-31T05:04:49.188289005Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7 pid=3376 runtime=io.containerd.runc.v2 Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:48.794 [INFO][3305] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:48.826 [INFO][3305] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0 coredns-668d6bf9bc- kube-system daaa5498-a71c-46db-8be5-9aa4926d4d61 934 0 2025-10-31 05:04:01 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-cjebs.gb1.brightbox.com coredns-668d6bf9bc-gmmg4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9d33131a9c6 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" Namespace="kube-system" Pod="coredns-668d6bf9bc-gmmg4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-" Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:48.826 [INFO][3305] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" Namespace="kube-system" Pod="coredns-668d6bf9bc-gmmg4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:48.950 [INFO][3330] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" HandleID="k8s-pod-network.cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:48.950 [INFO][3330] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" HandleID="k8s-pod-network.cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d55a0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-cjebs.gb1.brightbox.com", "pod":"coredns-668d6bf9bc-gmmg4", "timestamp":"2025-10-31 05:04:48.950170221 +0000 UTC"}, Hostname:"srv-cjebs.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:48.950 [INFO][3330] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.022 [INFO][3330] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.022 [INFO][3330] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cjebs.gb1.brightbox.com' Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.032 [INFO][3330] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.067 [INFO][3330] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.081 [INFO][3330] ipam/ipam.go 511: Trying affinity for 192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.093 [INFO][3330] ipam/ipam.go 158: Attempting to load block cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.107 [INFO][3330] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.107 [INFO][3330] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.115 [INFO][3330] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5 Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.132 [INFO][3330] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.143 [INFO][3330] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.21.2/26] block=192.168.21.0/26 handle="k8s-pod-network.cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.143 [INFO][3330] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.21.2/26] handle="k8s-pod-network.cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.143 [INFO][3330] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:49.205053 env[1202]: 2025-10-31 05:04:49.143 [INFO][3330] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.21.2/26] IPv6=[] ContainerID="cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" HandleID="k8s-pod-network.cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:49.208405 env[1202]: 2025-10-31 05:04:49.147 [INFO][3305] cni-plugin/k8s.go 418: Populated endpoint ContainerID="cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" Namespace="kube-system" Pod="coredns-668d6bf9bc-gmmg4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"daaa5498-a71c-46db-8be5-9aa4926d4d61", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"", Pod:"coredns-668d6bf9bc-gmmg4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9d33131a9c6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:49.208405 env[1202]: 2025-10-31 05:04:49.148 [INFO][3305] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.21.2/32] ContainerID="cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" Namespace="kube-system" Pod="coredns-668d6bf9bc-gmmg4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:49.208405 env[1202]: 2025-10-31 05:04:49.148 [INFO][3305] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9d33131a9c6 ContainerID="cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" Namespace="kube-system" Pod="coredns-668d6bf9bc-gmmg4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:49.208405 env[1202]: 2025-10-31 05:04:49.178 [INFO][3305] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" Namespace="kube-system" Pod="coredns-668d6bf9bc-gmmg4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:49.208405 env[1202]: 2025-10-31 05:04:49.179 [INFO][3305] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" Namespace="kube-system" Pod="coredns-668d6bf9bc-gmmg4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"daaa5498-a71c-46db-8be5-9aa4926d4d61", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5", Pod:"coredns-668d6bf9bc-gmmg4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9d33131a9c6", MAC:"ce:fd:d5:b4:7b:0f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:49.208405 env[1202]: 2025-10-31 05:04:49.196 [INFO][3305] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5" Namespace="kube-system" Pod="coredns-668d6bf9bc-gmmg4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:49.225562 systemd[1]: Started cri-containerd-2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7.scope. Oct 31 05:04:49.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit: BPF prog-id=139 op=LOAD Oct 31 05:04:49.254000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3376 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343133353662643262343339623961663337663764346663353238 Oct 31 05:04:49.254000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3376 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343133353662643262343339623961663337663764346663353238 Oct 31 05:04:49.254000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.254000 audit: BPF prog-id=140 op=LOAD Oct 31 05:04:49.254000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c03b0 items=0 ppid=3376 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343133353662643262343339623961663337663764346663353238 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit: BPF prog-id=141 op=LOAD Oct 31 05:04:49.255000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c03f8 items=0 ppid=3376 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343133353662643262343339623961663337663764346663353238 Oct 31 05:04:49.255000 audit: BPF prog-id=141 op=UNLOAD Oct 31 05:04:49.255000 audit: BPF prog-id=140 op=UNLOAD Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.255000 audit: BPF prog-id=142 op=LOAD Oct 31 05:04:49.255000 audit[3386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c0808 items=0 ppid=3376 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233343133353662643262343339623961663337663764346663353238 Oct 31 05:04:49.260849 env[1202]: time="2025-10-31T05:04:49.253697151Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:04:49.260849 env[1202]: time="2025-10-31T05:04:49.253879840Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:04:49.260849 env[1202]: time="2025-10-31T05:04:49.253927919Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:04:49.260849 env[1202]: time="2025-10-31T05:04:49.256440146Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5 pid=3409 runtime=io.containerd.runc.v2 Oct 31 05:04:49.276170 env[1202]: time="2025-10-31T05:04:49.276110035Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-568f7b959f-rlltz,Uid:3ce94692-be26-453d-ab7d-92c59a810174,Namespace:calico-system,Attempt:0,}" Oct 31 05:04:49.296946 systemd[1]: Started cri-containerd-cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5.scope. Oct 31 05:04:49.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.356000 audit: BPF prog-id=143 op=LOAD Oct 31 05:04:49.358000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.358000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3409 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363316564313938366563346239393336626666363236306264663036 Oct 31 05:04:49.358000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.358000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3409 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363316564313938366563346239393336626666363236306264663036 Oct 31 05:04:49.359000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.359000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.359000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.359000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.359000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.359000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.359000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.359000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.359000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.359000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.359000 audit: BPF prog-id=144 op=LOAD Oct 31 05:04:49.359000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00020bf90 items=0 ppid=3409 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363316564313938366563346239393336626666363236306264663036 Oct 31 05:04:49.360000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.360000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.360000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.360000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.360000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.360000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.360000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.360000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.360000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.360000 audit: BPF prog-id=145 op=LOAD Oct 31 05:04:49.360000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00020bfd8 items=0 ppid=3409 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363316564313938366563346239393336626666363236306264663036 Oct 31 05:04:49.363000 audit: BPF prog-id=145 op=UNLOAD Oct 31 05:04:49.363000 audit: BPF prog-id=144 op=UNLOAD Oct 31 05:04:49.363000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.363000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.363000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.363000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.363000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.363000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.363000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.363000 audit[3424]: AVC avc: denied { perfmon } for pid=3424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.363000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.363000 audit[3424]: AVC avc: denied { bpf } for pid=3424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.363000 audit: BPF prog-id=146 op=LOAD Oct 31 05:04:49.363000 audit[3424]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00039e3e8 items=0 ppid=3409 pid=3424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363316564313938366563346239393336626666363236306264663036 Oct 31 05:04:49.447839 env[1202]: time="2025-10-31T05:04:49.447782573Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55bb969bf9-zh2rr,Uid:cc9bffc4-0639-44ba-8e71-6f37149ca54e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7\"" Oct 31 05:04:49.454717 env[1202]: time="2025-10-31T05:04:49.454674948Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-gmmg4,Uid:daaa5498-a71c-46db-8be5-9aa4926d4d61,Namespace:kube-system,Attempt:1,} returns sandbox id \"cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5\"" Oct 31 05:04:49.457207 env[1202]: time="2025-10-31T05:04:49.457158566Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:04:49.462874 env[1202]: time="2025-10-31T05:04:49.462834740Z" level=info msg="CreateContainer within sandbox \"cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 31 05:04:49.476977 env[1202]: time="2025-10-31T05:04:49.476898612Z" level=info msg="StopPodSandbox for \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\"" Oct 31 05:04:49.478161 kubelet[2006]: I1031 05:04:49.478114 2006 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f" path="/var/lib/kubelet/pods/5110e5cb-a9c4-46f6-b5b1-6ad1537c4a4f/volumes" Oct 31 05:04:49.504036 env[1202]: time="2025-10-31T05:04:49.503966462Z" level=info msg="CreateContainer within sandbox \"cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"218dabe052fabc7325282f25046a3165574efb09e110b23b4c0c84931d6ebf8d\"" Oct 31 05:04:49.506266 env[1202]: time="2025-10-31T05:04:49.504973127Z" level=info msg="StartContainer for \"218dabe052fabc7325282f25046a3165574efb09e110b23b4c0c84931d6ebf8d\"" Oct 31 05:04:49.555000 audit[3530]: AVC avc: denied { write } for pid=3530 comm="tee" name="fd" dev="proc" ino=31082 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:04:49.555000 audit[3530]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc25ab17d3 a2=241 a3=1b6 items=1 ppid=3470 pid=3530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.555000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 31 05:04:49.555000 audit: PATH item=0 name="/dev/fd/63" inode=31064 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:04:49.555000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:04:49.578000 audit[3542]: AVC avc: denied { write } for pid=3542 comm="tee" name="fd" dev="proc" ino=30567 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:04:49.580000 audit[3535]: AVC avc: denied { write } for pid=3535 comm="tee" name="fd" dev="proc" ino=30570 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:04:49.599000 audit[3533]: AVC avc: denied { write } for pid=3533 comm="tee" name="fd" dev="proc" ino=31099 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:04:49.599000 audit[3533]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffebd12f7c1 a2=241 a3=1b6 items=1 ppid=3469 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.599000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 31 05:04:49.599000 audit: PATH item=0 name="/dev/fd/63" inode=31069 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:04:49.599000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:04:49.602000 audit[3537]: AVC avc: denied { write } for pid=3537 comm="tee" name="fd" dev="proc" ino=30573 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:04:49.609000 audit[3544]: AVC avc: denied { write } for pid=3544 comm="tee" name="fd" dev="proc" ino=30585 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:04:49.602000 audit[3537]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3cbfe7d1 a2=241 a3=1b6 items=1 ppid=3462 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.602000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 31 05:04:49.602000 audit: PATH item=0 name="/dev/fd/63" inode=30549 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:04:49.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:04:49.578000 audit[3542]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee1b807d1 a2=241 a3=1b6 items=1 ppid=3463 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.578000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 31 05:04:49.578000 audit: PATH item=0 name="/dev/fd/63" inode=30550 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:04:49.578000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:04:49.580000 audit[3535]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcfcf367c2 a2=241 a3=1b6 items=1 ppid=3464 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.580000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 31 05:04:49.580000 audit: PATH item=0 name="/dev/fd/63" inode=31072 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:04:49.580000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:04:49.609000 audit[3544]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff346037d2 a2=241 a3=1b6 items=1 ppid=3460 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.626827 systemd[1]: Started cri-containerd-218dabe052fabc7325282f25046a3165574efb09e110b23b4c0c84931d6ebf8d.scope. Oct 31 05:04:49.609000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 31 05:04:49.609000 audit: PATH item=0 name="/dev/fd/63" inode=30551 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:04:49.609000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:04:49.638000 audit[3566]: AVC avc: denied { write } for pid=3566 comm="tee" name="fd" dev="proc" ino=30595 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:04:49.638000 audit[3566]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd1ea37d1 a2=241 a3=1b6 items=1 ppid=3472 pid=3566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.638000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 31 05:04:49.638000 audit: PATH item=0 name="/dev/fd/63" inode=31090 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:04:49.638000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:04:49.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.670000 audit: BPF prog-id=147 op=LOAD Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3409 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231386461626530353266616263373332353238326632353034366133 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3409 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231386461626530353266616263373332353238326632353034366133 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit: BPF prog-id=148 op=LOAD Oct 31 05:04:49.671000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000345d30 items=0 ppid=3409 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231386461626530353266616263373332353238326632353034366133 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit: BPF prog-id=149 op=LOAD Oct 31 05:04:49.671000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000345d78 items=0 ppid=3409 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231386461626530353266616263373332353238326632353034366133 Oct 31 05:04:49.671000 audit: BPF prog-id=149 op=UNLOAD Oct 31 05:04:49.671000 audit: BPF prog-id=148 op=UNLOAD Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:49.671000 audit: BPF prog-id=150 op=LOAD Oct 31 05:04:49.671000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000392188 items=0 ppid=3409 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:49.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231386461626530353266616263373332353238326632353034366133 Oct 31 05:04:49.706949 systemd-networkd[1021]: cali4f76188f2e4: Link UP Oct 31 05:04:49.710969 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4f76188f2e4: link becomes ready Oct 31 05:04:49.715801 systemd-networkd[1021]: cali4f76188f2e4: Gained carrier Oct 31 05:04:49.737023 env[1202]: time="2025-10-31T05:04:49.736967584Z" level=info msg="StartContainer for \"218dabe052fabc7325282f25046a3165574efb09e110b23b4c0c84931d6ebf8d\" returns successfully" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.428 [INFO][3433] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.462 [INFO][3433] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0 whisker-568f7b959f- calico-system 3ce94692-be26-453d-ab7d-92c59a810174 947 0 2025-10-31 05:04:48 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:568f7b959f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s srv-cjebs.gb1.brightbox.com whisker-568f7b959f-rlltz eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali4f76188f2e4 [] [] }} ContainerID="73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" Namespace="calico-system" Pod="whisker-568f7b959f-rlltz" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.462 [INFO][3433] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" Namespace="calico-system" Pod="whisker-568f7b959f-rlltz" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.553 [INFO][3506] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" HandleID="k8s-pod-network.73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" Workload="srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.553 [INFO][3506] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" HandleID="k8s-pod-network.73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" Workload="srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f700), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-cjebs.gb1.brightbox.com", "pod":"whisker-568f7b959f-rlltz", "timestamp":"2025-10-31 05:04:49.553060351 +0000 UTC"}, Hostname:"srv-cjebs.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.553 [INFO][3506] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.553 [INFO][3506] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.553 [INFO][3506] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cjebs.gb1.brightbox.com' Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.578 [INFO][3506] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.618 [INFO][3506] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.649 [INFO][3506] ipam/ipam.go 511: Trying affinity for 192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.653 [INFO][3506] ipam/ipam.go 158: Attempting to load block cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.657 [INFO][3506] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.657 [INFO][3506] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.666 [INFO][3506] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.684 [INFO][3506] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.699 [INFO][3506] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.21.3/26] block=192.168.21.0/26 handle="k8s-pod-network.73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.699 [INFO][3506] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.21.3/26] handle="k8s-pod-network.73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.699 [INFO][3506] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:49.762476 env[1202]: 2025-10-31 05:04:49.699 [INFO][3506] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.21.3/26] IPv6=[] ContainerID="73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" HandleID="k8s-pod-network.73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" Workload="srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0" Oct 31 05:04:49.763828 env[1202]: 2025-10-31 05:04:49.701 [INFO][3433] cni-plugin/k8s.go 418: Populated endpoint ContainerID="73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" Namespace="calico-system" Pod="whisker-568f7b959f-rlltz" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0", GenerateName:"whisker-568f7b959f-", Namespace:"calico-system", SelfLink:"", UID:"3ce94692-be26-453d-ab7d-92c59a810174", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"568f7b959f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"", Pod:"whisker-568f7b959f-rlltz", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.21.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali4f76188f2e4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:49.763828 env[1202]: 2025-10-31 05:04:49.702 [INFO][3433] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.21.3/32] ContainerID="73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" Namespace="calico-system" Pod="whisker-568f7b959f-rlltz" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0" Oct 31 05:04:49.763828 env[1202]: 2025-10-31 05:04:49.702 [INFO][3433] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4f76188f2e4 ContainerID="73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" Namespace="calico-system" Pod="whisker-568f7b959f-rlltz" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0" Oct 31 05:04:49.763828 env[1202]: 2025-10-31 05:04:49.721 [INFO][3433] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" Namespace="calico-system" Pod="whisker-568f7b959f-rlltz" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0" Oct 31 05:04:49.763828 env[1202]: 2025-10-31 05:04:49.724 [INFO][3433] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" Namespace="calico-system" Pod="whisker-568f7b959f-rlltz" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0", GenerateName:"whisker-568f7b959f-", Namespace:"calico-system", SelfLink:"", UID:"3ce94692-be26-453d-ab7d-92c59a810174", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"568f7b959f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f", Pod:"whisker-568f7b959f-rlltz", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.21.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali4f76188f2e4", MAC:"fa:bf:e5:df:31:01", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:49.763828 env[1202]: 2025-10-31 05:04:49.754 [INFO][3433] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f" Namespace="calico-system" Pod="whisker-568f7b959f-rlltz" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-whisker--568f7b959f--rlltz-eth0" Oct 31 05:04:49.776354 env[1202]: time="2025-10-31T05:04:49.776293763Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:04:49.777532 env[1202]: time="2025-10-31T05:04:49.777426750Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:04:49.778482 kubelet[2006]: E1031 05:04:49.778416 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:04:49.778648 kubelet[2006]: E1031 05:04:49.778505 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:04:49.784509 kubelet[2006]: E1031 05:04:49.784408 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-24cwm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-55bb969bf9-zh2rr_calico-apiserver(cc9bffc4-0639-44ba-8e71-6f37149ca54e): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:04:49.785625 kubelet[2006]: E1031 05:04:49.785583 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:04:49.818398 kubelet[2006]: E1031 05:04:49.818079 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:04:49.818000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:04:49.818000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00123c100 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:04:49.818000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:04:49.818000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:04:49.818000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001653860 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:04:49.818000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:04:49.841503 env[1202]: time="2025-10-31T05:04:49.841363187Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:04:49.841774 env[1202]: time="2025-10-31T05:04:49.841612740Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:04:49.841774 env[1202]: time="2025-10-31T05:04:49.841660695Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:04:49.844809 env[1202]: time="2025-10-31T05:04:49.843028335Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f pid=3625 runtime=io.containerd.runc.v2 Oct 31 05:04:49.880523 systemd[1]: Started cri-containerd-73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f.scope. Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.679 [INFO][3515] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.679 [INFO][3515] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" iface="eth0" netns="/var/run/netns/cni-3969f930-d84e-5c51-cb8c-9f2aab06377b" Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.679 [INFO][3515] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" iface="eth0" netns="/var/run/netns/cni-3969f930-d84e-5c51-cb8c-9f2aab06377b" Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.679 [INFO][3515] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" iface="eth0" netns="/var/run/netns/cni-3969f930-d84e-5c51-cb8c-9f2aab06377b" Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.679 [INFO][3515] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.679 [INFO][3515] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.834 [INFO][3595] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" HandleID="k8s-pod-network.db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Workload="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.835 [INFO][3595] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.835 [INFO][3595] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.868 [WARNING][3595] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" HandleID="k8s-pod-network.db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Workload="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.868 [INFO][3595] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" HandleID="k8s-pod-network.db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Workload="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.905 [INFO][3595] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:49.909884 env[1202]: 2025-10-31 05:04:49.907 [INFO][3515] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:49.911957 env[1202]: time="2025-10-31T05:04:49.911910487Z" level=info msg="TearDown network for sandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\" successfully" Oct 31 05:04:49.912104 env[1202]: time="2025-10-31T05:04:49.912071782Z" level=info msg="StopPodSandbox for \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\" returns successfully" Oct 31 05:04:49.913466 env[1202]: time="2025-10-31T05:04:49.913427949Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-xm6v4,Uid:1790b000-669c-4853-a4f7-2a387055fce3,Namespace:calico-system,Attempt:1,}" Oct 31 05:04:49.933036 kubelet[2006]: I1031 05:04:49.931336 2006 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-gmmg4" podStartSLOduration=48.931313919 podStartE2EDuration="48.931313919s" podCreationTimestamp="2025-10-31 05:04:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:04:49.923639958 +0000 UTC m=+54.654532274" watchObservedRunningTime="2025-10-31 05:04:49.931313919 +0000 UTC m=+54.662206241" Oct 31 05:04:50.000000 audit[3586]: AVC avc: denied { getattr } for pid=3586 comm="coredns" path="cgroup:[4026532852]" dev="nsfs" ino=4026532852 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c995 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 31 05:04:50.000000 audit[3586]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a828 a2=c000129078 a3=0 items=0 ppid=3409 pid=3586 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c995 key=(null) Oct 31 05:04:50.000000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 31 05:04:50.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.112000 audit: BPF prog-id=151 op=LOAD Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3625 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623965613965663265643664356139336137363039376530363138 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3625 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623965613965663265643664356139336137363039376530363138 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit: BPF prog-id=152 op=LOAD Oct 31 05:04:50.113000 audit[3644]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002d3ce0 items=0 ppid=3625 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623965613965663265643664356139336137363039376530363138 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit: BPF prog-id=153 op=LOAD Oct 31 05:04:50.113000 audit[3644]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002d3d28 items=0 ppid=3625 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623965613965663265643664356139336137363039376530363138 Oct 31 05:04:50.113000 audit: BPF prog-id=153 op=UNLOAD Oct 31 05:04:50.113000 audit: BPF prog-id=152 op=UNLOAD Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { perfmon } for pid=3644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit[3644]: AVC avc: denied { bpf } for pid=3644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.113000 audit: BPF prog-id=154 op=LOAD Oct 31 05:04:50.113000 audit[3644]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000356138 items=0 ppid=3625 pid=3644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733623965613965663265643664356139336137363039376530363138 Oct 31 05:04:50.184162 systemd-networkd[1021]: cali1233a126ef2: Link UP Oct 31 05:04:50.192389 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 05:04:50.192610 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1233a126ef2: link becomes ready Oct 31 05:04:50.193032 systemd-networkd[1021]: cali1233a126ef2: Gained carrier Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.015 [INFO][3660] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.034 [INFO][3660] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0 goldmane-666569f655- calico-system 1790b000-669c-4853-a4f7-2a387055fce3 963 0 2025-10-31 05:04:17 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:666569f655 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s srv-cjebs.gb1.brightbox.com goldmane-666569f655-xm6v4 eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali1233a126ef2 [] [] }} ContainerID="c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" Namespace="calico-system" Pod="goldmane-666569f655-xm6v4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-" Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.034 [INFO][3660] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" Namespace="calico-system" Pod="goldmane-666569f655-xm6v4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.098 [INFO][3691] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" HandleID="k8s-pod-network.c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" Workload="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.099 [INFO][3691] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" HandleID="k8s-pod-network.c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" Workload="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd5a0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-cjebs.gb1.brightbox.com", "pod":"goldmane-666569f655-xm6v4", "timestamp":"2025-10-31 05:04:50.098658529 +0000 UTC"}, Hostname:"srv-cjebs.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.099 [INFO][3691] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.099 [INFO][3691] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.099 [INFO][3691] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cjebs.gb1.brightbox.com' Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.109 [INFO][3691] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.132 [INFO][3691] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.139 [INFO][3691] ipam/ipam.go 511: Trying affinity for 192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.151 [INFO][3691] ipam/ipam.go 158: Attempting to load block cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.155 [INFO][3691] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.155 [INFO][3691] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.158 [INFO][3691] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8 Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.165 [INFO][3691] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.174 [INFO][3691] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.21.4/26] block=192.168.21.0/26 handle="k8s-pod-network.c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.174 [INFO][3691] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.21.4/26] handle="k8s-pod-network.c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.174 [INFO][3691] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:50.236909 env[1202]: 2025-10-31 05:04:50.174 [INFO][3691] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.21.4/26] IPv6=[] ContainerID="c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" HandleID="k8s-pod-network.c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" Workload="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:50.238941 env[1202]: 2025-10-31 05:04:50.177 [INFO][3660] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" Namespace="calico-system" Pod="goldmane-666569f655-xm6v4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"1790b000-669c-4853-a4f7-2a387055fce3", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"", Pod:"goldmane-666569f655-xm6v4", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.21.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali1233a126ef2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:50.238941 env[1202]: 2025-10-31 05:04:50.177 [INFO][3660] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.21.4/32] ContainerID="c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" Namespace="calico-system" Pod="goldmane-666569f655-xm6v4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:50.238941 env[1202]: 2025-10-31 05:04:50.178 [INFO][3660] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1233a126ef2 ContainerID="c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" Namespace="calico-system" Pod="goldmane-666569f655-xm6v4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:50.238941 env[1202]: 2025-10-31 05:04:50.208 [INFO][3660] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" Namespace="calico-system" Pod="goldmane-666569f655-xm6v4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:50.238941 env[1202]: 2025-10-31 05:04:50.209 [INFO][3660] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" Namespace="calico-system" Pod="goldmane-666569f655-xm6v4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"1790b000-669c-4853-a4f7-2a387055fce3", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8", Pod:"goldmane-666569f655-xm6v4", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.21.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali1233a126ef2", MAC:"36:ab:15:cd:74:a4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:50.238941 env[1202]: 2025-10-31 05:04:50.234 [INFO][3660] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8" Namespace="calico-system" Pod="goldmane-666569f655-xm6v4" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:50.268538 env[1202]: time="2025-10-31T05:04:50.268423698Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:04:50.268827 env[1202]: time="2025-10-31T05:04:50.268508109Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:04:50.268827 env[1202]: time="2025-10-31T05:04:50.268525073Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:04:50.268827 env[1202]: time="2025-10-31T05:04:50.268770454Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8 pid=3714 runtime=io.containerd.runc.v2 Oct 31 05:04:50.297743 systemd[1]: Started cri-containerd-c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8.scope. Oct 31 05:04:50.308000 audit[3713]: NETFILTER_CFG table=filter:105 family=2 entries=20 op=nft_register_rule pid=3713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:50.308000 audit[3713]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc91ff5b40 a2=0 a3=7ffc91ff5b2c items=0 ppid=2114 pid=3713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.308000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:50.314000 audit[3713]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:50.314000 audit[3713]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc91ff5b40 a2=0 a3=0 items=0 ppid=2114 pid=3713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:50.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.345000 audit: BPF prog-id=155 op=LOAD Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3714 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332373938323439646230326166366530333838303433366430656363 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3714 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332373938323439646230326166366530333838303433366430656363 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit: BPF prog-id=156 op=LOAD Oct 31 05:04:50.346000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c6cd0 items=0 ppid=3714 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332373938323439646230326166366530333838303433366430656363 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit: BPF prog-id=157 op=LOAD Oct 31 05:04:50.346000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c6d18 items=0 ppid=3714 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332373938323439646230326166366530333838303433366430656363 Oct 31 05:04:50.346000 audit: BPF prog-id=157 op=UNLOAD Oct 31 05:04:50.346000 audit: BPF prog-id=156 op=UNLOAD Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { perfmon } for pid=3723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit[3723]: AVC avc: denied { bpf } for pid=3723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:50.346000 audit: BPF prog-id=158 op=LOAD Oct 31 05:04:50.346000 audit[3723]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c7128 items=0 ppid=3714 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332373938323439646230326166366530333838303433366430656363 Oct 31 05:04:50.412989 systemd-networkd[1021]: cali9d33131a9c6: Gained IPv6LL Oct 31 05:04:50.425332 env[1202]: time="2025-10-31T05:04:50.425269500Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-568f7b959f-rlltz,Uid:3ce94692-be26-453d-ab7d-92c59a810174,Namespace:calico-system,Attempt:0,} returns sandbox id \"73b9ea9ef2ed6d5a93a76097e0618edf38b14ebb3e20f0607fd300e53a4e017f\"" Oct 31 05:04:50.428042 env[1202]: time="2025-10-31T05:04:50.427977084Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 05:04:50.452000 audit[3749]: NETFILTER_CFG table=filter:107 family=2 entries=20 op=nft_register_rule pid=3749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:50.452000 audit[3749]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffffe366400 a2=0 a3=7ffffe3663ec items=0 ppid=2114 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:50.457000 audit[3749]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=3749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:50.457000 audit[3749]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffffe366400 a2=0 a3=0 items=0 ppid=2114 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:50.457000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:50.474378 env[1202]: time="2025-10-31T05:04:50.474323658Z" level=info msg="StopPodSandbox for \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\"" Oct 31 05:04:50.476924 env[1202]: time="2025-10-31T05:04:50.476877335Z" level=info msg="StopPodSandbox for \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\"" Oct 31 05:04:50.542350 env[1202]: time="2025-10-31T05:04:50.542215392Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-xm6v4,Uid:1790b000-669c-4853-a4f7-2a387055fce3,Namespace:calico-system,Attempt:1,} returns sandbox id \"c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8\"" Oct 31 05:04:50.596089 systemd[1]: run-containerd-runc-k8s.io-a1ceedce063cf46f9faf5b741490b25b94cf051b79377fd7fa1e870809d65170-runc.CxpFiL.mount: Deactivated successfully. Oct 31 05:04:50.596287 systemd[1]: run-netns-cni\x2d3969f930\x2dd84e\x2d5c51\x2dcb8c\x2d9f2aab06377b.mount: Deactivated successfully. Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.669 [INFO][3779] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.669 [INFO][3779] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" iface="eth0" netns="/var/run/netns/cni-046dfd7b-3728-b7ec-8fc4-97a25bcdb77c" Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.669 [INFO][3779] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" iface="eth0" netns="/var/run/netns/cni-046dfd7b-3728-b7ec-8fc4-97a25bcdb77c" Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.670 [INFO][3779] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" iface="eth0" netns="/var/run/netns/cni-046dfd7b-3728-b7ec-8fc4-97a25bcdb77c" Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.670 [INFO][3779] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.671 [INFO][3779] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.770 [INFO][3792] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" HandleID="k8s-pod-network.d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.777 [INFO][3792] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.777 [INFO][3792] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.786 [WARNING][3792] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" HandleID="k8s-pod-network.d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.786 [INFO][3792] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" HandleID="k8s-pod-network.d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.789 [INFO][3792] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:50.797536 env[1202]: 2025-10-31 05:04:50.795 [INFO][3779] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:50.805355 systemd[1]: run-netns-cni\x2d046dfd7b\x2d3728\x2db7ec\x2d8fc4\x2d97a25bcdb77c.mount: Deactivated successfully. Oct 31 05:04:50.807371 env[1202]: time="2025-10-31T05:04:50.807309937Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:04:50.807936 env[1202]: time="2025-10-31T05:04:50.807702668Z" level=info msg="TearDown network for sandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\" successfully" Oct 31 05:04:50.808160 env[1202]: time="2025-10-31T05:04:50.808128267Z" level=info msg="StopPodSandbox for \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\" returns successfully" Oct 31 05:04:50.808951 env[1202]: time="2025-10-31T05:04:50.808861907Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 05:04:50.809377 kubelet[2006]: E1031 05:04:50.809265 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:04:50.809847 kubelet[2006]: E1031 05:04:50.809396 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:04:50.809847 kubelet[2006]: E1031 05:04:50.809776 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:763067b974934c319e4416875c9b0696,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-8llcg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-568f7b959f-rlltz_calico-system(3ce94692-be26-453d-ab7d-92c59a810174): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 05:04:50.810245 env[1202]: time="2025-10-31T05:04:50.810204137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-92jt8,Uid:b4fc44f0-a36e-4bf3-903a-44dcc680ff0d,Namespace:kube-system,Attempt:1,}" Oct 31 05:04:50.810990 env[1202]: time="2025-10-31T05:04:50.810950556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 05:04:50.838388 kubelet[2006]: E1031 05:04:50.838304 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.701 [INFO][3780] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.701 [INFO][3780] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" iface="eth0" netns="/var/run/netns/cni-e2756daa-58b2-6f1b-7bf4-6367084f8ae0" Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.702 [INFO][3780] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" iface="eth0" netns="/var/run/netns/cni-e2756daa-58b2-6f1b-7bf4-6367084f8ae0" Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.702 [INFO][3780] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" iface="eth0" netns="/var/run/netns/cni-e2756daa-58b2-6f1b-7bf4-6367084f8ae0" Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.702 [INFO][3780] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.702 [INFO][3780] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.829 [INFO][3798] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" HandleID="k8s-pod-network.b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Workload="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.830 [INFO][3798] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.830 [INFO][3798] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.848 [WARNING][3798] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" HandleID="k8s-pod-network.b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Workload="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.848 [INFO][3798] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" HandleID="k8s-pod-network.b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Workload="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.883 [INFO][3798] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:50.901242 env[1202]: 2025-10-31 05:04:50.886 [INFO][3780] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:50.901242 env[1202]: time="2025-10-31T05:04:50.891034745Z" level=info msg="TearDown network for sandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\" successfully" Oct 31 05:04:50.901242 env[1202]: time="2025-10-31T05:04:50.891082986Z" level=info msg="StopPodSandbox for \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\" returns successfully" Oct 31 05:04:50.894430 systemd[1]: run-netns-cni\x2de2756daa\x2d58b2\x2d6f1b\x2d7bf4\x2d6367084f8ae0.mount: Deactivated successfully. Oct 31 05:04:50.904673 env[1202]: time="2025-10-31T05:04:50.903890407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mtt9j,Uid:f35619da-c214-4156-aacf-d0404664f402,Namespace:calico-system,Attempt:1,}" Oct 31 05:04:51.046107 systemd-networkd[1021]: cali2b83d237fa7: Gained IPv6LL Oct 31 05:04:51.132773 env[1202]: time="2025-10-31T05:04:51.130952275Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:04:51.134076 env[1202]: time="2025-10-31T05:04:51.134013620Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 05:04:51.135917 kubelet[2006]: E1031 05:04:51.134529 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:04:51.135917 kubelet[2006]: E1031 05:04:51.134692 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:04:51.135917 kubelet[2006]: E1031 05:04:51.135346 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-4nn4g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-xm6v4_calico-system(1790b000-669c-4853-a4f7-2a387055fce3): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 05:04:51.136319 env[1202]: time="2025-10-31T05:04:51.136106398Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 05:04:51.136582 kubelet[2006]: E1031 05:04:51.136486 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:04:51.149000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:04:51.149000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c010657ad0 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:04:51.149000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:04:51.148000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526391 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:04:51.148000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0109e22d0 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:04:51.149000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:04:51.149000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00f70da40 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:04:51.149000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:04:51.148000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:04:51.151000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526397 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:04:51.151000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0109e2300 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:04:51.151000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:04:51.201000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:04:51.201000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00fac89a0 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:04:51.201000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:04:51.202000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:04:51.202000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c0109e3710 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:04:51.202000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:04:51.251839 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 05:04:51.251962 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9f4d8df8923: link becomes ready Oct 31 05:04:51.254045 systemd-networkd[1021]: cali9f4d8df8923: Link UP Oct 31 05:04:51.254350 systemd-networkd[1021]: cali9f4d8df8923: Gained carrier Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:50.962 [INFO][3806] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.000 [INFO][3806] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0 coredns-668d6bf9bc- kube-system b4fc44f0-a36e-4bf3-903a-44dcc680ff0d 990 0 2025-10-31 05:04:01 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-cjebs.gb1.brightbox.com coredns-668d6bf9bc-92jt8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9f4d8df8923 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" Namespace="kube-system" Pod="coredns-668d6bf9bc-92jt8" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-" Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.000 [INFO][3806] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" Namespace="kube-system" Pod="coredns-668d6bf9bc-92jt8" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.127 [INFO][3829] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" HandleID="k8s-pod-network.73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.127 [INFO][3829] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" HandleID="k8s-pod-network.73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c96e0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-cjebs.gb1.brightbox.com", "pod":"coredns-668d6bf9bc-92jt8", "timestamp":"2025-10-31 05:04:51.127077871 +0000 UTC"}, Hostname:"srv-cjebs.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.127 [INFO][3829] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.127 [INFO][3829] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.127 [INFO][3829] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cjebs.gb1.brightbox.com' Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.166 [INFO][3829] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.180 [INFO][3829] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.195 [INFO][3829] ipam/ipam.go 511: Trying affinity for 192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.197 [INFO][3829] ipam/ipam.go 158: Attempting to load block cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.201 [INFO][3829] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.201 [INFO][3829] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.207 [INFO][3829] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.217 [INFO][3829] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.241 [INFO][3829] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.21.5/26] block=192.168.21.0/26 handle="k8s-pod-network.73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.242 [INFO][3829] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.21.5/26] handle="k8s-pod-network.73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.242 [INFO][3829] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:51.290879 env[1202]: 2025-10-31 05:04:51.242 [INFO][3829] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.21.5/26] IPv6=[] ContainerID="73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" HandleID="k8s-pod-network.73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:51.292696 env[1202]: 2025-10-31 05:04:51.245 [INFO][3806] cni-plugin/k8s.go 418: Populated endpoint ContainerID="73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" Namespace="kube-system" Pod="coredns-668d6bf9bc-92jt8" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"b4fc44f0-a36e-4bf3-903a-44dcc680ff0d", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"", Pod:"coredns-668d6bf9bc-92jt8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9f4d8df8923", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:51.292696 env[1202]: 2025-10-31 05:04:51.245 [INFO][3806] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.21.5/32] ContainerID="73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" Namespace="kube-system" Pod="coredns-668d6bf9bc-92jt8" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:51.292696 env[1202]: 2025-10-31 05:04:51.245 [INFO][3806] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9f4d8df8923 ContainerID="73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" Namespace="kube-system" Pod="coredns-668d6bf9bc-92jt8" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:51.292696 env[1202]: 2025-10-31 05:04:51.252 [INFO][3806] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" Namespace="kube-system" Pod="coredns-668d6bf9bc-92jt8" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:51.292696 env[1202]: 2025-10-31 05:04:51.252 [INFO][3806] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" Namespace="kube-system" Pod="coredns-668d6bf9bc-92jt8" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"b4fc44f0-a36e-4bf3-903a-44dcc680ff0d", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae", Pod:"coredns-668d6bf9bc-92jt8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9f4d8df8923", MAC:"ba:79:73:dd:07:39", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:51.292696 env[1202]: 2025-10-31 05:04:51.287 [INFO][3806] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae" Namespace="kube-system" Pod="coredns-668d6bf9bc-92jt8" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:51.343737 env[1202]: time="2025-10-31T05:04:51.343469463Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:04:51.343737 env[1202]: time="2025-10-31T05:04:51.343651054Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:04:51.347545 env[1202]: time="2025-10-31T05:04:51.343702141Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:04:51.350089 env[1202]: time="2025-10-31T05:04:51.350023786Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae pid=3859 runtime=io.containerd.runc.v2 Oct 31 05:04:51.389119 systemd[1]: Started cri-containerd-73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae.scope. Oct 31 05:04:51.403962 systemd-networkd[1021]: califa3e2059ab6: Link UP Oct 31 05:04:51.408411 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califa3e2059ab6: link becomes ready Oct 31 05:04:51.411178 systemd-networkd[1021]: califa3e2059ab6: Gained carrier Oct 31 05:04:51.458392 env[1202]: time="2025-10-31T05:04:51.458318338Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:04:51.459673 env[1202]: time="2025-10-31T05:04:51.459570517Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 05:04:51.460172 kubelet[2006]: E1031 05:04:51.460093 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:04:51.460285 kubelet[2006]: E1031 05:04:51.460203 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:04:51.460513 kubelet[2006]: E1031 05:04:51.460418 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8llcg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-568f7b959f-rlltz_calico-system(3ce94692-be26-453d-ab7d-92c59a810174): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 05:04:51.461724 kubelet[2006]: E1031 05:04:51.461657 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-568f7b959f-rlltz" podUID="3ce94692-be26-453d-ab7d-92c59a810174" Oct 31 05:04:51.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.468000 audit: BPF prog-id=159 op=LOAD Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3859 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626635313964386136656564616436613839663165343462303431 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3859 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626635313964386136656564616436613839663165343462303431 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit: BPF prog-id=160 op=LOAD Oct 31 05:04:51.469000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000265ea0 items=0 ppid=3859 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626635313964386136656564616436613839663165343462303431 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit: BPF prog-id=161 op=LOAD Oct 31 05:04:51.469000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000265ee8 items=0 ppid=3859 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626635313964386136656564616436613839663165343462303431 Oct 31 05:04:51.469000 audit: BPF prog-id=161 op=UNLOAD Oct 31 05:04:51.469000 audit: BPF prog-id=160 op=UNLOAD Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.469000 audit: BPF prog-id=162 op=LOAD Oct 31 05:04:51.469000 audit[3870]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e62f8 items=0 ppid=3859 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626635313964386136656564616436613839663165343462303431 Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.089 [INFO][3817] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.134 [INFO][3817] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0 csi-node-driver- calico-system f35619da-c214-4156-aacf-d0404664f402 991 0 2025-10-31 05:04:19 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-cjebs.gb1.brightbox.com csi-node-driver-mtt9j eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] califa3e2059ab6 [] [] }} ContainerID="635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" Namespace="calico-system" Pod="csi-node-driver-mtt9j" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-" Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.134 [INFO][3817] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" Namespace="calico-system" Pod="csi-node-driver-mtt9j" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.293 [INFO][3837] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" HandleID="k8s-pod-network.635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" Workload="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.294 [INFO][3837] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" HandleID="k8s-pod-network.635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" Workload="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000122320), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-cjebs.gb1.brightbox.com", "pod":"csi-node-driver-mtt9j", "timestamp":"2025-10-31 05:04:51.293614713 +0000 UTC"}, Hostname:"srv-cjebs.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.296 [INFO][3837] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.296 [INFO][3837] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.297 [INFO][3837] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cjebs.gb1.brightbox.com' Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.314 [INFO][3837] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.327 [INFO][3837] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.347 [INFO][3837] ipam/ipam.go 511: Trying affinity for 192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.350 [INFO][3837] ipam/ipam.go 158: Attempting to load block cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.355 [INFO][3837] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.355 [INFO][3837] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.360 [INFO][3837] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.372 [INFO][3837] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.396 [INFO][3837] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.21.6/26] block=192.168.21.0/26 handle="k8s-pod-network.635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.396 [INFO][3837] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.21.6/26] handle="k8s-pod-network.635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.396 [INFO][3837] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:51.488042 env[1202]: 2025-10-31 05:04:51.396 [INFO][3837] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.21.6/26] IPv6=[] ContainerID="635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" HandleID="k8s-pod-network.635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" Workload="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:51.489810 env[1202]: 2025-10-31 05:04:51.398 [INFO][3817] cni-plugin/k8s.go 418: Populated endpoint ContainerID="635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" Namespace="calico-system" Pod="csi-node-driver-mtt9j" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f35619da-c214-4156-aacf-d0404664f402", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-mtt9j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.21.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califa3e2059ab6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:51.489810 env[1202]: 2025-10-31 05:04:51.398 [INFO][3817] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.21.6/32] ContainerID="635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" Namespace="calico-system" Pod="csi-node-driver-mtt9j" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:51.489810 env[1202]: 2025-10-31 05:04:51.398 [INFO][3817] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califa3e2059ab6 ContainerID="635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" Namespace="calico-system" Pod="csi-node-driver-mtt9j" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:51.489810 env[1202]: 2025-10-31 05:04:51.416 [INFO][3817] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" Namespace="calico-system" Pod="csi-node-driver-mtt9j" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:51.489810 env[1202]: 2025-10-31 05:04:51.422 [INFO][3817] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" Namespace="calico-system" Pod="csi-node-driver-mtt9j" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f35619da-c214-4156-aacf-d0404664f402", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef", Pod:"csi-node-driver-mtt9j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.21.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califa3e2059ab6", MAC:"1a:dd:a0:56:a1:0f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:51.489810 env[1202]: 2025-10-31 05:04:51.483 [INFO][3817] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef" Namespace="calico-system" Pod="csi-node-driver-mtt9j" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:51.511528 env[1202]: time="2025-10-31T05:04:51.510381862Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:04:51.511528 env[1202]: time="2025-10-31T05:04:51.510459221Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:04:51.511528 env[1202]: time="2025-10-31T05:04:51.510495333Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:04:51.511528 env[1202]: time="2025-10-31T05:04:51.510716936Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef pid=3904 runtime=io.containerd.runc.v2 Oct 31 05:04:51.553085 systemd[1]: Started cri-containerd-635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef.scope. Oct 31 05:04:51.559881 systemd-networkd[1021]: cali4f76188f2e4: Gained IPv6LL Oct 31 05:04:51.599616 env[1202]: time="2025-10-31T05:04:51.599441746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-92jt8,Uid:b4fc44f0-a36e-4bf3-903a-44dcc680ff0d,Namespace:kube-system,Attempt:1,} returns sandbox id \"73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae\"" Oct 31 05:04:51.610260 env[1202]: time="2025-10-31T05:04:51.610215472Z" level=info msg="CreateContainer within sandbox \"73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 31 05:04:51.625418 env[1202]: time="2025-10-31T05:04:51.625234610Z" level=info msg="CreateContainer within sandbox \"73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"36e17b617fef86309e404cbbd6ab1c0d6c29edf7e6fe2b69802f73a7c642fd2f\"" Oct 31 05:04:51.626565 env[1202]: time="2025-10-31T05:04:51.626526273Z" level=info msg="StartContainer for \"36e17b617fef86309e404cbbd6ab1c0d6c29edf7e6fe2b69802f73a7c642fd2f\"" Oct 31 05:04:51.635862 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3099417731.mount: Deactivated successfully. Oct 31 05:04:51.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.660000 audit: BPF prog-id=163 op=LOAD Oct 31 05:04:51.661000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.661000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3904 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633356439623234343539643032396632313534663933643661316665 Oct 31 05:04:51.662000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.662000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3904 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633356439623234343539643032396632313534663933643661316665 Oct 31 05:04:51.667000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.667000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.667000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.667000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.667000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.667000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.667000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.667000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.667000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.667000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.667000 audit: BPF prog-id=164 op=LOAD Oct 31 05:04:51.667000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d1200 items=0 ppid=3904 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633356439623234343539643032396632313534663933643661316665 Oct 31 05:04:51.668000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.668000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.668000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.668000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.668000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.668000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.668000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.668000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.668000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.668000 audit: BPF prog-id=165 op=LOAD Oct 31 05:04:51.667000 audit[3936]: NETFILTER_CFG table=filter:109 family=2 entries=17 op=nft_register_rule pid=3936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:51.667000 audit[3936]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd93284f10 a2=0 a3=7ffd93284efc items=0 ppid=2114 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.667000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:51.668000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d1248 items=0 ppid=3904 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633356439623234343539643032396632313534663933643661316665 Oct 31 05:04:51.670000 audit: BPF prog-id=165 op=UNLOAD Oct 31 05:04:51.670000 audit: BPF prog-id=164 op=UNLOAD Oct 31 05:04:51.670000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.670000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.670000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.670000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.670000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.670000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.670000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.670000 audit[3913]: AVC avc: denied { perfmon } for pid=3913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.670000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.670000 audit[3913]: AVC avc: denied { bpf } for pid=3913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.670000 audit: BPF prog-id=166 op=LOAD Oct 31 05:04:51.670000 audit[3913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d1658 items=0 ppid=3904 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633356439623234343539643032396632313534663933643661316665 Oct 31 05:04:51.674000 audit[3936]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=3936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:51.674000 audit[3936]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd93284f10 a2=0 a3=7ffd93284efc items=0 ppid=2114 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.674000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:51.703002 systemd[1]: Started cri-containerd-36e17b617fef86309e404cbbd6ab1c0d6c29edf7e6fe2b69802f73a7c642fd2f.scope. Oct 31 05:04:51.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.747000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.747000 audit: BPF prog-id=167 op=LOAD Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3859 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336653137623631376665663836333039653430346362626436616231 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3859 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336653137623631376665663836333039653430346362626436616231 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit: BPF prog-id=168 op=LOAD Oct 31 05:04:51.748000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c0003b40a0 items=0 ppid=3859 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336653137623631376665663836333039653430346362626436616231 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit: BPF prog-id=169 op=LOAD Oct 31 05:04:51.748000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0003b40e8 items=0 ppid=3859 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336653137623631376665663836333039653430346362626436616231 Oct 31 05:04:51.748000 audit: BPF prog-id=169 op=UNLOAD Oct 31 05:04:51.748000 audit: BPF prog-id=168 op=UNLOAD Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:51.748000 audit: BPF prog-id=170 op=LOAD Oct 31 05:04:51.748000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003b44f8 items=0 ppid=3859 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:51.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336653137623631376665663836333039653430346362626436616231 Oct 31 05:04:51.750180 systemd-networkd[1021]: cali1233a126ef2: Gained IPv6LL Oct 31 05:04:51.758908 env[1202]: time="2025-10-31T05:04:51.758850610Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-mtt9j,Uid:f35619da-c214-4156-aacf-d0404664f402,Namespace:calico-system,Attempt:1,} returns sandbox id \"635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef\"" Oct 31 05:04:51.762026 env[1202]: time="2025-10-31T05:04:51.761985539Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 05:04:51.785004 env[1202]: time="2025-10-31T05:04:51.784938946Z" level=info msg="StartContainer for \"36e17b617fef86309e404cbbd6ab1c0d6c29edf7e6fe2b69802f73a7c642fd2f\" returns successfully" Oct 31 05:04:51.827000 audit[3954]: AVC avc: denied { getattr } for pid=3954 comm="coredns" path="cgroup:[4026532879]" dev="nsfs" ino=4026532879 scontext=system_u:system_r:svirt_lxc_net_t:s0:c249,c746 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 31 05:04:51.827000 audit[3954]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a798 a2=c00012ced8 a3=0 items=0 ppid=3859 pid=3954 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c249,c746 key=(null) Oct 31 05:04:51.827000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 31 05:04:51.847472 kubelet[2006]: E1031 05:04:51.847406 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:04:51.848594 kubelet[2006]: E1031 05:04:51.848534 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-568f7b959f-rlltz" podUID="3ce94692-be26-453d-ab7d-92c59a810174" Oct 31 05:04:51.871032 kubelet[2006]: I1031 05:04:51.870803 2006 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-92jt8" podStartSLOduration=50.870765862 podStartE2EDuration="50.870765862s" podCreationTimestamp="2025-10-31 05:04:01 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:04:51.87006818 +0000 UTC m=+56.600960502" watchObservedRunningTime="2025-10-31 05:04:51.870765862 +0000 UTC m=+56.601658175" Oct 31 05:04:52.084181 env[1202]: time="2025-10-31T05:04:52.084104231Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:04:52.085978 env[1202]: time="2025-10-31T05:04:52.085899316Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 05:04:52.086441 kubelet[2006]: E1031 05:04:52.086375 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:04:52.086546 kubelet[2006]: E1031 05:04:52.086468 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:04:52.086806 kubelet[2006]: E1031 05:04:52.086712 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hgdhp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mtt9j_calico-system(f35619da-c214-4156-aacf-d0404664f402): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 05:04:52.089233 env[1202]: time="2025-10-31T05:04:52.089193635Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 05:04:52.147507 kernel: kauditd_printk_skb: 572 callbacks suppressed Oct 31 05:04:52.147766 kernel: audit: type=1400 audit(1761887092.137:1070): avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.153340 kernel: audit: type=1400 audit(1761887092.137:1070): avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.137000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.137000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.137000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.162808 kernel: audit: type=1400 audit(1761887092.137:1070): avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.137000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.169860 kernel: audit: type=1400 audit(1761887092.137:1070): avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.169950 kernel: audit: type=1400 audit(1761887092.137:1070): avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.137000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.137000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.180886 kernel: audit: type=1400 audit(1761887092.137:1070): avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.137000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.187830 kernel: audit: type=1400 audit(1761887092.137:1070): avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.137000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.137000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.197983 kernel: audit: type=1400 audit(1761887092.137:1070): avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.198051 kernel: audit: type=1400 audit(1761887092.137:1070): avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.198103 kernel: audit: type=1334 audit(1761887092.137:1070): prog-id=171 op=LOAD Oct 31 05:04:52.137000 audit: BPF prog-id=171 op=LOAD Oct 31 05:04:52.137000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd913bee0 a2=98 a3=1fffffffffffffff items=0 ppid=3465 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.137000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 05:04:52.146000 audit: BPF prog-id=171 op=UNLOAD Oct 31 05:04:52.148000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.148000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.148000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.148000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.148000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.148000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.148000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.148000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.148000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.148000 audit: BPF prog-id=172 op=LOAD Oct 31 05:04:52.148000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd913bdc0 a2=94 a3=3 items=0 ppid=3465 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.148000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 05:04:52.152000 audit: BPF prog-id=172 op=UNLOAD Oct 31 05:04:52.152000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.152000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.152000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.152000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.152000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.152000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.152000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.152000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.152000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.152000 audit: BPF prog-id=173 op=LOAD Oct 31 05:04:52.152000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdd913be00 a2=94 a3=7ffdd913bfe0 items=0 ppid=3465 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.152000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 05:04:52.153000 audit: BPF prog-id=173 op=UNLOAD Oct 31 05:04:52.153000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.153000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffdd913bed0 a2=50 a3=a000000085 items=0 ppid=3465 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.153000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 05:04:52.157000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.157000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.157000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.157000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.157000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.157000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.157000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.157000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.157000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.157000 audit: BPF prog-id=174 op=LOAD Oct 31 05:04:52.157000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc39497120 a2=98 a3=3 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.157000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.161000 audit: BPF prog-id=174 op=UNLOAD Oct 31 05:04:52.163000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.163000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.163000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.163000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.163000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.163000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.163000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.163000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.163000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.163000 audit: BPF prog-id=175 op=LOAD Oct 31 05:04:52.163000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc39496f10 a2=94 a3=54428f items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.163000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.199000 audit: BPF prog-id=175 op=UNLOAD Oct 31 05:04:52.199000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.199000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.199000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.199000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.199000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.199000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.199000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.199000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.199000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.199000 audit: BPF prog-id=176 op=LOAD Oct 31 05:04:52.199000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc39496f40 a2=94 a3=2 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.199000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.199000 audit: BPF prog-id=176 op=UNLOAD Oct 31 05:04:52.372000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.372000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.372000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.372000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.372000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.372000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.372000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.372000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.372000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.372000 audit: BPF prog-id=177 op=LOAD Oct 31 05:04:52.372000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc39496e00 a2=94 a3=1 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.372000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.373000 audit: BPF prog-id=177 op=UNLOAD Oct 31 05:04:52.373000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.373000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc39496ed0 a2=50 a3=7ffc39496fb0 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.373000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.386000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.386000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc39496e10 a2=28 a3=0 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.386000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.387000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.387000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc39496e40 a2=28 a3=0 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.387000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.387000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc39496d50 a2=28 a3=0 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.387000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.387000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc39496e60 a2=28 a3=0 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.387000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.388000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.388000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc39496e40 a2=28 a3=0 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.388000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.388000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc39496e30 a2=28 a3=0 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.388000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.388000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc39496e60 a2=28 a3=0 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.388000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.389000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.389000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc39496e40 a2=28 a3=0 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.389000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.389000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc39496e60 a2=28 a3=0 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.389000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.389000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc39496e30 a2=28 a3=0 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.389000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.390000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.390000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc39496ea0 a2=28 a3=0 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.390000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.390000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc39496c50 a2=50 a3=1 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.390000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.390000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.390000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.390000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.390000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.390000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.390000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.390000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.390000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.390000 audit: BPF prog-id=178 op=LOAD Oct 31 05:04:52.390000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc39496c50 a2=94 a3=5 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.390000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.391000 audit: BPF prog-id=178 op=UNLOAD Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.391000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc39496d00 a2=50 a3=1 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.391000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.391000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc39496e20 a2=4 a3=38 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.391000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.391000 audit[4015]: AVC avc: denied { confidentiality } for pid=4015 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:04:52.391000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc39496e70 a2=94 a3=6 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.391000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.394000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.394000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.394000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.394000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.394000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.394000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.394000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.394000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.394000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.394000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.394000 audit[4015]: AVC avc: denied { confidentiality } for pid=4015 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:04:52.394000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc39496620 a2=94 a3=88 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.394000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.396000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.396000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.396000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.396000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.396000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.396000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.396000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.396000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.396000 audit[4015]: AVC avc: denied { perfmon } for pid=4015 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.396000 audit[4015]: AVC avc: denied { bpf } for pid=4015 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.396000 audit[4015]: AVC avc: denied { confidentiality } for pid=4015 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:04:52.396000 audit[4015]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc39496620 a2=94 a3=88 items=0 ppid=3465 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.396000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:04:52.422868 env[1202]: time="2025-10-31T05:04:52.422146702Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:04:52.427484 env[1202]: time="2025-10-31T05:04:52.427419465Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 05:04:52.428235 kubelet[2006]: E1031 05:04:52.427726 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:04:52.428235 kubelet[2006]: E1031 05:04:52.427815 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:04:52.428235 kubelet[2006]: E1031 05:04:52.428060 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hgdhp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mtt9j_calico-system(f35619da-c214-4156-aacf-d0404664f402): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 05:04:52.429566 kubelet[2006]: E1031 05:04:52.429481 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:04:52.438000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.438000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.438000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.438000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.438000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.438000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.438000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.438000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.438000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.438000 audit: BPF prog-id=179 op=LOAD Oct 31 05:04:52.438000 audit[4018]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff8164a80 a2=98 a3=1999999999999999 items=0 ppid=3465 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.438000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 05:04:52.439000 audit: BPF prog-id=179 op=UNLOAD Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit: BPF prog-id=180 op=LOAD Oct 31 05:04:52.439000 audit[4018]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff8164960 a2=94 a3=ffff items=0 ppid=3465 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.439000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 05:04:52.439000 audit: BPF prog-id=180 op=UNLOAD Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.439000 audit: BPF prog-id=181 op=LOAD Oct 31 05:04:52.439000 audit[4018]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffff81649a0 a2=94 a3=7ffff8164b80 items=0 ppid=3465 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.439000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 05:04:52.439000 audit: BPF prog-id=181 op=UNLOAD Oct 31 05:04:52.589984 systemd[1]: run-containerd-runc-k8s.io-36e17b617fef86309e404cbbd6ab1c0d6c29edf7e6fe2b69802f73a7c642fd2f-runc.zhEF4D.mount: Deactivated successfully. Oct 31 05:04:52.618712 systemd-networkd[1021]: vxlan.calico: Link UP Oct 31 05:04:52.618725 systemd-networkd[1021]: vxlan.calico: Gained carrier Oct 31 05:04:52.696000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.696000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.696000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.696000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.696000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.696000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.696000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.696000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.696000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.696000 audit: BPF prog-id=182 op=LOAD Oct 31 05:04:52.696000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0beec3a0 a2=98 a3=20 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.696000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.699000 audit: BPF prog-id=182 op=UNLOAD Oct 31 05:04:52.700000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.700000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.700000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.700000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.700000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.700000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.700000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.700000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.700000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.700000 audit: BPF prog-id=183 op=LOAD Oct 31 05:04:52.700000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0beec1b0 a2=94 a3=54428f items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.700000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.701000 audit: BPF prog-id=183 op=UNLOAD Oct 31 05:04:52.701000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.701000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.701000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.701000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.701000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.701000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.701000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.701000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.701000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.701000 audit: BPF prog-id=184 op=LOAD Oct 31 05:04:52.701000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff0beec1e0 a2=94 a3=2 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.701000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.702000 audit: BPF prog-id=184 op=UNLOAD Oct 31 05:04:52.702000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.702000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0beec0b0 a2=28 a3=0 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.702000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.702000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.702000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0beec0e0 a2=28 a3=0 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.702000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.703000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.703000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0beebff0 a2=28 a3=0 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.703000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.703000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.703000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0beec100 a2=28 a3=0 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.703000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.703000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.703000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0beec0e0 a2=28 a3=0 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.703000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.703000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.703000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0beec0d0 a2=28 a3=0 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.703000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.703000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.703000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0beec100 a2=28 a3=0 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.703000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0beec0e0 a2=28 a3=0 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.704000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0beec100 a2=28 a3=0 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.704000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff0beec0d0 a2=28 a3=0 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.704000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fff0beec140 a2=28 a3=0 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.704000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.704000 audit: BPF prog-id=185 op=LOAD Oct 31 05:04:52.704000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0beebfb0 a2=94 a3=0 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.704000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.705000 audit: BPF prog-id=185 op=UNLOAD Oct 31 05:04:52.707000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.707000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff0beebfa0 a2=50 a3=2800 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.707000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.707000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.707000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fff0beebfa0 a2=50 a3=2800 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.707000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.707000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.707000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.707000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.707000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.707000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.707000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.707000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.707000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.707000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.707000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.707000 audit: BPF prog-id=186 op=LOAD Oct 31 05:04:52.707000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0beeb7c0 a2=94 a3=2 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.707000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.709000 audit: BPF prog-id=186 op=UNLOAD Oct 31 05:04:52.709000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.709000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.709000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.709000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.709000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.709000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.709000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.709000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.709000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.709000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.709000 audit: BPF prog-id=187 op=LOAD Oct 31 05:04:52.709000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff0beeb8c0 a2=94 a3=30 items=0 ppid=3465 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.709000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:04:52.723000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.723000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.723000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.723000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.723000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.723000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.723000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.723000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.723000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.723000 audit: BPF prog-id=188 op=LOAD Oct 31 05:04:52.723000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffffd793020 a2=98 a3=0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.723000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.724000 audit: BPF prog-id=188 op=UNLOAD Oct 31 05:04:52.724000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.724000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.724000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.724000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.724000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.724000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.724000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.724000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.724000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.724000 audit: BPF prog-id=189 op=LOAD Oct 31 05:04:52.724000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffffd792e10 a2=94 a3=54428f items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.724000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.725000 audit: BPF prog-id=189 op=UNLOAD Oct 31 05:04:52.725000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.725000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.725000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.725000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.725000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.725000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.725000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.725000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.725000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.725000 audit: BPF prog-id=190 op=LOAD Oct 31 05:04:52.725000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffffd792e40 a2=94 a3=2 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.725000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.727000 audit: BPF prog-id=190 op=UNLOAD Oct 31 05:04:52.788000 audit[4059]: NETFILTER_CFG table=filter:111 family=2 entries=14 op=nft_register_rule pid=4059 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:52.788000 audit[4059]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc982ff710 a2=0 a3=7ffc982ff6fc items=0 ppid=2114 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.788000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:52.795000 audit[4059]: NETFILTER_CFG table=nat:112 family=2 entries=44 op=nft_register_rule pid=4059 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:52.795000 audit[4059]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc982ff710 a2=0 a3=7ffc982ff6fc items=0 ppid=2114 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:52.851775 kubelet[2006]: E1031 05:04:52.851673 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:04:52.977000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.977000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.977000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.977000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.977000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.977000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.977000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.977000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.977000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.977000 audit: BPF prog-id=191 op=LOAD Oct 31 05:04:52.977000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffffd792d00 a2=94 a3=1 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.977000 audit: BPF prog-id=191 op=UNLOAD Oct 31 05:04:52.977000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.977000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffffd792dd0 a2=50 a3=7ffffd792eb0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.977000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffd792d10 a2=28 a3=0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffd792d40 a2=28 a3=0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffd792c50 a2=28 a3=0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffd792d60 a2=28 a3=0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffd792d40 a2=28 a3=0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffd792d30 a2=28 a3=0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffd792d60 a2=28 a3=0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffd792d40 a2=28 a3=0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffd792d60 a2=28 a3=0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffffd792d30 a2=28 a3=0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffffd792da0 a2=28 a3=0 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffffd792b50 a2=50 a3=1 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit: BPF prog-id=192 op=LOAD Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffffd792b50 a2=94 a3=5 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit: BPF prog-id=192 op=UNLOAD Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffffd792c00 a2=50 a3=1 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffffd792d20 a2=4 a3=38 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.993000 audit[4050]: AVC avc: denied { confidentiality } for pid=4050 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:04:52.993000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffffd792d70 a2=94 a3=6 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.993000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { confidentiality } for pid=4050 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:04:52.994000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffffd792520 a2=94 a3=88 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.994000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: AVC avc: denied { perfmon } for pid=4050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.994000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffffd792520 a2=94 a3=88 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.994000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.995000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.995000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffd793f50 a2=10 a3=f8f00800 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.995000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.995000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffd793df0 a2=10 a3=3 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.996000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.996000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffd793d90 a2=10 a3=3 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:52.996000 audit[4050]: AVC avc: denied { bpf } for pid=4050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:04:52.996000 audit[4050]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffd793d90 a2=10 a3=7 items=0 ppid=3465 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:52.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:04:53.002000 audit: BPF prog-id=187 op=UNLOAD Oct 31 05:04:53.127000 audit[4092]: NETFILTER_CFG table=mangle:113 family=2 entries=16 op=nft_register_chain pid=4092 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:04:53.127000 audit[4092]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe81515fd0 a2=0 a3=7ffe81515fbc items=0 ppid=3465 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:53.127000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:04:53.146000 audit[4090]: NETFILTER_CFG table=raw:114 family=2 entries=21 op=nft_register_chain pid=4090 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:04:53.146000 audit[4090]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffef884f7e0 a2=0 a3=7ffef884f7cc items=0 ppid=3465 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:53.146000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:04:53.148000 audit[4091]: NETFILTER_CFG table=nat:115 family=2 entries=15 op=nft_register_chain pid=4091 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:04:53.148000 audit[4091]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffeab416e50 a2=0 a3=7ffeab416e3c items=0 ppid=3465 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:53.148000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:04:53.164000 audit[4095]: NETFILTER_CFG table=filter:116 family=2 entries=264 op=nft_register_chain pid=4095 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:04:53.164000 audit[4095]: SYSCALL arch=c000003e syscall=46 success=yes exit=154952 a0=3 a1=7ffdeb2f10c0 a2=0 a3=7ffdeb2f10ac items=0 ppid=3465 pid=4095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:53.164000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:04:53.222068 systemd-networkd[1021]: cali9f4d8df8923: Gained IPv6LL Oct 31 05:04:53.414096 systemd-networkd[1021]: califa3e2059ab6: Gained IPv6LL Oct 31 05:04:53.824000 audit[4108]: NETFILTER_CFG table=filter:117 family=2 entries=14 op=nft_register_rule pid=4108 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:53.824000 audit[4108]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffee4acf6c0 a2=0 a3=7ffee4acf6ac items=0 ppid=2114 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:53.824000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:53.840000 audit[4108]: NETFILTER_CFG table=nat:118 family=2 entries=56 op=nft_register_chain pid=4108 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:04:53.840000 audit[4108]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffee4acf6c0 a2=0 a3=7ffee4acf6ac items=0 ppid=2114 pid=4108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:04:53.840000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:04:54.246210 systemd-networkd[1021]: vxlan.calico: Gained IPv6LL Oct 31 05:04:55.518792 env[1202]: time="2025-10-31T05:04:55.518220074Z" level=info msg="StopPodSandbox for \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\"" Oct 31 05:04:55.604000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:04:55.604000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0014b6b00 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:04:55.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:04:55.605000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:04:55.605000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00147ff20 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:04:55.605000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:04:55.611000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:04:55.611000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00155c0c0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:04:55.611000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:04:55.612000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:04:55.612000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00155c2a0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:04:55.612000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:04:55.683064 env[1202]: 2025-10-31 05:04:55.610 [WARNING][4123] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0", GenerateName:"calico-apiserver-55bb969bf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"cc9bffc4-0639-44ba-8e71-6f37149ca54e", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55bb969bf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7", Pod:"calico-apiserver-55bb969bf9-zh2rr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2b83d237fa7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:55.683064 env[1202]: 2025-10-31 05:04:55.610 [INFO][4123] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:55.683064 env[1202]: 2025-10-31 05:04:55.610 [INFO][4123] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" iface="eth0" netns="" Oct 31 05:04:55.683064 env[1202]: 2025-10-31 05:04:55.610 [INFO][4123] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:55.683064 env[1202]: 2025-10-31 05:04:55.610 [INFO][4123] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:55.683064 env[1202]: 2025-10-31 05:04:55.663 [INFO][4130] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" HandleID="k8s-pod-network.d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:55.683064 env[1202]: 2025-10-31 05:04:55.663 [INFO][4130] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:55.683064 env[1202]: 2025-10-31 05:04:55.663 [INFO][4130] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:55.683064 env[1202]: 2025-10-31 05:04:55.675 [WARNING][4130] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" HandleID="k8s-pod-network.d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:55.683064 env[1202]: 2025-10-31 05:04:55.675 [INFO][4130] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" HandleID="k8s-pod-network.d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:55.683064 env[1202]: 2025-10-31 05:04:55.677 [INFO][4130] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:55.683064 env[1202]: 2025-10-31 05:04:55.680 [INFO][4123] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:55.684303 env[1202]: time="2025-10-31T05:04:55.683119807Z" level=info msg="TearDown network for sandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\" successfully" Oct 31 05:04:55.684303 env[1202]: time="2025-10-31T05:04:55.683180307Z" level=info msg="StopPodSandbox for \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\" returns successfully" Oct 31 05:04:55.688928 env[1202]: time="2025-10-31T05:04:55.688880141Z" level=info msg="RemovePodSandbox for \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\"" Oct 31 05:04:55.689246 env[1202]: time="2025-10-31T05:04:55.689136147Z" level=info msg="Forcibly stopping sandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\"" Oct 31 05:04:55.786041 env[1202]: 2025-10-31 05:04:55.741 [WARNING][4145] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0", GenerateName:"calico-apiserver-55bb969bf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"cc9bffc4-0639-44ba-8e71-6f37149ca54e", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55bb969bf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"2341356bd2b439b9af37f7d4fc5283f4f2ddd334237ea3475dcc78d19701d9b7", Pod:"calico-apiserver-55bb969bf9-zh2rr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2b83d237fa7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:55.786041 env[1202]: 2025-10-31 05:04:55.741 [INFO][4145] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:55.786041 env[1202]: 2025-10-31 05:04:55.741 [INFO][4145] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" iface="eth0" netns="" Oct 31 05:04:55.786041 env[1202]: 2025-10-31 05:04:55.741 [INFO][4145] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:55.786041 env[1202]: 2025-10-31 05:04:55.741 [INFO][4145] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:55.786041 env[1202]: 2025-10-31 05:04:55.769 [INFO][4153] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" HandleID="k8s-pod-network.d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:55.786041 env[1202]: 2025-10-31 05:04:55.769 [INFO][4153] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:55.786041 env[1202]: 2025-10-31 05:04:55.770 [INFO][4153] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:55.786041 env[1202]: 2025-10-31 05:04:55.778 [WARNING][4153] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" HandleID="k8s-pod-network.d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:55.786041 env[1202]: 2025-10-31 05:04:55.778 [INFO][4153] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" HandleID="k8s-pod-network.d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--zh2rr-eth0" Oct 31 05:04:55.786041 env[1202]: 2025-10-31 05:04:55.780 [INFO][4153] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:55.786041 env[1202]: 2025-10-31 05:04:55.782 [INFO][4145] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec" Oct 31 05:04:55.787019 env[1202]: time="2025-10-31T05:04:55.786948315Z" level=info msg="TearDown network for sandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\" successfully" Oct 31 05:04:55.792856 env[1202]: time="2025-10-31T05:04:55.792816006Z" level=info msg="RemovePodSandbox \"d963b8186bb8da16f0ea570d1c782ca4f8d70111f09633ffdb373c6389c1afec\" returns successfully" Oct 31 05:04:55.793801 env[1202]: time="2025-10-31T05:04:55.793746311Z" level=info msg="StopPodSandbox for \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\"" Oct 31 05:04:55.895225 env[1202]: 2025-10-31 05:04:55.843 [WARNING][4167] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"daaa5498-a71c-46db-8be5-9aa4926d4d61", ResourceVersion:"999", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5", Pod:"coredns-668d6bf9bc-gmmg4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9d33131a9c6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:55.895225 env[1202]: 2025-10-31 05:04:55.844 [INFO][4167] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:55.895225 env[1202]: 2025-10-31 05:04:55.844 [INFO][4167] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" iface="eth0" netns="" Oct 31 05:04:55.895225 env[1202]: 2025-10-31 05:04:55.844 [INFO][4167] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:55.895225 env[1202]: 2025-10-31 05:04:55.844 [INFO][4167] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:55.895225 env[1202]: 2025-10-31 05:04:55.878 [INFO][4174] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" HandleID="k8s-pod-network.bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:55.895225 env[1202]: 2025-10-31 05:04:55.878 [INFO][4174] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:55.895225 env[1202]: 2025-10-31 05:04:55.878 [INFO][4174] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:55.895225 env[1202]: 2025-10-31 05:04:55.889 [WARNING][4174] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" HandleID="k8s-pod-network.bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:55.895225 env[1202]: 2025-10-31 05:04:55.889 [INFO][4174] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" HandleID="k8s-pod-network.bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:55.895225 env[1202]: 2025-10-31 05:04:55.891 [INFO][4174] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:55.895225 env[1202]: 2025-10-31 05:04:55.893 [INFO][4167] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:55.896383 env[1202]: time="2025-10-31T05:04:55.896330957Z" level=info msg="TearDown network for sandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\" successfully" Oct 31 05:04:55.896508 env[1202]: time="2025-10-31T05:04:55.896477138Z" level=info msg="StopPodSandbox for \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\" returns successfully" Oct 31 05:04:55.897388 env[1202]: time="2025-10-31T05:04:55.897354730Z" level=info msg="RemovePodSandbox for \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\"" Oct 31 05:04:55.897709 env[1202]: time="2025-10-31T05:04:55.897548480Z" level=info msg="Forcibly stopping sandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\"" Oct 31 05:04:56.041514 env[1202]: 2025-10-31 05:04:55.979 [WARNING][4191] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"daaa5498-a71c-46db-8be5-9aa4926d4d61", ResourceVersion:"999", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"cc1ed1986ec4b9936bff6260bdf0675451582217fb829cee5f78a1ca97bcaac5", Pod:"coredns-668d6bf9bc-gmmg4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9d33131a9c6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:56.041514 env[1202]: 2025-10-31 05:04:55.979 [INFO][4191] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:56.041514 env[1202]: 2025-10-31 05:04:55.980 [INFO][4191] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" iface="eth0" netns="" Oct 31 05:04:56.041514 env[1202]: 2025-10-31 05:04:55.980 [INFO][4191] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:56.041514 env[1202]: 2025-10-31 05:04:55.980 [INFO][4191] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:56.041514 env[1202]: 2025-10-31 05:04:56.023 [INFO][4198] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" HandleID="k8s-pod-network.bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:56.041514 env[1202]: 2025-10-31 05:04:56.023 [INFO][4198] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:56.041514 env[1202]: 2025-10-31 05:04:56.023 [INFO][4198] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:56.041514 env[1202]: 2025-10-31 05:04:56.033 [WARNING][4198] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" HandleID="k8s-pod-network.bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:56.041514 env[1202]: 2025-10-31 05:04:56.033 [INFO][4198] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" HandleID="k8s-pod-network.bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gmmg4-eth0" Oct 31 05:04:56.041514 env[1202]: 2025-10-31 05:04:56.036 [INFO][4198] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:56.041514 env[1202]: 2025-10-31 05:04:56.038 [INFO][4191] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2" Oct 31 05:04:56.041514 env[1202]: time="2025-10-31T05:04:56.040249082Z" level=info msg="TearDown network for sandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\" successfully" Oct 31 05:04:56.050379 env[1202]: time="2025-10-31T05:04:56.050323224Z" level=info msg="RemovePodSandbox \"bac55ffeb0733d59c9c54f45f00f0a8885bf9a4b4bc7dd27e9b386cb17ed66e2\" returns successfully" Oct 31 05:04:56.051268 env[1202]: time="2025-10-31T05:04:56.051233409Z" level=info msg="StopPodSandbox for \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\"" Oct 31 05:04:56.164048 env[1202]: 2025-10-31 05:04:56.114 [WARNING][4212] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f35619da-c214-4156-aacf-d0404664f402", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef", Pod:"csi-node-driver-mtt9j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.21.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califa3e2059ab6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:56.164048 env[1202]: 2025-10-31 05:04:56.114 [INFO][4212] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:56.164048 env[1202]: 2025-10-31 05:04:56.114 [INFO][4212] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" iface="eth0" netns="" Oct 31 05:04:56.164048 env[1202]: 2025-10-31 05:04:56.114 [INFO][4212] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:56.164048 env[1202]: 2025-10-31 05:04:56.114 [INFO][4212] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:56.164048 env[1202]: 2025-10-31 05:04:56.144 [INFO][4220] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" HandleID="k8s-pod-network.b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Workload="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:56.164048 env[1202]: 2025-10-31 05:04:56.144 [INFO][4220] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:56.164048 env[1202]: 2025-10-31 05:04:56.144 [INFO][4220] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:56.164048 env[1202]: 2025-10-31 05:04:56.156 [WARNING][4220] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" HandleID="k8s-pod-network.b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Workload="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:56.164048 env[1202]: 2025-10-31 05:04:56.156 [INFO][4220] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" HandleID="k8s-pod-network.b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Workload="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:56.164048 env[1202]: 2025-10-31 05:04:56.159 [INFO][4220] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:56.164048 env[1202]: 2025-10-31 05:04:56.162 [INFO][4212] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:56.165113 env[1202]: time="2025-10-31T05:04:56.164077540Z" level=info msg="TearDown network for sandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\" successfully" Oct 31 05:04:56.165113 env[1202]: time="2025-10-31T05:04:56.164119455Z" level=info msg="StopPodSandbox for \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\" returns successfully" Oct 31 05:04:56.165956 env[1202]: time="2025-10-31T05:04:56.165920088Z" level=info msg="RemovePodSandbox for \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\"" Oct 31 05:04:56.166345 env[1202]: time="2025-10-31T05:04:56.166073806Z" level=info msg="Forcibly stopping sandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\"" Oct 31 05:04:56.293667 env[1202]: 2025-10-31 05:04:56.230 [WARNING][4236] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f35619da-c214-4156-aacf-d0404664f402", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"635d9b24459d029f2154f93d6a1fef2b37a1e608c0140bc4be1099f88f9540ef", Pod:"csi-node-driver-mtt9j", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.21.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califa3e2059ab6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:56.293667 env[1202]: 2025-10-31 05:04:56.230 [INFO][4236] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:56.293667 env[1202]: 2025-10-31 05:04:56.230 [INFO][4236] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" iface="eth0" netns="" Oct 31 05:04:56.293667 env[1202]: 2025-10-31 05:04:56.230 [INFO][4236] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:56.293667 env[1202]: 2025-10-31 05:04:56.230 [INFO][4236] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:56.293667 env[1202]: 2025-10-31 05:04:56.275 [INFO][4244] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" HandleID="k8s-pod-network.b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Workload="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:56.293667 env[1202]: 2025-10-31 05:04:56.276 [INFO][4244] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:56.293667 env[1202]: 2025-10-31 05:04:56.276 [INFO][4244] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:56.293667 env[1202]: 2025-10-31 05:04:56.286 [WARNING][4244] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" HandleID="k8s-pod-network.b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Workload="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:56.293667 env[1202]: 2025-10-31 05:04:56.286 [INFO][4244] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" HandleID="k8s-pod-network.b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Workload="srv--cjebs.gb1.brightbox.com-k8s-csi--node--driver--mtt9j-eth0" Oct 31 05:04:56.293667 env[1202]: 2025-10-31 05:04:56.288 [INFO][4244] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:56.293667 env[1202]: 2025-10-31 05:04:56.290 [INFO][4236] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997" Oct 31 05:04:56.293667 env[1202]: time="2025-10-31T05:04:56.292265005Z" level=info msg="TearDown network for sandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\" successfully" Oct 31 05:04:56.296403 env[1202]: time="2025-10-31T05:04:56.296328203Z" level=info msg="RemovePodSandbox \"b9b118594cd69a80c730e70d00894187bd6a00a944d2c972392f31213e2cd997\" returns successfully" Oct 31 05:04:56.297129 env[1202]: time="2025-10-31T05:04:56.297094247Z" level=info msg="StopPodSandbox for \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\"" Oct 31 05:04:56.393727 env[1202]: 2025-10-31 05:04:56.345 [WARNING][4258] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"b4fc44f0-a36e-4bf3-903a-44dcc680ff0d", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae", Pod:"coredns-668d6bf9bc-92jt8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9f4d8df8923", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:56.393727 env[1202]: 2025-10-31 05:04:56.345 [INFO][4258] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:56.393727 env[1202]: 2025-10-31 05:04:56.345 [INFO][4258] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" iface="eth0" netns="" Oct 31 05:04:56.393727 env[1202]: 2025-10-31 05:04:56.345 [INFO][4258] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:56.393727 env[1202]: 2025-10-31 05:04:56.345 [INFO][4258] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:56.393727 env[1202]: 2025-10-31 05:04:56.376 [INFO][4266] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" HandleID="k8s-pod-network.d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:56.393727 env[1202]: 2025-10-31 05:04:56.376 [INFO][4266] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:56.393727 env[1202]: 2025-10-31 05:04:56.376 [INFO][4266] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:56.393727 env[1202]: 2025-10-31 05:04:56.387 [WARNING][4266] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" HandleID="k8s-pod-network.d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:56.393727 env[1202]: 2025-10-31 05:04:56.387 [INFO][4266] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" HandleID="k8s-pod-network.d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:56.393727 env[1202]: 2025-10-31 05:04:56.389 [INFO][4266] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:56.393727 env[1202]: 2025-10-31 05:04:56.391 [INFO][4258] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:56.394672 env[1202]: time="2025-10-31T05:04:56.393841522Z" level=info msg="TearDown network for sandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\" successfully" Oct 31 05:04:56.394672 env[1202]: time="2025-10-31T05:04:56.393887086Z" level=info msg="StopPodSandbox for \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\" returns successfully" Oct 31 05:04:56.395783 env[1202]: time="2025-10-31T05:04:56.395717339Z" level=info msg="RemovePodSandbox for \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\"" Oct 31 05:04:56.395936 env[1202]: time="2025-10-31T05:04:56.395884627Z" level=info msg="Forcibly stopping sandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\"" Oct 31 05:04:56.497711 env[1202]: 2025-10-31 05:04:56.446 [WARNING][4280] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"b4fc44f0-a36e-4bf3-903a-44dcc680ff0d", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"73bf519d8a6eedad6a89f1e44b041f62a80088df8379c61b0683b5a7dc1951ae", Pod:"coredns-668d6bf9bc-92jt8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9f4d8df8923", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:56.497711 env[1202]: 2025-10-31 05:04:56.446 [INFO][4280] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:56.497711 env[1202]: 2025-10-31 05:04:56.447 [INFO][4280] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" iface="eth0" netns="" Oct 31 05:04:56.497711 env[1202]: 2025-10-31 05:04:56.447 [INFO][4280] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:56.497711 env[1202]: 2025-10-31 05:04:56.447 [INFO][4280] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:56.497711 env[1202]: 2025-10-31 05:04:56.480 [INFO][4287] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" HandleID="k8s-pod-network.d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:56.497711 env[1202]: 2025-10-31 05:04:56.481 [INFO][4287] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:56.497711 env[1202]: 2025-10-31 05:04:56.481 [INFO][4287] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:56.497711 env[1202]: 2025-10-31 05:04:56.490 [WARNING][4287] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" HandleID="k8s-pod-network.d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:56.497711 env[1202]: 2025-10-31 05:04:56.491 [INFO][4287] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" HandleID="k8s-pod-network.d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Workload="srv--cjebs.gb1.brightbox.com-k8s-coredns--668d6bf9bc--92jt8-eth0" Oct 31 05:04:56.497711 env[1202]: 2025-10-31 05:04:56.493 [INFO][4287] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:56.497711 env[1202]: 2025-10-31 05:04:56.495 [INFO][4280] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668" Oct 31 05:04:56.499048 env[1202]: time="2025-10-31T05:04:56.498997697Z" level=info msg="TearDown network for sandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\" successfully" Oct 31 05:04:56.503277 env[1202]: time="2025-10-31T05:04:56.503241191Z" level=info msg="RemovePodSandbox \"d7d86d3403543153ae71fdbdaa7cbbbb6eaab4932cac7110512040d4ae121668\" returns successfully" Oct 31 05:04:56.504114 env[1202]: time="2025-10-31T05:04:56.504065880Z" level=info msg="StopPodSandbox for \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\"" Oct 31 05:04:56.613855 env[1202]: 2025-10-31 05:04:56.552 [WARNING][4302] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"1790b000-669c-4853-a4f7-2a387055fce3", ResourceVersion:"1029", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8", Pod:"goldmane-666569f655-xm6v4", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.21.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali1233a126ef2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:56.613855 env[1202]: 2025-10-31 05:04:56.553 [INFO][4302] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:56.613855 env[1202]: 2025-10-31 05:04:56.553 [INFO][4302] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" iface="eth0" netns="" Oct 31 05:04:56.613855 env[1202]: 2025-10-31 05:04:56.553 [INFO][4302] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:56.613855 env[1202]: 2025-10-31 05:04:56.553 [INFO][4302] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:56.613855 env[1202]: 2025-10-31 05:04:56.596 [INFO][4309] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" HandleID="k8s-pod-network.db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Workload="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:56.613855 env[1202]: 2025-10-31 05:04:56.596 [INFO][4309] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:56.613855 env[1202]: 2025-10-31 05:04:56.596 [INFO][4309] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:56.613855 env[1202]: 2025-10-31 05:04:56.606 [WARNING][4309] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" HandleID="k8s-pod-network.db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Workload="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:56.613855 env[1202]: 2025-10-31 05:04:56.606 [INFO][4309] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" HandleID="k8s-pod-network.db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Workload="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:56.613855 env[1202]: 2025-10-31 05:04:56.609 [INFO][4309] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:56.613855 env[1202]: 2025-10-31 05:04:56.611 [INFO][4302] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:56.613855 env[1202]: time="2025-10-31T05:04:56.612722076Z" level=info msg="TearDown network for sandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\" successfully" Oct 31 05:04:56.613855 env[1202]: time="2025-10-31T05:04:56.612798086Z" level=info msg="StopPodSandbox for \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\" returns successfully" Oct 31 05:04:56.616561 env[1202]: time="2025-10-31T05:04:56.616520001Z" level=info msg="RemovePodSandbox for \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\"" Oct 31 05:04:56.616796 env[1202]: time="2025-10-31T05:04:56.616728616Z" level=info msg="Forcibly stopping sandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\"" Oct 31 05:04:56.716797 env[1202]: 2025-10-31 05:04:56.663 [WARNING][4323] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"1790b000-669c-4853-a4f7-2a387055fce3", ResourceVersion:"1029", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"c2798249db02af6e03880436d0ecc45d9ea1c03fe264effa4f30cde8dedf21f8", Pod:"goldmane-666569f655-xm6v4", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.21.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali1233a126ef2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:04:56.716797 env[1202]: 2025-10-31 05:04:56.663 [INFO][4323] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:56.716797 env[1202]: 2025-10-31 05:04:56.663 [INFO][4323] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" iface="eth0" netns="" Oct 31 05:04:56.716797 env[1202]: 2025-10-31 05:04:56.663 [INFO][4323] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:56.716797 env[1202]: 2025-10-31 05:04:56.663 [INFO][4323] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:56.716797 env[1202]: 2025-10-31 05:04:56.699 [INFO][4331] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" HandleID="k8s-pod-network.db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Workload="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:56.716797 env[1202]: 2025-10-31 05:04:56.700 [INFO][4331] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:56.716797 env[1202]: 2025-10-31 05:04:56.700 [INFO][4331] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:56.716797 env[1202]: 2025-10-31 05:04:56.710 [WARNING][4331] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" HandleID="k8s-pod-network.db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Workload="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:56.716797 env[1202]: 2025-10-31 05:04:56.710 [INFO][4331] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" HandleID="k8s-pod-network.db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Workload="srv--cjebs.gb1.brightbox.com-k8s-goldmane--666569f655--xm6v4-eth0" Oct 31 05:04:56.716797 env[1202]: 2025-10-31 05:04:56.712 [INFO][4331] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:56.716797 env[1202]: 2025-10-31 05:04:56.714 [INFO][4323] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc" Oct 31 05:04:56.717977 env[1202]: time="2025-10-31T05:04:56.717934424Z" level=info msg="TearDown network for sandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\" successfully" Oct 31 05:04:56.721638 env[1202]: time="2025-10-31T05:04:56.721572233Z" level=info msg="RemovePodSandbox \"db9f6ebca9129749059a7344dac99f20cf82d9f0f816025632ebbecfd61a38dc\" returns successfully" Oct 31 05:04:56.722575 env[1202]: time="2025-10-31T05:04:56.722537809Z" level=info msg="StopPodSandbox for \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\"" Oct 31 05:04:56.821005 env[1202]: 2025-10-31 05:04:56.775 [WARNING][4345] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-whisker--5b848cf96c--gh5gn-eth0" Oct 31 05:04:56.821005 env[1202]: 2025-10-31 05:04:56.776 [INFO][4345] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:56.821005 env[1202]: 2025-10-31 05:04:56.776 [INFO][4345] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" iface="eth0" netns="" Oct 31 05:04:56.821005 env[1202]: 2025-10-31 05:04:56.776 [INFO][4345] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:56.821005 env[1202]: 2025-10-31 05:04:56.776 [INFO][4345] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:56.821005 env[1202]: 2025-10-31 05:04:56.805 [INFO][4352] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" HandleID="k8s-pod-network.2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Workload="srv--cjebs.gb1.brightbox.com-k8s-whisker--5b848cf96c--gh5gn-eth0" Oct 31 05:04:56.821005 env[1202]: 2025-10-31 05:04:56.805 [INFO][4352] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:56.821005 env[1202]: 2025-10-31 05:04:56.805 [INFO][4352] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:56.821005 env[1202]: 2025-10-31 05:04:56.814 [WARNING][4352] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" HandleID="k8s-pod-network.2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Workload="srv--cjebs.gb1.brightbox.com-k8s-whisker--5b848cf96c--gh5gn-eth0" Oct 31 05:04:56.821005 env[1202]: 2025-10-31 05:04:56.815 [INFO][4352] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" HandleID="k8s-pod-network.2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Workload="srv--cjebs.gb1.brightbox.com-k8s-whisker--5b848cf96c--gh5gn-eth0" Oct 31 05:04:56.821005 env[1202]: 2025-10-31 05:04:56.817 [INFO][4352] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:56.821005 env[1202]: 2025-10-31 05:04:56.819 [INFO][4345] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:56.821897 env[1202]: time="2025-10-31T05:04:56.821045638Z" level=info msg="TearDown network for sandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\" successfully" Oct 31 05:04:56.821897 env[1202]: time="2025-10-31T05:04:56.821093415Z" level=info msg="StopPodSandbox for \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\" returns successfully" Oct 31 05:04:56.822321 env[1202]: time="2025-10-31T05:04:56.822279369Z" level=info msg="RemovePodSandbox for \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\"" Oct 31 05:04:56.822693 env[1202]: time="2025-10-31T05:04:56.822497690Z" level=info msg="Forcibly stopping sandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\"" Oct 31 05:04:56.938468 env[1202]: 2025-10-31 05:04:56.872 [WARNING][4366] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-whisker--5b848cf96c--gh5gn-eth0" Oct 31 05:04:56.938468 env[1202]: 2025-10-31 05:04:56.872 [INFO][4366] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:56.938468 env[1202]: 2025-10-31 05:04:56.872 [INFO][4366] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" iface="eth0" netns="" Oct 31 05:04:56.938468 env[1202]: 2025-10-31 05:04:56.872 [INFO][4366] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:56.938468 env[1202]: 2025-10-31 05:04:56.872 [INFO][4366] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:56.938468 env[1202]: 2025-10-31 05:04:56.921 [INFO][4373] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" HandleID="k8s-pod-network.2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Workload="srv--cjebs.gb1.brightbox.com-k8s-whisker--5b848cf96c--gh5gn-eth0" Oct 31 05:04:56.938468 env[1202]: 2025-10-31 05:04:56.921 [INFO][4373] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:04:56.938468 env[1202]: 2025-10-31 05:04:56.921 [INFO][4373] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:04:56.938468 env[1202]: 2025-10-31 05:04:56.931 [WARNING][4373] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" HandleID="k8s-pod-network.2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Workload="srv--cjebs.gb1.brightbox.com-k8s-whisker--5b848cf96c--gh5gn-eth0" Oct 31 05:04:56.938468 env[1202]: 2025-10-31 05:04:56.932 [INFO][4373] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" HandleID="k8s-pod-network.2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Workload="srv--cjebs.gb1.brightbox.com-k8s-whisker--5b848cf96c--gh5gn-eth0" Oct 31 05:04:56.938468 env[1202]: 2025-10-31 05:04:56.934 [INFO][4373] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:04:56.938468 env[1202]: 2025-10-31 05:04:56.936 [INFO][4366] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c" Oct 31 05:04:56.940916 env[1202]: time="2025-10-31T05:04:56.938420366Z" level=info msg="TearDown network for sandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\" successfully" Oct 31 05:04:56.944664 env[1202]: time="2025-10-31T05:04:56.944577731Z" level=info msg="RemovePodSandbox \"2fb27e5f155cd8890303dabceee3bc73908987ca94324f302f40a0fceb3de11c\" returns successfully" Oct 31 05:05:00.475190 env[1202]: time="2025-10-31T05:05:00.475088926Z" level=info msg="StopPodSandbox for \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\"" Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.548 [INFO][4397] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.548 [INFO][4397] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" iface="eth0" netns="/var/run/netns/cni-64d51e8b-0481-af05-5ea5-ca47e0dd3557" Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.549 [INFO][4397] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" iface="eth0" netns="/var/run/netns/cni-64d51e8b-0481-af05-5ea5-ca47e0dd3557" Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.549 [INFO][4397] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" iface="eth0" netns="/var/run/netns/cni-64d51e8b-0481-af05-5ea5-ca47e0dd3557" Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.549 [INFO][4397] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.549 [INFO][4397] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.587 [INFO][4404] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" HandleID="k8s-pod-network.a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.587 [INFO][4404] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.587 [INFO][4404] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.597 [WARNING][4404] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" HandleID="k8s-pod-network.a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.597 [INFO][4404] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" HandleID="k8s-pod-network.a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.599 [INFO][4404] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:05:00.603862 env[1202]: 2025-10-31 05:05:00.601 [INFO][4397] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:05:00.612578 systemd[1]: run-netns-cni\x2d64d51e8b\x2d0481\x2daf05\x2d5ea5\x2dca47e0dd3557.mount: Deactivated successfully. Oct 31 05:05:00.616392 env[1202]: time="2025-10-31T05:05:00.616301654Z" level=info msg="TearDown network for sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\" successfully" Oct 31 05:05:00.616555 env[1202]: time="2025-10-31T05:05:00.616513093Z" level=info msg="StopPodSandbox for \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\" returns successfully" Oct 31 05:05:00.617850 env[1202]: time="2025-10-31T05:05:00.617731775Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55bb969bf9-slz9n,Uid:bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0,Namespace:calico-apiserver,Attempt:1,}" Oct 31 05:05:00.794388 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1978a1c1f45: link becomes ready Oct 31 05:05:00.822329 systemd-networkd[1021]: cali1978a1c1f45: Link UP Oct 31 05:05:00.824561 systemd-networkd[1021]: cali1978a1c1f45: Gained carrier Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.687 [INFO][4410] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0 calico-apiserver-55bb969bf9- calico-apiserver bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0 1074 0 2025-10-31 05:04:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:55bb969bf9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-cjebs.gb1.brightbox.com calico-apiserver-55bb969bf9-slz9n eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1978a1c1f45 [] [] }} ContainerID="668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-slz9n" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-" Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.688 [INFO][4410] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-slz9n" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.725 [INFO][4424] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" HandleID="k8s-pod-network.668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.725 [INFO][4424] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" HandleID="k8s-pod-network.668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002512a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-cjebs.gb1.brightbox.com", "pod":"calico-apiserver-55bb969bf9-slz9n", "timestamp":"2025-10-31 05:05:00.725200548 +0000 UTC"}, Hostname:"srv-cjebs.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.725 [INFO][4424] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.726 [INFO][4424] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.726 [INFO][4424] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cjebs.gb1.brightbox.com' Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.737 [INFO][4424] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.744 [INFO][4424] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.752 [INFO][4424] ipam/ipam.go 511: Trying affinity for 192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.756 [INFO][4424] ipam/ipam.go 158: Attempting to load block cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.760 [INFO][4424] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.761 [INFO][4424] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.763 [INFO][4424] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101 Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.768 [INFO][4424] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.776 [INFO][4424] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.21.7/26] block=192.168.21.0/26 handle="k8s-pod-network.668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.776 [INFO][4424] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.21.7/26] handle="k8s-pod-network.668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.777 [INFO][4424] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:05:00.860142 env[1202]: 2025-10-31 05:05:00.777 [INFO][4424] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.21.7/26] IPv6=[] ContainerID="668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" HandleID="k8s-pod-network.668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:00.861999 env[1202]: 2025-10-31 05:05:00.780 [INFO][4410] cni-plugin/k8s.go 418: Populated endpoint ContainerID="668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-slz9n" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0", GenerateName:"calico-apiserver-55bb969bf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0", ResourceVersion:"1074", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55bb969bf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-55bb969bf9-slz9n", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1978a1c1f45", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:05:00.861999 env[1202]: 2025-10-31 05:05:00.780 [INFO][4410] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.21.7/32] ContainerID="668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-slz9n" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:00.861999 env[1202]: 2025-10-31 05:05:00.780 [INFO][4410] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1978a1c1f45 ContainerID="668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-slz9n" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:00.861999 env[1202]: 2025-10-31 05:05:00.810 [INFO][4410] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-slz9n" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:00.861999 env[1202]: 2025-10-31 05:05:00.819 [INFO][4410] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-slz9n" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0", GenerateName:"calico-apiserver-55bb969bf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0", ResourceVersion:"1074", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55bb969bf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101", Pod:"calico-apiserver-55bb969bf9-slz9n", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1978a1c1f45", MAC:"e6:d3:ef:ad:40:24", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:05:00.861999 env[1202]: 2025-10-31 05:05:00.854 [INFO][4410] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101" Namespace="calico-apiserver" Pod="calico-apiserver-55bb969bf9-slz9n" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:00.881161 env[1202]: time="2025-10-31T05:05:00.880823235Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:05:00.881161 env[1202]: time="2025-10-31T05:05:00.880902829Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:05:00.881161 env[1202]: time="2025-10-31T05:05:00.880926359Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:05:00.881475 env[1202]: time="2025-10-31T05:05:00.881209316Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101 pid=4448 runtime=io.containerd.runc.v2 Oct 31 05:05:00.918534 kernel: kauditd_printk_skb: 544 callbacks suppressed Oct 31 05:05:00.918775 kernel: audit: type=1325 audit(1761887100.911:1180): table=filter:119 family=2 entries=59 op=nft_register_chain pid=4463 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:05:00.911000 audit[4463]: NETFILTER_CFG table=filter:119 family=2 entries=59 op=nft_register_chain pid=4463 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:05:00.911000 audit[4463]: SYSCALL arch=c000003e syscall=46 success=yes exit=29476 a0=3 a1=7ffe22041b00 a2=0 a3=7ffe22041aec items=0 ppid=3465 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:00.934811 kernel: audit: type=1300 audit(1761887100.911:1180): arch=c000003e syscall=46 success=yes exit=29476 a0=3 a1=7ffe22041b00 a2=0 a3=7ffe22041aec items=0 ppid=3465 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:00.911000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:05:00.940483 kernel: audit: type=1327 audit(1761887100.911:1180): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:05:00.945679 systemd[1]: Started cri-containerd-668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101.scope. Oct 31 05:05:00.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.981871 kernel: audit: type=1400 audit(1761887100.975:1181): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.992276 kernel: audit: type=1400 audit(1761887100.975:1182): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.992385 kernel: audit: type=1400 audit(1761887100.975:1183): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.997584 kernel: audit: type=1400 audit(1761887100.975:1184): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.021337 kernel: audit: type=1400 audit(1761887100.975:1185): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.021497 kernel: audit: type=1400 audit(1761887100.975:1186): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.027775 kernel: audit: type=1400 audit(1761887100.975:1187): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.981000 audit: BPF prog-id=193 op=LOAD Oct 31 05:05:00.982000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.982000 audit[4458]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4448 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:00.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386237376535333537636535393234653461326137336466353563 Oct 31 05:05:00.982000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.982000 audit[4458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4448 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:00.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386237376535333537636535393234653461326137336466353563 Oct 31 05:05:00.982000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.982000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.982000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.982000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.982000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.982000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.982000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.982000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.982000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.982000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.982000 audit: BPF prog-id=194 op=LOAD Oct 31 05:05:00.982000 audit[4458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a05e0 items=0 ppid=4448 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:00.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386237376535333537636535393234653461326137336466353563 Oct 31 05:05:00.997000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.997000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.997000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.997000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.997000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.997000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.997000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.997000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.997000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:00.997000 audit: BPF prog-id=195 op=LOAD Oct 31 05:05:00.997000 audit[4458]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a0628 items=0 ppid=4448 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:00.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386237376535333537636535393234653461326137336466353563 Oct 31 05:05:01.021000 audit: BPF prog-id=195 op=UNLOAD Oct 31 05:05:01.021000 audit: BPF prog-id=194 op=UNLOAD Oct 31 05:05:01.021000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.021000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.021000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.021000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.021000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.021000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.021000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.021000 audit[4458]: AVC avc: denied { perfmon } for pid=4458 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.021000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.021000 audit[4458]: AVC avc: denied { bpf } for pid=4458 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.021000 audit: BPF prog-id=196 op=LOAD Oct 31 05:05:01.021000 audit[4458]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a0a38 items=0 ppid=4448 pid=4458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:01.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386237376535333537636535393234653461326137336466353563 Oct 31 05:05:01.076058 env[1202]: time="2025-10-31T05:05:01.075851105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-55bb969bf9-slz9n,Uid:bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101\"" Oct 31 05:05:01.084141 env[1202]: time="2025-10-31T05:05:01.083296622Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:05:01.395272 env[1202]: time="2025-10-31T05:05:01.395039132Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:01.396664 env[1202]: time="2025-10-31T05:05:01.396586315Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:05:01.397788 kubelet[2006]: E1031 05:05:01.397224 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:05:01.397788 kubelet[2006]: E1031 05:05:01.397378 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:05:01.398810 kubelet[2006]: E1031 05:05:01.397768 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-lfjq6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-55bb969bf9-slz9n_calico-apiserver(bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:01.400104 kubelet[2006]: E1031 05:05:01.400037 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:05:01.477196 env[1202]: time="2025-10-31T05:05:01.477110113Z" level=info msg="StopPodSandbox for \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\"" Oct 31 05:05:01.612108 systemd[1]: run-containerd-runc-k8s.io-668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101-runc.68P2lJ.mount: Deactivated successfully. Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.570 [INFO][4493] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.570 [INFO][4493] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" iface="eth0" netns="/var/run/netns/cni-bbd5b65f-156e-9f9c-ec40-7aca14444dc1" Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.570 [INFO][4493] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" iface="eth0" netns="/var/run/netns/cni-bbd5b65f-156e-9f9c-ec40-7aca14444dc1" Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.571 [INFO][4493] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" iface="eth0" netns="/var/run/netns/cni-bbd5b65f-156e-9f9c-ec40-7aca14444dc1" Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.571 [INFO][4493] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.571 [INFO][4493] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.614 [INFO][4500] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" HandleID="k8s-pod-network.9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.614 [INFO][4500] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.614 [INFO][4500] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.625 [WARNING][4500] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" HandleID="k8s-pod-network.9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.625 [INFO][4500] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" HandleID="k8s-pod-network.9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.627 [INFO][4500] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:05:01.631785 env[1202]: 2025-10-31 05:05:01.629 [INFO][4493] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:05:01.636380 systemd[1]: run-netns-cni\x2dbbd5b65f\x2d156e\x2d9f9c\x2dec40\x2d7aca14444dc1.mount: Deactivated successfully. Oct 31 05:05:01.638804 env[1202]: time="2025-10-31T05:05:01.636934231Z" level=info msg="TearDown network for sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\" successfully" Oct 31 05:05:01.638804 env[1202]: time="2025-10-31T05:05:01.636991094Z" level=info msg="StopPodSandbox for \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\" returns successfully" Oct 31 05:05:01.639601 env[1202]: time="2025-10-31T05:05:01.639549855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68b55d66b7-gbk97,Uid:a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8,Namespace:calico-system,Attempt:1,}" Oct 31 05:05:01.839181 systemd-networkd[1021]: calie6db639be6d: Link UP Oct 31 05:05:01.840033 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 05:05:01.843884 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie6db639be6d: link becomes ready Oct 31 05:05:01.846998 systemd-networkd[1021]: calie6db639be6d: Gained carrier Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.727 [INFO][4507] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0 calico-kube-controllers-68b55d66b7- calico-system a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8 1084 0 2025-10-31 05:04:20 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:68b55d66b7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-cjebs.gb1.brightbox.com calico-kube-controllers-68b55d66b7-gbk97 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calie6db639be6d [] [] }} ContainerID="66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" Namespace="calico-system" Pod="calico-kube-controllers-68b55d66b7-gbk97" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-" Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.727 [INFO][4507] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" Namespace="calico-system" Pod="calico-kube-controllers-68b55d66b7-gbk97" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.767 [INFO][4520] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" HandleID="k8s-pod-network.66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.768 [INFO][4520] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" HandleID="k8s-pod-network.66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d1260), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-cjebs.gb1.brightbox.com", "pod":"calico-kube-controllers-68b55d66b7-gbk97", "timestamp":"2025-10-31 05:05:01.767682529 +0000 UTC"}, Hostname:"srv-cjebs.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.768 [INFO][4520] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.769 [INFO][4520] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.769 [INFO][4520] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cjebs.gb1.brightbox.com' Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.782 [INFO][4520] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.789 [INFO][4520] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.796 [INFO][4520] ipam/ipam.go 511: Trying affinity for 192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.798 [INFO][4520] ipam/ipam.go 158: Attempting to load block cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.802 [INFO][4520] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.21.0/26 host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.802 [INFO][4520] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.21.0/26 handle="k8s-pod-network.66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.806 [INFO][4520] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348 Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.814 [INFO][4520] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.21.0/26 handle="k8s-pod-network.66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.824 [INFO][4520] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.21.8/26] block=192.168.21.0/26 handle="k8s-pod-network.66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.825 [INFO][4520] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.21.8/26] handle="k8s-pod-network.66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" host="srv-cjebs.gb1.brightbox.com" Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.825 [INFO][4520] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:05:01.872039 env[1202]: 2025-10-31 05:05:01.825 [INFO][4520] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.21.8/26] IPv6=[] ContainerID="66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" HandleID="k8s-pod-network.66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:01.873492 env[1202]: 2025-10-31 05:05:01.827 [INFO][4507] cni-plugin/k8s.go 418: Populated endpoint ContainerID="66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" Namespace="calico-system" Pod="calico-kube-controllers-68b55d66b7-gbk97" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0", GenerateName:"calico-kube-controllers-68b55d66b7-", Namespace:"calico-system", SelfLink:"", UID:"a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68b55d66b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-68b55d66b7-gbk97", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie6db639be6d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:05:01.873492 env[1202]: 2025-10-31 05:05:01.828 [INFO][4507] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.21.8/32] ContainerID="66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" Namespace="calico-system" Pod="calico-kube-controllers-68b55d66b7-gbk97" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:01.873492 env[1202]: 2025-10-31 05:05:01.828 [INFO][4507] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie6db639be6d ContainerID="66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" Namespace="calico-system" Pod="calico-kube-controllers-68b55d66b7-gbk97" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:01.873492 env[1202]: 2025-10-31 05:05:01.847 [INFO][4507] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" Namespace="calico-system" Pod="calico-kube-controllers-68b55d66b7-gbk97" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:01.873492 env[1202]: 2025-10-31 05:05:01.850 [INFO][4507] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" Namespace="calico-system" Pod="calico-kube-controllers-68b55d66b7-gbk97" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0", GenerateName:"calico-kube-controllers-68b55d66b7-", Namespace:"calico-system", SelfLink:"", UID:"a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68b55d66b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348", Pod:"calico-kube-controllers-68b55d66b7-gbk97", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie6db639be6d", MAC:"ba:4d:1c:64:57:99", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:05:01.873492 env[1202]: 2025-10-31 05:05:01.869 [INFO][4507] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348" Namespace="calico-system" Pod="calico-kube-controllers-68b55d66b7-gbk97" WorkloadEndpoint="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:01.894549 env[1202]: time="2025-10-31T05:05:01.894422310Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:05:01.894549 env[1202]: time="2025-10-31T05:05:01.894504615Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:05:01.894988 env[1202]: time="2025-10-31T05:05:01.894522849Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:05:01.895382 env[1202]: time="2025-10-31T05:05:01.895299354Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348 pid=4539 runtime=io.containerd.runc.v2 Oct 31 05:05:01.913819 kubelet[2006]: E1031 05:05:01.913742 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:05:01.952828 systemd[1]: Started cri-containerd-66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348.scope. Oct 31 05:05:01.966000 audit[4559]: NETFILTER_CFG table=filter:120 family=2 entries=52 op=nft_register_chain pid=4559 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:05:01.966000 audit[4559]: SYSCALL arch=c000003e syscall=46 success=yes exit=24296 a0=3 a1=7ffee8bcbe90 a2=0 a3=7ffee8bcbe7c items=0 ppid=3465 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:01.966000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:05:01.988000 audit[4568]: NETFILTER_CFG table=filter:121 family=2 entries=14 op=nft_register_rule pid=4568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:05:01.988000 audit[4568]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff20846340 a2=0 a3=7fff2084632c items=0 ppid=2114 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:01.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:05:01.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.996000 audit: BPF prog-id=197 op=LOAD Oct 31 05:05:01.996000 audit[4568]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4539 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:01.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663636393062383638666235313535616334353561353037613361 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4539 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:01.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663636393062383638666235313535616334353561353037613361 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit: BPF prog-id=198 op=LOAD Oct 31 05:05:01.997000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00037e290 items=0 ppid=4539 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:01.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663636393062383638666235313535616334353561353037613361 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit: BPF prog-id=199 op=LOAD Oct 31 05:05:01.997000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00037e2d8 items=0 ppid=4539 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:01.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663636393062383638666235313535616334353561353037613361 Oct 31 05:05:01.997000 audit: BPF prog-id=199 op=UNLOAD Oct 31 05:05:01.997000 audit: BPF prog-id=198 op=UNLOAD Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:05:01.997000 audit: BPF prog-id=200 op=LOAD Oct 31 05:05:01.997000 audit[4551]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00037e6e8 items=0 ppid=4539 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:01.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663636393062383638666235313535616334353561353037613361 Oct 31 05:05:01.996000 audit[4568]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff20846340 a2=0 a3=7fff2084632c items=0 ppid=2114 pid=4568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:01.996000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:05:02.041498 env[1202]: time="2025-10-31T05:05:02.040497328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-68b55d66b7-gbk97,Uid:a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8,Namespace:calico-system,Attempt:1,} returns sandbox id \"66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348\"" Oct 31 05:05:02.046370 env[1202]: time="2025-10-31T05:05:02.046317962Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 05:05:02.365868 env[1202]: time="2025-10-31T05:05:02.365776802Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:02.367332 env[1202]: time="2025-10-31T05:05:02.367254534Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 05:05:02.367768 kubelet[2006]: E1031 05:05:02.367689 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:05:02.367875 kubelet[2006]: E1031 05:05:02.367804 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:05:02.368399 kubelet[2006]: E1031 05:05:02.368070 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h8bpd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-68b55d66b7-gbk97_calico-system(a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:02.370006 kubelet[2006]: E1031 05:05:02.369911 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:05:02.438108 systemd-networkd[1021]: cali1978a1c1f45: Gained IPv6LL Oct 31 05:05:02.915331 kubelet[2006]: E1031 05:05:02.915239 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:05:02.916676 kubelet[2006]: E1031 05:05:02.916615 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:05:02.950185 systemd-networkd[1021]: calie6db639be6d: Gained IPv6LL Oct 31 05:05:03.917816 kubelet[2006]: E1031 05:05:03.917732 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:05:05.479503 env[1202]: time="2025-10-31T05:05:05.478971364Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 05:05:05.805563 env[1202]: time="2025-10-31T05:05:05.805428116Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:05.807552 env[1202]: time="2025-10-31T05:05:05.807432050Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 05:05:05.808051 kubelet[2006]: E1031 05:05:05.807969 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:05:05.808624 kubelet[2006]: E1031 05:05:05.808067 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:05:05.814770 kubelet[2006]: E1031 05:05:05.808259 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hgdhp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mtt9j_calico-system(f35619da-c214-4156-aacf-d0404664f402): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:05.817995 env[1202]: time="2025-10-31T05:05:05.817663203Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 05:05:06.134448 env[1202]: time="2025-10-31T05:05:06.133344316Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:06.135856 env[1202]: time="2025-10-31T05:05:06.135797216Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 05:05:06.136423 kubelet[2006]: E1031 05:05:06.136316 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:05:06.136548 kubelet[2006]: E1031 05:05:06.136436 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:05:06.136783 kubelet[2006]: E1031 05:05:06.136680 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hgdhp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mtt9j_calico-system(f35619da-c214-4156-aacf-d0404664f402): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:06.138104 kubelet[2006]: E1031 05:05:06.138052 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:05:06.476512 env[1202]: time="2025-10-31T05:05:06.475619933Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 05:05:06.796089 env[1202]: time="2025-10-31T05:05:06.795998600Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:06.797820 env[1202]: time="2025-10-31T05:05:06.797739759Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 05:05:06.798381 kubelet[2006]: E1031 05:05:06.798320 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:05:06.798494 kubelet[2006]: E1031 05:05:06.798399 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:05:06.798839 kubelet[2006]: E1031 05:05:06.798742 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-4nn4g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-xm6v4_calico-system(1790b000-669c-4853-a4f7-2a387055fce3): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:06.799503 env[1202]: time="2025-10-31T05:05:06.799467204Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:05:06.799958 kubelet[2006]: E1031 05:05:06.799918 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:05:07.107801 env[1202]: time="2025-10-31T05:05:07.107562235Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:07.109123 env[1202]: time="2025-10-31T05:05:07.109052606Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:05:07.109627 kubelet[2006]: E1031 05:05:07.109544 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:05:07.110107 kubelet[2006]: E1031 05:05:07.109646 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:05:07.110201 env[1202]: time="2025-10-31T05:05:07.110141142Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 05:05:07.110530 kubelet[2006]: E1031 05:05:07.110465 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-24cwm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-55bb969bf9-zh2rr_calico-apiserver(cc9bffc4-0639-44ba-8e71-6f37149ca54e): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:07.112094 kubelet[2006]: E1031 05:05:07.112046 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:05:07.511525 env[1202]: time="2025-10-31T05:05:07.511352595Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:07.512639 env[1202]: time="2025-10-31T05:05:07.512583468Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 05:05:07.513088 kubelet[2006]: E1031 05:05:07.513003 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:05:07.513214 kubelet[2006]: E1031 05:05:07.513097 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:05:07.513296 kubelet[2006]: E1031 05:05:07.513243 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:763067b974934c319e4416875c9b0696,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-8llcg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-568f7b959f-rlltz_calico-system(3ce94692-be26-453d-ab7d-92c59a810174): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:07.515951 env[1202]: time="2025-10-31T05:05:07.515683403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 05:05:07.828867 env[1202]: time="2025-10-31T05:05:07.828672755Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:07.830057 env[1202]: time="2025-10-31T05:05:07.829960122Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 05:05:07.830453 kubelet[2006]: E1031 05:05:07.830374 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:05:07.830546 kubelet[2006]: E1031 05:05:07.830465 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:05:07.830799 kubelet[2006]: E1031 05:05:07.830716 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8llcg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-568f7b959f-rlltz_calico-system(3ce94692-be26-453d-ab7d-92c59a810174): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:07.832708 kubelet[2006]: E1031 05:05:07.832653 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-568f7b959f-rlltz" podUID="3ce94692-be26-453d-ab7d-92c59a810174" Oct 31 05:05:15.479545 env[1202]: time="2025-10-31T05:05:15.479435476Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:05:15.787314 env[1202]: time="2025-10-31T05:05:15.786936800Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:15.788642 env[1202]: time="2025-10-31T05:05:15.788454128Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:05:15.789062 kubelet[2006]: E1031 05:05:15.788980 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:05:15.789697 kubelet[2006]: E1031 05:05:15.789656 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:05:15.790210 kubelet[2006]: E1031 05:05:15.790122 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-lfjq6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-55bb969bf9-slz9n_calico-apiserver(bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:15.791633 kubelet[2006]: E1031 05:05:15.791583 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:05:19.476811 env[1202]: time="2025-10-31T05:05:19.476718478Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 05:05:19.477432 kubelet[2006]: E1031 05:05:19.476971 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:05:19.783819 env[1202]: time="2025-10-31T05:05:19.783698400Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:19.785540 env[1202]: time="2025-10-31T05:05:19.785445460Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 05:05:19.786014 kubelet[2006]: E1031 05:05:19.785955 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:05:19.786129 kubelet[2006]: E1031 05:05:19.786041 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:05:19.786316 kubelet[2006]: E1031 05:05:19.786238 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h8bpd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-68b55d66b7-gbk97_calico-system(a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:19.788105 kubelet[2006]: E1031 05:05:19.788047 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:05:19.854367 systemd[1]: run-containerd-runc-k8s.io-a1ceedce063cf46f9faf5b741490b25b94cf051b79377fd7fa1e870809d65170-runc.1P2BxN.mount: Deactivated successfully. Oct 31 05:05:20.475169 kubelet[2006]: E1031 05:05:20.475101 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:05:22.475335 kubelet[2006]: E1031 05:05:22.475268 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:05:23.476135 kubelet[2006]: E1031 05:05:23.475732 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-568f7b959f-rlltz" podUID="3ce94692-be26-453d-ab7d-92c59a810174" Oct 31 05:05:31.476471 env[1202]: time="2025-10-31T05:05:31.476368234Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 05:05:31.477186 kubelet[2006]: E1031 05:05:31.477041 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:05:31.801600 env[1202]: time="2025-10-31T05:05:31.801227195Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:31.802722 env[1202]: time="2025-10-31T05:05:31.802553863Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 05:05:31.803084 kubelet[2006]: E1031 05:05:31.803009 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:05:31.803209 kubelet[2006]: E1031 05:05:31.803093 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:05:31.803393 kubelet[2006]: E1031 05:05:31.803302 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-4nn4g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-xm6v4_calico-system(1790b000-669c-4853-a4f7-2a387055fce3): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:31.805234 kubelet[2006]: E1031 05:05:31.805170 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:05:32.476369 kubelet[2006]: E1031 05:05:32.476291 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:05:34.476853 env[1202]: time="2025-10-31T05:05:34.476371585Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 05:05:34.795262 env[1202]: time="2025-10-31T05:05:34.795155653Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:34.796398 env[1202]: time="2025-10-31T05:05:34.796303981Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 05:05:34.796795 kubelet[2006]: E1031 05:05:34.796717 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:05:34.797257 kubelet[2006]: E1031 05:05:34.796814 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:05:34.797421 env[1202]: time="2025-10-31T05:05:34.797384734Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:05:34.798179 kubelet[2006]: E1031 05:05:34.798055 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hgdhp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mtt9j_calico-system(f35619da-c214-4156-aacf-d0404664f402): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:35.113057 env[1202]: time="2025-10-31T05:05:35.112854948Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:35.115051 env[1202]: time="2025-10-31T05:05:35.114955872Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:05:35.115526 kubelet[2006]: E1031 05:05:35.115444 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:05:35.115691 kubelet[2006]: E1031 05:05:35.115558 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:05:35.116084 kubelet[2006]: E1031 05:05:35.115987 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-24cwm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-55bb969bf9-zh2rr_calico-apiserver(cc9bffc4-0639-44ba-8e71-6f37149ca54e): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:35.117110 env[1202]: time="2025-10-31T05:05:35.117056079Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 05:05:35.117569 kubelet[2006]: E1031 05:05:35.117452 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:05:35.428387 env[1202]: time="2025-10-31T05:05:35.428215365Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:35.430292 env[1202]: time="2025-10-31T05:05:35.430219200Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 05:05:35.430900 kubelet[2006]: E1031 05:05:35.430810 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:05:35.431005 kubelet[2006]: E1031 05:05:35.430925 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:05:35.431857 kubelet[2006]: E1031 05:05:35.431779 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hgdhp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mtt9j_calico-system(f35619da-c214-4156-aacf-d0404664f402): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:35.433366 kubelet[2006]: E1031 05:05:35.433300 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:05:36.475973 env[1202]: time="2025-10-31T05:05:36.475871670Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 05:05:36.799379 env[1202]: time="2025-10-31T05:05:36.799222943Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:36.800793 env[1202]: time="2025-10-31T05:05:36.800670342Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 05:05:36.801170 kubelet[2006]: E1031 05:05:36.801103 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:05:36.801779 kubelet[2006]: E1031 05:05:36.801721 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:05:36.802118 kubelet[2006]: E1031 05:05:36.802052 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:763067b974934c319e4416875c9b0696,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-8llcg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-568f7b959f-rlltz_calico-system(3ce94692-be26-453d-ab7d-92c59a810174): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:36.805246 env[1202]: time="2025-10-31T05:05:36.804955715Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 05:05:37.121617 env[1202]: time="2025-10-31T05:05:37.121085212Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:37.123649 env[1202]: time="2025-10-31T05:05:37.123432119Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 05:05:37.124007 kubelet[2006]: E1031 05:05:37.123899 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:05:37.124142 kubelet[2006]: E1031 05:05:37.124023 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:05:37.124986 kubelet[2006]: E1031 05:05:37.124916 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8llcg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-568f7b959f-rlltz_calico-system(3ce94692-be26-453d-ab7d-92c59a810174): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:37.126429 kubelet[2006]: E1031 05:05:37.126383 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-568f7b959f-rlltz" podUID="3ce94692-be26-453d-ab7d-92c59a810174" Oct 31 05:05:41.400154 systemd[1]: Started sshd@9-10.230.52.158:22-139.178.68.195:40492.service. Oct 31 05:05:41.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.52.158:22-139.178.68.195:40492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:05:41.406959 kernel: kauditd_printk_skb: 116 callbacks suppressed Oct 31 05:05:41.407061 kernel: audit: type=1130 audit(1761887141.399:1220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.52.158:22-139.178.68.195:40492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:05:42.364000 audit[4637]: USER_ACCT pid=4637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:42.372261 sshd[4637]: Accepted publickey for core from 139.178.68.195 port 40492 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:05:42.376678 kernel: audit: type=1101 audit(1761887142.364:1221): pid=4637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:42.376000 audit[4637]: CRED_ACQ pid=4637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:42.388330 kernel: audit: type=1103 audit(1761887142.376:1222): pid=4637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:42.388421 kernel: audit: type=1006 audit(1761887142.376:1223): pid=4637 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 31 05:05:42.388869 sshd[4637]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:05:42.396798 kernel: audit: type=1300 audit(1761887142.376:1223): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9643bf60 a2=3 a3=0 items=0 ppid=1 pid=4637 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:42.376000 audit[4637]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9643bf60 a2=3 a3=0 items=0 ppid=1 pid=4637 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:42.401477 kernel: audit: type=1327 audit(1761887142.376:1223): proctitle=737368643A20636F7265205B707269765D Oct 31 05:05:42.376000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:05:42.411667 systemd-logind[1193]: New session 10 of user core. Oct 31 05:05:42.414634 systemd[1]: Started session-10.scope. Oct 31 05:05:42.423000 audit[4637]: USER_START pid=4637 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:42.439581 kernel: audit: type=1105 audit(1761887142.423:1224): pid=4637 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:42.439678 kernel: audit: type=1103 audit(1761887142.424:1225): pid=4641 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:42.424000 audit[4641]: CRED_ACQ pid=4641 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:43.656426 sshd[4637]: pam_unix(sshd:session): session closed for user core Oct 31 05:05:43.658000 audit[4637]: USER_END pid=4637 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:43.677279 kernel: audit: type=1106 audit(1761887143.658:1226): pid=4637 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:43.678022 kernel: audit: type=1104 audit(1761887143.658:1227): pid=4637 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:43.658000 audit[4637]: CRED_DISP pid=4637 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:43.688499 systemd[1]: sshd@9-10.230.52.158:22-139.178.68.195:40492.service: Deactivated successfully. Oct 31 05:05:43.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.52.158:22-139.178.68.195:40492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:05:43.696546 systemd[1]: session-10.scope: Deactivated successfully. Oct 31 05:05:43.698105 systemd-logind[1193]: Session 10 logged out. Waiting for processes to exit. Oct 31 05:05:43.699810 systemd-logind[1193]: Removed session 10. Oct 31 05:05:45.486560 env[1202]: time="2025-10-31T05:05:45.485552937Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:05:45.499347 kubelet[2006]: E1031 05:05:45.499236 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:05:45.824411 env[1202]: time="2025-10-31T05:05:45.824299268Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:45.826236 env[1202]: time="2025-10-31T05:05:45.826143552Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:05:45.826925 kubelet[2006]: E1031 05:05:45.826816 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:05:45.827127 kubelet[2006]: E1031 05:05:45.826965 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:05:45.827594 kubelet[2006]: E1031 05:05:45.827351 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-lfjq6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-55bb969bf9-slz9n_calico-apiserver(bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:45.829266 kubelet[2006]: E1031 05:05:45.829173 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:05:46.474613 kubelet[2006]: E1031 05:05:46.474554 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:05:47.476650 env[1202]: time="2025-10-31T05:05:47.476587258Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 05:05:47.788785 env[1202]: time="2025-10-31T05:05:47.788459184Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:05:47.790477 env[1202]: time="2025-10-31T05:05:47.790270555Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 05:05:47.790987 kubelet[2006]: E1031 05:05:47.790865 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:05:47.790987 kubelet[2006]: E1031 05:05:47.790949 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:05:47.791799 kubelet[2006]: E1031 05:05:47.791696 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h8bpd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-68b55d66b7-gbk97_calico-system(a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 05:05:47.793202 kubelet[2006]: E1031 05:05:47.793150 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:05:48.810357 systemd[1]: Started sshd@10-10.230.52.158:22-139.178.68.195:55064.service. Oct 31 05:05:48.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.52.158:22-139.178.68.195:55064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:05:48.816965 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 05:05:48.817126 kernel: audit: type=1130 audit(1761887148.811:1229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.52.158:22-139.178.68.195:55064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:05:49.717000 audit[4653]: USER_ACCT pid=4653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:49.722901 sshd[4653]: Accepted publickey for core from 139.178.68.195 port 55064 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:05:49.729773 kernel: audit: type=1101 audit(1761887149.717:1230): pid=4653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:49.733310 sshd[4653]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:05:49.731000 audit[4653]: CRED_ACQ pid=4653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:49.741022 kernel: audit: type=1103 audit(1761887149.731:1231): pid=4653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:49.741165 kernel: audit: type=1006 audit(1761887149.731:1232): pid=4653 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 31 05:05:49.731000 audit[4653]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe03dc8d40 a2=3 a3=0 items=0 ppid=1 pid=4653 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:49.751956 kernel: audit: type=1300 audit(1761887149.731:1232): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe03dc8d40 a2=3 a3=0 items=0 ppid=1 pid=4653 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:49.756182 kernel: audit: type=1327 audit(1761887149.731:1232): proctitle=737368643A20636F7265205B707269765D Oct 31 05:05:49.731000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:05:49.758312 systemd[1]: Started session-11.scope. Oct 31 05:05:49.760422 systemd-logind[1193]: New session 11 of user core. Oct 31 05:05:49.774000 audit[4653]: USER_START pid=4653 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:49.777000 audit[4655]: CRED_ACQ pid=4655 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:49.789336 kernel: audit: type=1105 audit(1761887149.774:1233): pid=4653 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:49.789534 kernel: audit: type=1103 audit(1761887149.777:1234): pid=4655 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:49.822000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:49.828000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:49.836680 kernel: audit: type=1400 audit(1761887149.822:1235): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:49.837018 kernel: audit: type=1400 audit(1761887149.828:1236): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:49.828000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b5e3c0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:05:49.828000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:05:49.822000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002deaac0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:05:49.822000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:05:50.478859 kubelet[2006]: E1031 05:05:50.478774 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-568f7b959f-rlltz" podUID="3ce94692-be26-453d-ab7d-92c59a810174" Oct 31 05:05:50.479666 kubelet[2006]: E1031 05:05:50.478916 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:05:50.515632 sshd[4653]: pam_unix(sshd:session): session closed for user core Oct 31 05:05:50.517000 audit[4653]: USER_END pid=4653 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:50.517000 audit[4653]: CRED_DISP pid=4653 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:50.520508 systemd-logind[1193]: Session 11 logged out. Waiting for processes to exit. Oct 31 05:05:50.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.52.158:22-139.178.68.195:55064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:05:50.522825 systemd[1]: sshd@10-10.230.52.158:22-139.178.68.195:55064.service: Deactivated successfully. Oct 31 05:05:50.523940 systemd[1]: session-11.scope: Deactivated successfully. Oct 31 05:05:50.526426 systemd-logind[1193]: Removed session 11. Oct 31 05:05:51.158000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526397 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:51.158000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:51.158000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c006669530 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:05:51.158000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:05:51.158000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526391 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:51.158000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c006669560 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:05:51.158000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:05:51.158000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00a1ae2d0 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:05:51.158000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:05:51.161000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:51.161000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c010372080 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:05:51.161000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:05:51.203000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:51.203000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c005bf4a60 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:05:51.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:05:51.203000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:51.203000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0081fa900 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:05:51.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:05:55.605000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:55.610931 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 31 05:05:55.611073 kernel: audit: type=1400 audit(1761887155.605:1246): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:55.605000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002debf60 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:05:55.625173 kernel: audit: type=1300 audit(1761887155.605:1246): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002debf60 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:05:55.605000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:05:55.632122 kernel: audit: type=1327 audit(1761887155.605:1246): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:05:55.610000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:55.638545 kernel: audit: type=1400 audit(1761887155.610:1247): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:55.638648 kernel: audit: type=1300 audit(1761887155.610:1247): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fc9fa0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:05:55.610000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fc9fa0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:05:55.610000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:05:55.656779 kernel: audit: type=1327 audit(1761887155.610:1247): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:05:55.610000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:55.666999 kernel: audit: type=1400 audit(1761887155.610:1248): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:55.669560 systemd[1]: Started sshd@11-10.230.52.158:22-139.178.68.195:42076.service. Oct 31 05:05:55.610000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fc9fc0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:05:55.683835 kernel: audit: type=1300 audit(1761887155.610:1248): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fc9fc0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:05:55.610000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:05:55.692887 kernel: audit: type=1327 audit(1761887155.610:1248): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:05:55.610000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:55.701783 kernel: audit: type=1400 audit(1761887155.610:1249): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:05:55.610000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fc9fe0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:05:55.610000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:05:55.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.52.158:22-139.178.68.195:42076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:05:56.645181 sshd[4689]: Accepted publickey for core from 139.178.68.195 port 42076 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:05:56.644000 audit[4689]: USER_ACCT pid=4689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:56.646000 audit[4689]: CRED_ACQ pid=4689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:56.646000 audit[4689]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc53958980 a2=3 a3=0 items=0 ppid=1 pid=4689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:56.646000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:05:56.648080 sshd[4689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:05:56.656611 systemd[1]: Started session-12.scope. Oct 31 05:05:56.658412 systemd-logind[1193]: New session 12 of user core. Oct 31 05:05:56.669000 audit[4689]: USER_START pid=4689 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:56.672000 audit[4691]: CRED_ACQ pid=4691 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:56.953038 env[1202]: time="2025-10-31T05:05:56.952631897Z" level=info msg="StopPodSandbox for \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\"" Oct 31 05:05:57.366274 env[1202]: 2025-10-31 05:05:57.142 [WARNING][4700] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0", GenerateName:"calico-kube-controllers-68b55d66b7-", Namespace:"calico-system", SelfLink:"", UID:"a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8", ResourceVersion:"1332", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68b55d66b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348", Pod:"calico-kube-controllers-68b55d66b7-gbk97", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie6db639be6d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:05:57.366274 env[1202]: 2025-10-31 05:05:57.144 [INFO][4700] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:05:57.366274 env[1202]: 2025-10-31 05:05:57.144 [INFO][4700] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" iface="eth0" netns="" Oct 31 05:05:57.366274 env[1202]: 2025-10-31 05:05:57.144 [INFO][4700] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:05:57.366274 env[1202]: 2025-10-31 05:05:57.144 [INFO][4700] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:05:57.366274 env[1202]: 2025-10-31 05:05:57.295 [INFO][4715] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" HandleID="k8s-pod-network.9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:57.366274 env[1202]: 2025-10-31 05:05:57.300 [INFO][4715] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:05:57.366274 env[1202]: 2025-10-31 05:05:57.301 [INFO][4715] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:05:57.366274 env[1202]: 2025-10-31 05:05:57.342 [WARNING][4715] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" HandleID="k8s-pod-network.9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:57.366274 env[1202]: 2025-10-31 05:05:57.343 [INFO][4715] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" HandleID="k8s-pod-network.9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:57.366274 env[1202]: 2025-10-31 05:05:57.357 [INFO][4715] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:05:57.366274 env[1202]: 2025-10-31 05:05:57.361 [INFO][4700] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:05:57.367639 env[1202]: time="2025-10-31T05:05:57.366332537Z" level=info msg="TearDown network for sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\" successfully" Oct 31 05:05:57.367639 env[1202]: time="2025-10-31T05:05:57.366390797Z" level=info msg="StopPodSandbox for \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\" returns successfully" Oct 31 05:05:57.396895 env[1202]: time="2025-10-31T05:05:57.396808563Z" level=info msg="RemovePodSandbox for \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\"" Oct 31 05:05:57.397319 env[1202]: time="2025-10-31T05:05:57.397235584Z" level=info msg="Forcibly stopping sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\"" Oct 31 05:05:57.485983 kubelet[2006]: E1031 05:05:57.485828 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:05:57.541981 sshd[4689]: pam_unix(sshd:session): session closed for user core Oct 31 05:05:57.546000 audit[4689]: USER_END pid=4689 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:57.546000 audit[4689]: CRED_DISP pid=4689 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:57.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.52.158:22-139.178.68.195:42076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:05:57.549093 systemd[1]: sshd@11-10.230.52.158:22-139.178.68.195:42076.service: Deactivated successfully. Oct 31 05:05:57.550289 systemd[1]: session-12.scope: Deactivated successfully. Oct 31 05:05:57.553880 systemd-logind[1193]: Session 12 logged out. Waiting for processes to exit. Oct 31 05:05:57.556691 systemd-logind[1193]: Removed session 12. Oct 31 05:05:57.593030 env[1202]: 2025-10-31 05:05:57.468 [WARNING][4731] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0", GenerateName:"calico-kube-controllers-68b55d66b7-", Namespace:"calico-system", SelfLink:"", UID:"a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8", ResourceVersion:"1332", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"68b55d66b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"66f6690b868fb5155ac455a507a3a8330386351c596b61b5bd536c94bb4e3348", Pod:"calico-kube-controllers-68b55d66b7-gbk97", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.8/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calie6db639be6d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:05:57.593030 env[1202]: 2025-10-31 05:05:57.476 [INFO][4731] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:05:57.593030 env[1202]: 2025-10-31 05:05:57.476 [INFO][4731] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" iface="eth0" netns="" Oct 31 05:05:57.593030 env[1202]: 2025-10-31 05:05:57.476 [INFO][4731] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:05:57.593030 env[1202]: 2025-10-31 05:05:57.477 [INFO][4731] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:05:57.593030 env[1202]: 2025-10-31 05:05:57.537 [INFO][4738] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" HandleID="k8s-pod-network.9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:57.593030 env[1202]: 2025-10-31 05:05:57.537 [INFO][4738] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:05:57.593030 env[1202]: 2025-10-31 05:05:57.537 [INFO][4738] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:05:57.593030 env[1202]: 2025-10-31 05:05:57.583 [WARNING][4738] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" HandleID="k8s-pod-network.9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:57.593030 env[1202]: 2025-10-31 05:05:57.583 [INFO][4738] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" HandleID="k8s-pod-network.9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--kube--controllers--68b55d66b7--gbk97-eth0" Oct 31 05:05:57.593030 env[1202]: 2025-10-31 05:05:57.586 [INFO][4738] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:05:57.593030 env[1202]: 2025-10-31 05:05:57.588 [INFO][4731] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687" Oct 31 05:05:57.594474 env[1202]: time="2025-10-31T05:05:57.593068697Z" level=info msg="TearDown network for sandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\" successfully" Oct 31 05:05:57.598480 env[1202]: time="2025-10-31T05:05:57.598421840Z" level=info msg="RemovePodSandbox \"9411974e44d23049c0737e10e719b2b586cd282926e292b717d7e96fc7b22687\" returns successfully" Oct 31 05:05:57.599400 env[1202]: time="2025-10-31T05:05:57.599347481Z" level=info msg="StopPodSandbox for \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\"" Oct 31 05:05:57.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.52.158:22-139.178.68.195:42092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:05:57.693256 systemd[1]: Started sshd@12-10.230.52.158:22-139.178.68.195:42092.service. Oct 31 05:05:57.811629 env[1202]: 2025-10-31 05:05:57.734 [WARNING][4755] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0", GenerateName:"calico-apiserver-55bb969bf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0", ResourceVersion:"1313", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55bb969bf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101", Pod:"calico-apiserver-55bb969bf9-slz9n", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1978a1c1f45", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:05:57.811629 env[1202]: 2025-10-31 05:05:57.734 [INFO][4755] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:05:57.811629 env[1202]: 2025-10-31 05:05:57.734 [INFO][4755] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" iface="eth0" netns="" Oct 31 05:05:57.811629 env[1202]: 2025-10-31 05:05:57.734 [INFO][4755] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:05:57.811629 env[1202]: 2025-10-31 05:05:57.734 [INFO][4755] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:05:57.811629 env[1202]: 2025-10-31 05:05:57.789 [INFO][4764] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" HandleID="k8s-pod-network.a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:57.811629 env[1202]: 2025-10-31 05:05:57.789 [INFO][4764] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:05:57.811629 env[1202]: 2025-10-31 05:05:57.789 [INFO][4764] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:05:57.811629 env[1202]: 2025-10-31 05:05:57.803 [WARNING][4764] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" HandleID="k8s-pod-network.a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:57.811629 env[1202]: 2025-10-31 05:05:57.803 [INFO][4764] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" HandleID="k8s-pod-network.a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:57.811629 env[1202]: 2025-10-31 05:05:57.806 [INFO][4764] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:05:57.811629 env[1202]: 2025-10-31 05:05:57.809 [INFO][4755] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:05:57.812622 env[1202]: time="2025-10-31T05:05:57.812570663Z" level=info msg="TearDown network for sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\" successfully" Oct 31 05:05:57.812779 env[1202]: time="2025-10-31T05:05:57.812726138Z" level=info msg="StopPodSandbox for \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\" returns successfully" Oct 31 05:05:57.813519 env[1202]: time="2025-10-31T05:05:57.813486095Z" level=info msg="RemovePodSandbox for \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\"" Oct 31 05:05:57.814038 env[1202]: time="2025-10-31T05:05:57.813987002Z" level=info msg="Forcibly stopping sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\"" Oct 31 05:05:57.949823 env[1202]: 2025-10-31 05:05:57.894 [WARNING][4781] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0", GenerateName:"calico-apiserver-55bb969bf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0", ResourceVersion:"1313", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 4, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"55bb969bf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cjebs.gb1.brightbox.com", ContainerID:"668b77e5357ce5924e4a2a73df55c5604469808a28ffc2e0d32a0cc00f9ca101", Pod:"calico-apiserver-55bb969bf9-slz9n", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.21.7/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1978a1c1f45", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:05:57.949823 env[1202]: 2025-10-31 05:05:57.894 [INFO][4781] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:05:57.949823 env[1202]: 2025-10-31 05:05:57.894 [INFO][4781] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" iface="eth0" netns="" Oct 31 05:05:57.949823 env[1202]: 2025-10-31 05:05:57.895 [INFO][4781] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:05:57.949823 env[1202]: 2025-10-31 05:05:57.895 [INFO][4781] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:05:57.949823 env[1202]: 2025-10-31 05:05:57.928 [INFO][4788] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" HandleID="k8s-pod-network.a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:57.949823 env[1202]: 2025-10-31 05:05:57.929 [INFO][4788] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:05:57.949823 env[1202]: 2025-10-31 05:05:57.929 [INFO][4788] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:05:57.949823 env[1202]: 2025-10-31 05:05:57.941 [WARNING][4788] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" HandleID="k8s-pod-network.a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:57.949823 env[1202]: 2025-10-31 05:05:57.941 [INFO][4788] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" HandleID="k8s-pod-network.a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Workload="srv--cjebs.gb1.brightbox.com-k8s-calico--apiserver--55bb969bf9--slz9n-eth0" Oct 31 05:05:57.949823 env[1202]: 2025-10-31 05:05:57.944 [INFO][4788] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:05:57.949823 env[1202]: 2025-10-31 05:05:57.946 [INFO][4781] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9" Oct 31 05:05:57.952074 env[1202]: time="2025-10-31T05:05:57.949820218Z" level=info msg="TearDown network for sandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\" successfully" Oct 31 05:05:57.954244 env[1202]: time="2025-10-31T05:05:57.954195415Z" level=info msg="RemovePodSandbox \"a631fb34161bc2c9b27980f63a18b2d4b5605033528f321a6c2ea91dafac4ac9\" returns successfully" Oct 31 05:05:58.634000 audit[4762]: USER_ACCT pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:58.635498 sshd[4762]: Accepted publickey for core from 139.178.68.195 port 42092 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:05:58.636000 audit[4762]: CRED_ACQ pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:58.636000 audit[4762]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc17b0da80 a2=3 a3=0 items=0 ppid=1 pid=4762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:05:58.636000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:05:58.639239 sshd[4762]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:05:58.647293 systemd[1]: Started session-13.scope. Oct 31 05:05:58.648838 systemd-logind[1193]: New session 13 of user core. Oct 31 05:05:58.656000 audit[4762]: USER_START pid=4762 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:58.659000 audit[4794]: CRED_ACQ pid=4794 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:59.496450 kubelet[2006]: E1031 05:05:59.496369 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:05:59.538039 sshd[4762]: pam_unix(sshd:session): session closed for user core Oct 31 05:05:59.540000 audit[4762]: USER_END pid=4762 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:59.540000 audit[4762]: CRED_DISP pid=4762 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:05:59.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.52.158:22-139.178.68.195:42092 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:05:59.543095 systemd[1]: sshd@12-10.230.52.158:22-139.178.68.195:42092.service: Deactivated successfully. Oct 31 05:05:59.545921 systemd[1]: session-13.scope: Deactivated successfully. Oct 31 05:05:59.547673 systemd-logind[1193]: Session 13 logged out. Waiting for processes to exit. Oct 31 05:05:59.549441 systemd-logind[1193]: Removed session 13. Oct 31 05:05:59.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.52.158:22-139.178.68.195:42108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:05:59.694465 systemd[1]: Started sshd@13-10.230.52.158:22-139.178.68.195:42108.service. Oct 31 05:06:00.476023 kubelet[2006]: E1031 05:06:00.475955 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:06:00.476967 kubelet[2006]: E1031 05:06:00.476931 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:06:00.611000 audit[4802]: USER_ACCT pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:00.615282 sshd[4802]: Accepted publickey for core from 139.178.68.195 port 42108 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:06:00.615907 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 31 05:06:00.615997 kernel: audit: type=1101 audit(1761887160.611:1269): pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:00.621000 audit[4802]: CRED_ACQ pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:00.624543 sshd[4802]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:06:00.628810 kernel: audit: type=1103 audit(1761887160.621:1270): pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:00.621000 audit[4802]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf7dd2410 a2=3 a3=0 items=0 ppid=1 pid=4802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:00.637949 systemd[1]: Started session-14.scope. Oct 31 05:06:00.639777 systemd-logind[1193]: New session 14 of user core. Oct 31 05:06:00.643035 kernel: audit: type=1006 audit(1761887160.621:1271): pid=4802 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Oct 31 05:06:00.643114 kernel: audit: type=1300 audit(1761887160.621:1271): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf7dd2410 a2=3 a3=0 items=0 ppid=1 pid=4802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:00.643161 kernel: audit: type=1327 audit(1761887160.621:1271): proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:00.621000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:00.653000 audit[4802]: USER_START pid=4802 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:00.661000 audit[4804]: CRED_ACQ pid=4804 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:00.668271 kernel: audit: type=1105 audit(1761887160.653:1272): pid=4802 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:00.668394 kernel: audit: type=1103 audit(1761887160.661:1273): pid=4804 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:01.362739 sshd[4802]: pam_unix(sshd:session): session closed for user core Oct 31 05:06:01.364000 audit[4802]: USER_END pid=4802 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:01.374457 kernel: audit: type=1106 audit(1761887161.364:1274): pid=4802 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:01.374588 kernel: audit: type=1104 audit(1761887161.372:1275): pid=4802 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:01.372000 audit[4802]: CRED_DISP pid=4802 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:01.375513 systemd[1]: sshd@13-10.230.52.158:22-139.178.68.195:42108.service: Deactivated successfully. Oct 31 05:06:01.377929 systemd[1]: session-14.scope: Deactivated successfully. Oct 31 05:06:01.378686 systemd-logind[1193]: Session 14 logged out. Waiting for processes to exit. Oct 31 05:06:01.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.52.158:22-139.178.68.195:42108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:01.380935 systemd-logind[1193]: Removed session 14. Oct 31 05:06:01.385376 kernel: audit: type=1131 audit(1761887161.372:1276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.52.158:22-139.178.68.195:42108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:02.476385 kubelet[2006]: E1031 05:06:02.476316 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-568f7b959f-rlltz" podUID="3ce94692-be26-453d-ab7d-92c59a810174" Oct 31 05:06:05.478536 kubelet[2006]: E1031 05:06:05.478458 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:06:06.514958 systemd[1]: Started sshd@14-10.230.52.158:22-139.178.68.195:36698.service. Oct 31 05:06:06.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.52.158:22-139.178.68.195:36698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:06.524830 kernel: audit: type=1130 audit(1761887166.515:1277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.52.158:22-139.178.68.195:36698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:07.440091 sshd[4816]: Accepted publickey for core from 139.178.68.195 port 36698 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:06:07.439000 audit[4816]: USER_ACCT pid=4816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:07.450873 kernel: audit: type=1101 audit(1761887167.439:1278): pid=4816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:07.451707 sshd[4816]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:06:07.450000 audit[4816]: CRED_ACQ pid=4816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:07.461878 kernel: audit: type=1103 audit(1761887167.450:1279): pid=4816 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:07.461993 kernel: audit: type=1006 audit(1761887167.450:1280): pid=4816 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 31 05:06:07.450000 audit[4816]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca30745a0 a2=3 a3=0 items=0 ppid=1 pid=4816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:07.467524 systemd-logind[1193]: New session 15 of user core. Oct 31 05:06:07.472465 kernel: audit: type=1300 audit(1761887167.450:1280): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca30745a0 a2=3 a3=0 items=0 ppid=1 pid=4816 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:07.472615 kernel: audit: type=1327 audit(1761887167.450:1280): proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:07.450000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:07.471702 systemd[1]: Started session-15.scope. Oct 31 05:06:07.485000 audit[4816]: USER_START pid=4816 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:07.507982 kernel: audit: type=1105 audit(1761887167.485:1281): pid=4816 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:07.507000 audit[4818]: CRED_ACQ pid=4818 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:07.525784 kernel: audit: type=1103 audit(1761887167.507:1282): pid=4818 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:08.225791 sshd[4816]: pam_unix(sshd:session): session closed for user core Oct 31 05:06:08.227000 audit[4816]: USER_END pid=4816 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:08.235545 systemd[1]: sshd@14-10.230.52.158:22-139.178.68.195:36698.service: Deactivated successfully. Oct 31 05:06:08.238935 systemd-logind[1193]: Session 15 logged out. Waiting for processes to exit. Oct 31 05:06:08.240819 kernel: audit: type=1106 audit(1761887168.227:1283): pid=4816 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:08.240894 kernel: audit: type=1104 audit(1761887168.227:1284): pid=4816 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:08.227000 audit[4816]: CRED_DISP pid=4816 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:08.239947 systemd[1]: session-15.scope: Deactivated successfully. Oct 31 05:06:08.241896 systemd-logind[1193]: Removed session 15. Oct 31 05:06:08.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.52.158:22-139.178.68.195:36698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:11.476589 kubelet[2006]: E1031 05:06:11.476528 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:06:11.478723 kubelet[2006]: E1031 05:06:11.478687 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:06:11.480540 kubelet[2006]: E1031 05:06:11.480502 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:06:13.377444 systemd[1]: Started sshd@15-10.230.52.158:22-139.178.68.195:49194.service. Oct 31 05:06:13.386347 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 05:06:13.386729 kernel: audit: type=1130 audit(1761887173.379:1286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.52.158:22-139.178.68.195:49194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:13.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.52.158:22-139.178.68.195:49194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:13.507217 kubelet[2006]: E1031 05:06:13.507124 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-568f7b959f-rlltz" podUID="3ce94692-be26-453d-ab7d-92c59a810174" Oct 31 05:06:14.343000 audit[4840]: USER_ACCT pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:14.363481 kernel: audit: type=1101 audit(1761887174.343:1287): pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:14.363849 sshd[4840]: Accepted publickey for core from 139.178.68.195 port 49194 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:06:14.366000 audit[4840]: CRED_ACQ pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:14.375292 kernel: audit: type=1103 audit(1761887174.366:1288): pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:14.375940 kernel: audit: type=1006 audit(1761887174.366:1289): pid=4840 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 31 05:06:14.375106 sshd[4840]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:06:14.366000 audit[4840]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe12bd66e0 a2=3 a3=0 items=0 ppid=1 pid=4840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:14.388923 kernel: audit: type=1300 audit(1761887174.366:1289): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe12bd66e0 a2=3 a3=0 items=0 ppid=1 pid=4840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:14.392431 kernel: audit: type=1327 audit(1761887174.366:1289): proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:14.366000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:14.393162 systemd-logind[1193]: New session 16 of user core. Oct 31 05:06:14.396205 systemd[1]: Started session-16.scope. Oct 31 05:06:14.413000 audit[4840]: USER_START pid=4840 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:14.423160 kernel: audit: type=1105 audit(1761887174.413:1290): pid=4840 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:14.423000 audit[4842]: CRED_ACQ pid=4842 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:14.433795 kernel: audit: type=1103 audit(1761887174.423:1291): pid=4842 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:14.483920 kubelet[2006]: E1031 05:06:14.483813 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:06:15.237136 sshd[4840]: pam_unix(sshd:session): session closed for user core Oct 31 05:06:15.238000 audit[4840]: USER_END pid=4840 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:15.245320 systemd[1]: sshd@15-10.230.52.158:22-139.178.68.195:49194.service: Deactivated successfully. Oct 31 05:06:15.246851 systemd[1]: session-16.scope: Deactivated successfully. Oct 31 05:06:15.249184 systemd-logind[1193]: Session 16 logged out. Waiting for processes to exit. Oct 31 05:06:15.250806 kernel: audit: type=1106 audit(1761887175.238:1292): pid=4840 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:15.250637 systemd-logind[1193]: Removed session 16. Oct 31 05:06:15.238000 audit[4840]: CRED_DISP pid=4840 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:15.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.52.158:22-139.178.68.195:49194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:15.257807 kernel: audit: type=1104 audit(1761887175.238:1293): pid=4840 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:16.480935 env[1202]: time="2025-10-31T05:06:16.480233970Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 05:06:16.791632 env[1202]: time="2025-10-31T05:06:16.791525478Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:06:16.793051 env[1202]: time="2025-10-31T05:06:16.792963291Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 05:06:16.797354 kubelet[2006]: E1031 05:06:16.795099 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:06:16.798847 kubelet[2006]: E1031 05:06:16.798797 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:06:16.799883 kubelet[2006]: E1031 05:06:16.799816 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hgdhp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mtt9j_calico-system(f35619da-c214-4156-aacf-d0404664f402): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 05:06:16.802483 env[1202]: time="2025-10-31T05:06:16.802428107Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 05:06:17.114371 env[1202]: time="2025-10-31T05:06:17.114161344Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:06:17.115911 env[1202]: time="2025-10-31T05:06:17.115811381Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 05:06:17.116329 kubelet[2006]: E1031 05:06:17.116223 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:06:17.116530 kubelet[2006]: E1031 05:06:17.116489 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:06:17.116958 kubelet[2006]: E1031 05:06:17.116876 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hgdhp,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-mtt9j_calico-system(f35619da-c214-4156-aacf-d0404664f402): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 05:06:17.118435 kubelet[2006]: E1031 05:06:17.118368 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:06:19.869370 systemd[1]: run-containerd-runc-k8s.io-a1ceedce063cf46f9faf5b741490b25b94cf051b79377fd7fa1e870809d65170-runc.aBW99N.mount: Deactivated successfully. Oct 31 05:06:20.391360 systemd[1]: Started sshd@16-10.230.52.158:22-139.178.68.195:49208.service. Oct 31 05:06:20.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.52.158:22-139.178.68.195:49208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:20.398990 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 05:06:20.399141 kernel: audit: type=1130 audit(1761887180.392:1295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.52.158:22-139.178.68.195:49208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:21.311000 audit[4873]: USER_ACCT pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:21.321214 sshd[4873]: Accepted publickey for core from 139.178.68.195 port 49208 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:06:21.321793 kernel: audit: type=1101 audit(1761887181.311:1296): pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:21.321695 sshd[4873]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:06:21.320000 audit[4873]: CRED_ACQ pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:21.332800 kernel: audit: type=1103 audit(1761887181.320:1297): pid=4873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:21.338328 systemd-logind[1193]: New session 17 of user core. Oct 31 05:06:21.339575 systemd[1]: Started session-17.scope. Oct 31 05:06:21.351076 kernel: audit: type=1006 audit(1761887181.320:1298): pid=4873 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Oct 31 05:06:21.320000 audit[4873]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe44bad4f0 a2=3 a3=0 items=0 ppid=1 pid=4873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:21.363737 kernel: audit: type=1300 audit(1761887181.320:1298): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe44bad4f0 a2=3 a3=0 items=0 ppid=1 pid=4873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:21.363849 kernel: audit: type=1327 audit(1761887181.320:1298): proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:21.320000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:21.358000 audit[4873]: USER_START pid=4873 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:21.363000 audit[4875]: CRED_ACQ pid=4875 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:21.385186 kernel: audit: type=1105 audit(1761887181.358:1299): pid=4873 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:21.385309 kernel: audit: type=1103 audit(1761887181.363:1300): pid=4875 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:22.067729 sshd[4873]: pam_unix(sshd:session): session closed for user core Oct 31 05:06:22.069000 audit[4873]: USER_END pid=4873 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:22.081176 kernel: audit: type=1106 audit(1761887182.069:1301): pid=4873 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:22.080745 systemd[1]: sshd@16-10.230.52.158:22-139.178.68.195:49208.service: Deactivated successfully. Oct 31 05:06:22.082138 systemd[1]: session-17.scope: Deactivated successfully. Oct 31 05:06:22.083506 systemd-logind[1193]: Session 17 logged out. Waiting for processes to exit. Oct 31 05:06:22.069000 audit[4873]: CRED_DISP pid=4873 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:22.086360 systemd-logind[1193]: Removed session 17. Oct 31 05:06:22.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.52.158:22-139.178.68.195:49208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:22.092784 kernel: audit: type=1104 audit(1761887182.069:1302): pid=4873 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:22.475850 kubelet[2006]: E1031 05:06:22.475637 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:06:24.475405 env[1202]: time="2025-10-31T05:06:24.475328487Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 05:06:24.782900 env[1202]: time="2025-10-31T05:06:24.782591475Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:06:24.783982 env[1202]: time="2025-10-31T05:06:24.783819274Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 05:06:24.784191 kubelet[2006]: E1031 05:06:24.784130 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:06:24.784654 kubelet[2006]: E1031 05:06:24.784219 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:06:24.784654 kubelet[2006]: E1031 05:06:24.784436 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-4nn4g,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-xm6v4_calico-system(1790b000-669c-4853-a4f7-2a387055fce3): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 05:06:24.786073 kubelet[2006]: E1031 05:06:24.786027 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:06:25.477766 env[1202]: time="2025-10-31T05:06:25.477453477Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:06:25.790060 env[1202]: time="2025-10-31T05:06:25.789970141Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:06:25.791042 env[1202]: time="2025-10-31T05:06:25.790969158Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:06:25.791556 kubelet[2006]: E1031 05:06:25.791500 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:06:25.792085 kubelet[2006]: E1031 05:06:25.792043 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:06:25.792465 kubelet[2006]: E1031 05:06:25.792383 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-24cwm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-55bb969bf9-zh2rr_calico-apiserver(cc9bffc4-0639-44ba-8e71-6f37149ca54e): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:06:25.793878 kubelet[2006]: E1031 05:06:25.793823 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:06:26.474814 env[1202]: time="2025-10-31T05:06:26.474735049Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 05:06:26.803853 env[1202]: time="2025-10-31T05:06:26.803775385Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:06:26.805703 env[1202]: time="2025-10-31T05:06:26.805635523Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 05:06:26.806249 kubelet[2006]: E1031 05:06:26.806142 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:06:26.806670 kubelet[2006]: E1031 05:06:26.806276 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:06:26.806670 kubelet[2006]: E1031 05:06:26.806507 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:763067b974934c319e4416875c9b0696,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-8llcg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-568f7b959f-rlltz_calico-system(3ce94692-be26-453d-ab7d-92c59a810174): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 05:06:26.809472 env[1202]: time="2025-10-31T05:06:26.809436680Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 05:06:27.122705 env[1202]: time="2025-10-31T05:06:27.122492247Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:06:27.123865 env[1202]: time="2025-10-31T05:06:27.123792123Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 05:06:27.124281 kubelet[2006]: E1031 05:06:27.124194 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:06:27.124371 kubelet[2006]: E1031 05:06:27.124283 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:06:27.124561 kubelet[2006]: E1031 05:06:27.124492 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-8llcg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-568f7b959f-rlltz_calico-system(3ce94692-be26-453d-ab7d-92c59a810174): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 05:06:27.126280 kubelet[2006]: E1031 05:06:27.126213 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-568f7b959f-rlltz" podUID="3ce94692-be26-453d-ab7d-92c59a810174" Oct 31 05:06:27.223208 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 05:06:27.223446 kernel: audit: type=1130 audit(1761887187.217:1304): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.52.158:22-139.178.68.195:53494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:27.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.52.158:22-139.178.68.195:53494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:27.218329 systemd[1]: Started sshd@17-10.230.52.158:22-139.178.68.195:53494.service. Oct 31 05:06:27.476561 env[1202]: time="2025-10-31T05:06:27.475436160Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:06:27.785081 env[1202]: time="2025-10-31T05:06:27.784953049Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:06:27.786170 env[1202]: time="2025-10-31T05:06:27.786095639Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:06:27.786579 kubelet[2006]: E1031 05:06:27.786510 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:06:27.786685 kubelet[2006]: E1031 05:06:27.786594 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:06:27.787408 kubelet[2006]: E1031 05:06:27.787287 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-lfjq6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-55bb969bf9-slz9n_calico-apiserver(bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:06:27.788802 kubelet[2006]: E1031 05:06:27.788734 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:06:28.128000 audit[4886]: USER_ACCT pid=4886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:28.133882 sshd[4886]: Accepted publickey for core from 139.178.68.195 port 53494 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:06:28.139777 kernel: audit: type=1101 audit(1761887188.128:1305): pid=4886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:28.139888 sshd[4886]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:06:28.138000 audit[4886]: CRED_ACQ pid=4886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:28.155732 kernel: audit: type=1103 audit(1761887188.138:1306): pid=4886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:28.155054 systemd-logind[1193]: New session 18 of user core. Oct 31 05:06:28.138000 audit[4886]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe22205110 a2=3 a3=0 items=0 ppid=1 pid=4886 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:28.161959 systemd[1]: Started session-18.scope. Oct 31 05:06:28.168720 kernel: audit: type=1006 audit(1761887188.138:1307): pid=4886 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Oct 31 05:06:28.168825 kernel: audit: type=1300 audit(1761887188.138:1307): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe22205110 a2=3 a3=0 items=0 ppid=1 pid=4886 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:28.138000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:28.170000 audit[4886]: USER_START pid=4886 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:28.182254 kernel: audit: type=1327 audit(1761887188.138:1307): proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:28.182388 kernel: audit: type=1105 audit(1761887188.170:1308): pid=4886 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:28.173000 audit[4888]: CRED_ACQ pid=4888 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:28.188739 kernel: audit: type=1103 audit(1761887188.173:1309): pid=4888 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:28.908206 sshd[4886]: pam_unix(sshd:session): session closed for user core Oct 31 05:06:28.910000 audit[4886]: USER_END pid=4886 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:28.918212 systemd[1]: sshd@17-10.230.52.158:22-139.178.68.195:53494.service: Deactivated successfully. Oct 31 05:06:28.928067 kernel: audit: type=1106 audit(1761887188.910:1310): pid=4886 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:28.923592 systemd-logind[1193]: Session 18 logged out. Waiting for processes to exit. Oct 31 05:06:28.925154 systemd[1]: session-18.scope: Deactivated successfully. Oct 31 05:06:28.927498 systemd-logind[1193]: Removed session 18. Oct 31 05:06:28.910000 audit[4886]: CRED_DISP pid=4886 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:28.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.52.158:22-139.178.68.195:53494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:28.935897 kernel: audit: type=1104 audit(1761887188.910:1311): pid=4886 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:29.066900 systemd[1]: Started sshd@18-10.230.52.158:22-139.178.68.195:53510.service. Oct 31 05:06:29.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.52.158:22-139.178.68.195:53510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:29.975000 audit[4904]: USER_ACCT pid=4904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:29.977085 sshd[4904]: Accepted publickey for core from 139.178.68.195 port 53510 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:06:29.978000 audit[4904]: CRED_ACQ pid=4904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:29.978000 audit[4904]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffadaafad0 a2=3 a3=0 items=0 ppid=1 pid=4904 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:29.978000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:29.979870 sshd[4904]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:06:29.987500 systemd-logind[1193]: New session 19 of user core. Oct 31 05:06:29.988608 systemd[1]: Started session-19.scope. Oct 31 05:06:29.997000 audit[4904]: USER_START pid=4904 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:29.999000 audit[4906]: CRED_ACQ pid=4906 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:31.056009 sshd[4904]: pam_unix(sshd:session): session closed for user core Oct 31 05:06:31.058000 audit[4904]: USER_END pid=4904 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:31.058000 audit[4904]: CRED_DISP pid=4904 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:31.060740 systemd[1]: sshd@18-10.230.52.158:22-139.178.68.195:53510.service: Deactivated successfully. Oct 31 05:06:31.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.52.158:22-139.178.68.195:53510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:31.062363 systemd-logind[1193]: Session 19 logged out. Waiting for processes to exit. Oct 31 05:06:31.062420 systemd[1]: session-19.scope: Deactivated successfully. Oct 31 05:06:31.065226 systemd-logind[1193]: Removed session 19. Oct 31 05:06:31.203660 systemd[1]: Started sshd@19-10.230.52.158:22-139.178.68.195:53520.service. Oct 31 05:06:31.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.52.158:22-139.178.68.195:53520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:31.487473 kubelet[2006]: E1031 05:06:31.487278 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:06:32.111000 audit[4927]: USER_ACCT pid=4927 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:32.112815 sshd[4927]: Accepted publickey for core from 139.178.68.195 port 53520 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:06:32.114000 audit[4927]: CRED_ACQ pid=4927 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:32.114000 audit[4927]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe3a17d50 a2=3 a3=0 items=0 ppid=1 pid=4927 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:32.114000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:32.115539 sshd[4927]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:06:32.122769 systemd-logind[1193]: New session 20 of user core. Oct 31 05:06:32.123904 systemd[1]: Started session-20.scope. Oct 31 05:06:32.134000 audit[4927]: USER_START pid=4927 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:32.136000 audit[4931]: CRED_ACQ pid=4931 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:33.653657 kernel: kauditd_printk_skb: 20 callbacks suppressed Oct 31 05:06:33.656513 kernel: audit: type=1325 audit(1761887193.641:1328): table=filter:123 family=2 entries=26 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:06:33.641000 audit[4942]: NETFILTER_CFG table=filter:123 family=2 entries=26 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:06:33.641000 audit[4942]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffe73059f20 a2=0 a3=7ffe73059f0c items=0 ppid=2114 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:33.674779 kernel: audit: type=1300 audit(1761887193.641:1328): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffe73059f20 a2=0 a3=7ffe73059f0c items=0 ppid=2114 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:33.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:06:33.680803 kernel: audit: type=1327 audit(1761887193.641:1328): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:06:33.671000 audit[4942]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:06:33.671000 audit[4942]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe73059f20 a2=0 a3=0 items=0 ppid=2114 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:33.693591 kernel: audit: type=1325 audit(1761887193.671:1329): table=nat:124 family=2 entries=20 op=nft_register_rule pid=4942 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:06:33.693725 kernel: audit: type=1300 audit(1761887193.671:1329): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe73059f20 a2=0 a3=0 items=0 ppid=2114 pid=4942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:33.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:06:33.699049 kernel: audit: type=1327 audit(1761887193.671:1329): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:06:33.703374 sshd[4927]: pam_unix(sshd:session): session closed for user core Oct 31 05:06:33.707000 audit[4927]: USER_END pid=4927 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:33.711144 systemd[1]: sshd@19-10.230.52.158:22-139.178.68.195:53520.service: Deactivated successfully. Oct 31 05:06:33.713503 systemd[1]: session-20.scope: Deactivated successfully. Oct 31 05:06:33.715822 kernel: audit: type=1106 audit(1761887193.707:1330): pid=4927 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:33.716508 systemd-logind[1193]: Session 20 logged out. Waiting for processes to exit. Oct 31 05:06:33.707000 audit[4927]: CRED_DISP pid=4927 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:33.723619 systemd-logind[1193]: Removed session 20. Oct 31 05:06:33.723875 kernel: audit: type=1104 audit(1761887193.707:1331): pid=4927 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:33.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.52.158:22-139.178.68.195:53520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:33.733789 kernel: audit: type=1131 audit(1761887193.707:1332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.52.158:22-139.178.68.195:53520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:33.744000 audit[4945]: NETFILTER_CFG table=filter:125 family=2 entries=38 op=nft_register_rule pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:06:33.744000 audit[4945]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fffa1f3cd40 a2=0 a3=7fffa1f3cd2c items=0 ppid=2114 pid=4945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:33.744000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:06:33.750803 kernel: audit: type=1325 audit(1761887193.744:1333): table=filter:125 family=2 entries=38 op=nft_register_rule pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:06:33.751000 audit[4945]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:06:33.751000 audit[4945]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffa1f3cd40 a2=0 a3=0 items=0 ppid=2114 pid=4945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:33.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:06:33.849579 systemd[1]: Started sshd@20-10.230.52.158:22-139.178.68.195:35546.service. Oct 31 05:06:33.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.52.158:22-139.178.68.195:35546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:34.476910 env[1202]: time="2025-10-31T05:06:34.476132939Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 05:06:34.747000 audit[4947]: USER_ACCT pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:34.748875 sshd[4947]: Accepted publickey for core from 139.178.68.195 port 35546 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:06:34.750000 audit[4947]: CRED_ACQ pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:34.750000 audit[4947]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc16137110 a2=3 a3=0 items=0 ppid=1 pid=4947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:34.750000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:34.752463 sshd[4947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:06:34.760849 systemd-logind[1193]: New session 21 of user core. Oct 31 05:06:34.761855 systemd[1]: Started session-21.scope. Oct 31 05:06:34.770000 audit[4947]: USER_START pid=4947 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:34.774000 audit[4949]: CRED_ACQ pid=4949 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:34.943935 env[1202]: time="2025-10-31T05:06:34.943820777Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:06:34.945246 env[1202]: time="2025-10-31T05:06:34.945163632Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 05:06:34.945628 kubelet[2006]: E1031 05:06:34.945551 2006 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:06:34.946117 kubelet[2006]: E1031 05:06:34.945654 2006 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:06:34.946117 kubelet[2006]: E1031 05:06:34.945929 2006 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h8bpd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-68b55d66b7-gbk97_calico-system(a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 05:06:34.947626 kubelet[2006]: E1031 05:06:34.947585 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:06:36.043435 sshd[4947]: pam_unix(sshd:session): session closed for user core Oct 31 05:06:36.046000 audit[4947]: USER_END pid=4947 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:36.047000 audit[4947]: CRED_DISP pid=4947 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:36.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.52.158:22-139.178.68.195:35546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:36.049894 systemd[1]: sshd@20-10.230.52.158:22-139.178.68.195:35546.service: Deactivated successfully. Oct 31 05:06:36.051023 systemd[1]: session-21.scope: Deactivated successfully. Oct 31 05:06:36.052455 systemd-logind[1193]: Session 21 logged out. Waiting for processes to exit. Oct 31 05:06:36.054432 systemd-logind[1193]: Removed session 21. Oct 31 05:06:36.197643 systemd[1]: Started sshd@21-10.230.52.158:22-139.178.68.195:35550.service. Oct 31 05:06:36.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.52.158:22-139.178.68.195:35550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:37.114328 sshd[4957]: Accepted publickey for core from 139.178.68.195 port 35550 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:06:37.112000 audit[4957]: USER_ACCT pid=4957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:37.114000 audit[4957]: CRED_ACQ pid=4957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:37.114000 audit[4957]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff650bab70 a2=3 a3=0 items=0 ppid=1 pid=4957 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:37.114000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:37.116504 sshd[4957]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:06:37.125359 systemd-logind[1193]: New session 22 of user core. Oct 31 05:06:37.126398 systemd[1]: Started session-22.scope. Oct 31 05:06:37.135000 audit[4957]: USER_START pid=4957 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:37.138000 audit[4959]: CRED_ACQ pid=4959 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:37.477625 kubelet[2006]: E1031 05:06:37.477145 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:06:37.859416 sshd[4957]: pam_unix(sshd:session): session closed for user core Oct 31 05:06:37.859000 audit[4957]: USER_END pid=4957 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:37.859000 audit[4957]: CRED_DISP pid=4957 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:37.863744 systemd-logind[1193]: Session 22 logged out. Waiting for processes to exit. Oct 31 05:06:37.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.52.158:22-139.178.68.195:35550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:37.865054 systemd[1]: sshd@21-10.230.52.158:22-139.178.68.195:35550.service: Deactivated successfully. Oct 31 05:06:37.866098 systemd[1]: session-22.scope: Deactivated successfully. Oct 31 05:06:37.868104 systemd-logind[1193]: Removed session 22. Oct 31 05:06:39.481538 kubelet[2006]: E1031 05:06:39.481482 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:06:39.484156 kubelet[2006]: E1031 05:06:39.484097 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-568f7b959f-rlltz" podUID="3ce94692-be26-453d-ab7d-92c59a810174" Oct 31 05:06:41.479295 kubelet[2006]: E1031 05:06:41.478605 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:06:43.018035 systemd[1]: Started sshd@22-10.230.52.158:22-139.178.68.195:35552.service. Oct 31 05:06:43.043327 kernel: kauditd_printk_skb: 27 callbacks suppressed Oct 31 05:06:43.044043 kernel: audit: type=1130 audit(1761887203.017:1353): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.52.158:22-139.178.68.195:35552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:43.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.52.158:22-139.178.68.195:35552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:43.922000 audit[4969]: USER_ACCT pid=4969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:43.933735 sshd[4969]: Accepted publickey for core from 139.178.68.195 port 35552 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:06:43.934295 kernel: audit: type=1101 audit(1761887203.922:1354): pid=4969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:43.936460 sshd[4969]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:06:43.945108 kernel: audit: type=1103 audit(1761887203.932:1355): pid=4969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:43.932000 audit[4969]: CRED_ACQ pid=4969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:43.949374 systemd-logind[1193]: New session 23 of user core. Oct 31 05:06:43.950792 systemd[1]: Started session-23.scope. Oct 31 05:06:43.960790 kernel: audit: type=1006 audit(1761887203.935:1356): pid=4969 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Oct 31 05:06:43.935000 audit[4969]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee86fb7b0 a2=3 a3=0 items=0 ppid=1 pid=4969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:43.968778 kernel: audit: type=1300 audit(1761887203.935:1356): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee86fb7b0 a2=3 a3=0 items=0 ppid=1 pid=4969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:43.976805 kernel: audit: type=1327 audit(1761887203.935:1356): proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:43.935000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:43.971000 audit[4969]: USER_START pid=4969 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:43.987788 kernel: audit: type=1105 audit(1761887203.971:1357): pid=4969 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:43.976000 audit[4971]: CRED_ACQ pid=4971 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:43.996780 kernel: audit: type=1103 audit(1761887203.976:1358): pid=4971 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:44.477025 kubelet[2006]: E1031 05:06:44.476956 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:06:44.736211 sshd[4969]: pam_unix(sshd:session): session closed for user core Oct 31 05:06:44.746806 kernel: audit: type=1106 audit(1761887204.736:1359): pid=4969 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:44.736000 audit[4969]: USER_END pid=4969 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:44.747698 systemd[1]: sshd@22-10.230.52.158:22-139.178.68.195:35552.service: Deactivated successfully. Oct 31 05:06:44.748859 systemd[1]: session-23.scope: Deactivated successfully. Oct 31 05:06:44.750170 systemd-logind[1193]: Session 23 logged out. Waiting for processes to exit. Oct 31 05:06:44.736000 audit[4969]: CRED_DISP pid=4969 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:44.757438 systemd-logind[1193]: Removed session 23. Oct 31 05:06:44.757791 kernel: audit: type=1104 audit(1761887204.736:1360): pid=4969 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:44.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.52.158:22-139.178.68.195:35552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:44.754000 audit[4980]: NETFILTER_CFG table=filter:127 family=2 entries=26 op=nft_register_rule pid=4980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:06:44.754000 audit[4980]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffef8bd55f0 a2=0 a3=7ffef8bd55dc items=0 ppid=2114 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:44.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:06:44.766000 audit[4980]: NETFILTER_CFG table=nat:128 family=2 entries=104 op=nft_register_chain pid=4980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:06:44.766000 audit[4980]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffef8bd55f0 a2=0 a3=7ffef8bd55dc items=0 ppid=2114 pid=4980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:44.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:06:49.478370 kubelet[2006]: E1031 05:06:49.478310 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8" Oct 31 05:06:49.849932 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 31 05:06:49.850259 kernel: audit: type=1400 audit(1761887209.839:1364): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:49.839000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:49.839000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002afc080 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:06:49.880389 kernel: audit: type=1300 audit(1761887209.839:1364): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002afc080 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:06:49.880524 kernel: audit: type=1327 audit(1761887209.839:1364): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:06:49.839000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:06:49.900000 systemd[1]: Started sshd@23-10.230.52.158:22-139.178.68.195:50596.service. Oct 31 05:06:49.839000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:49.911833 kernel: audit: type=1400 audit(1761887209.839:1365): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:49.839000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001652cf0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:06:49.922949 kernel: audit: type=1300 audit(1761887209.839:1365): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001652cf0 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:06:49.839000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:06:49.934875 kernel: audit: type=1327 audit(1761887209.839:1365): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:06:49.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.230.52.158:22-139.178.68.195:50596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:49.945856 kernel: audit: type=1130 audit(1761887209.899:1366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.230.52.158:22-139.178.68.195:50596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:50.874000 audit[4991]: USER_ACCT pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:50.879726 sshd[4991]: Accepted publickey for core from 139.178.68.195 port 50596 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:06:50.885799 kernel: audit: type=1101 audit(1761887210.874:1367): pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:50.885000 audit[4991]: CRED_ACQ pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:50.887929 sshd[4991]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:06:50.892829 kernel: audit: type=1103 audit(1761887210.885:1368): pid=4991 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:50.885000 audit[4991]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff979bff0 a2=3 a3=0 items=0 ppid=1 pid=4991 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:50.885000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:50.897796 kernel: audit: type=1006 audit(1761887210.885:1369): pid=4991 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Oct 31 05:06:50.903516 systemd-logind[1193]: New session 24 of user core. Oct 31 05:06:50.904986 systemd[1]: Started session-24.scope. Oct 31 05:06:50.914000 audit[4991]: USER_START pid=4991 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:50.917000 audit[5004]: CRED_ACQ pid=5004 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:51.163000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:51.163000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526391 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:51.163000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c007336cc0 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:06:51.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:06:51.163000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0110bd320 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:06:51.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:06:51.165000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526397 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:51.165000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0110bd380 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:06:51.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:06:51.167000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:51.167000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00978e080 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:06:51.167000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:06:51.204000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:51.204000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0110bdb00 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:06:51.204000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:06:51.204000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:51.204000 audit[1841]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00385e1c0 a2=fc6 a3=0 items=0 ppid=1733 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c658,c731 key=(null) Oct 31 05:06:51.204000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E35322E313538002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:06:51.478407 kubelet[2006]: E1031 05:06:51.478242 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-xm6v4" podUID="1790b000-669c-4853-a4f7-2a387055fce3" Oct 31 05:06:51.669462 sshd[4991]: pam_unix(sshd:session): session closed for user core Oct 31 05:06:51.670000 audit[4991]: USER_END pid=4991 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:51.671000 audit[4991]: CRED_DISP pid=4991 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:51.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.230.52.158:22-139.178.68.195:50596 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:51.675027 systemd[1]: sshd@23-10.230.52.158:22-139.178.68.195:50596.service: Deactivated successfully. Oct 31 05:06:51.676262 systemd[1]: session-24.scope: Deactivated successfully. Oct 31 05:06:51.677665 systemd-logind[1193]: Session 24 logged out. Waiting for processes to exit. Oct 31 05:06:51.680740 systemd-logind[1193]: Removed session 24. Oct 31 05:06:52.474770 kubelet[2006]: E1031 05:06:52.474704 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-zh2rr" podUID="cc9bffc4-0639-44ba-8e71-6f37149ca54e" Oct 31 05:06:52.476532 kubelet[2006]: E1031 05:06:52.476499 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-55bb969bf9-slz9n" podUID="bc8a8ec6-0963-4bd0-9ebd-1371d51f1bc0" Oct 31 05:06:54.475618 kubelet[2006]: E1031 05:06:54.475550 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-568f7b959f-rlltz" podUID="3ce94692-be26-453d-ab7d-92c59a810174" Oct 31 05:06:55.623875 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 31 05:06:55.624989 kernel: audit: type=1400 audit(1761887215.614:1381): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:55.614000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:55.614000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002afd740 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:06:55.634545 kernel: audit: type=1300 audit(1761887215.614:1381): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002afd740 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:06:55.614000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:06:55.643781 kernel: audit: type=1327 audit(1761887215.614:1381): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:06:55.614000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:55.651780 kernel: audit: type=1400 audit(1761887215.614:1382): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:55.614000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002afd760 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:06:55.614000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:06:55.667120 kernel: audit: type=1300 audit(1761887215.614:1382): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002afd760 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:06:55.667390 kernel: audit: type=1327 audit(1761887215.614:1382): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:06:55.667478 kernel: audit: type=1400 audit(1761887215.621:1383): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:55.621000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:55.621000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028f5000 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:06:55.685798 kernel: audit: type=1300 audit(1761887215.621:1383): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028f5000 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:06:55.621000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:06:55.696324 kernel: audit: type=1327 audit(1761887215.621:1383): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:06:55.621000 audit[1897]: AVC avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:55.703777 kernel: audit: type=1400 audit(1761887215.621:1384): avc: denied { watch } for pid=1897 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:06:55.621000 audit[1897]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0028f5020 a2=fc6 a3=0 items=0 ppid=1717 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c506,c988 key=(null) Oct 31 05:06:55.621000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:06:56.475366 kubelet[2006]: E1031 05:06:56.475291 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-mtt9j" podUID="f35619da-c214-4156-aacf-d0404664f402" Oct 31 05:06:56.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.230.52.158:22-139.178.68.195:43172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:56.825117 systemd[1]: Started sshd@24-10.230.52.158:22-139.178.68.195:43172.service. Oct 31 05:06:57.773000 audit[5017]: USER_ACCT pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:57.774845 sshd[5017]: Accepted publickey for core from 139.178.68.195 port 43172 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:06:57.775000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:57.775000 audit[5017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1be9b6d0 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:06:57.775000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:06:57.777562 sshd[5017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:06:57.786439 systemd[1]: Started session-25.scope. Oct 31 05:06:57.787059 systemd-logind[1193]: New session 25 of user core. Oct 31 05:06:57.794000 audit[5017]: USER_START pid=5017 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:57.797000 audit[5019]: CRED_ACQ pid=5019 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:58.577135 sshd[5017]: pam_unix(sshd:session): session closed for user core Oct 31 05:06:58.578000 audit[5017]: USER_END pid=5017 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:58.578000 audit[5017]: CRED_DISP pid=5017 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:06:58.581178 systemd[1]: sshd@24-10.230.52.158:22-139.178.68.195:43172.service: Deactivated successfully. Oct 31 05:06:58.582364 systemd[1]: session-25.scope: Deactivated successfully. Oct 31 05:06:58.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.230.52.158:22-139.178.68.195:43172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:06:58.583987 systemd-logind[1193]: Session 25 logged out. Waiting for processes to exit. Oct 31 05:06:58.585691 systemd-logind[1193]: Removed session 25. Oct 31 05:07:01.477385 kubelet[2006]: E1031 05:07:01.477307 2006 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-68b55d66b7-gbk97" podUID="a2df8d92-63e1-4c8f-ad2f-5941fc3f36c8"