Oct 31 05:29:29.882478 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Oct 30 23:32:41 -00 2025 Oct 31 05:29:29.882503 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 05:29:29.882527 kernel: BIOS-provided physical RAM map: Oct 31 05:29:29.882535 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 31 05:29:29.882542 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 31 05:29:29.888571 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 31 05:29:29.888585 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Oct 31 05:29:29.888594 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Oct 31 05:29:29.888601 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Oct 31 05:29:29.888608 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Oct 31 05:29:29.888637 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 31 05:29:29.888645 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 31 05:29:29.888652 kernel: NX (Execute Disable) protection: active Oct 31 05:29:29.888660 kernel: SMBIOS 2.8 present. Oct 31 05:29:29.888670 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Oct 31 05:29:29.888678 kernel: Hypervisor detected: KVM Oct 31 05:29:29.888689 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 31 05:29:29.888697 kernel: kvm-clock: cpu 0, msr 341a0001, primary cpu clock Oct 31 05:29:29.888705 kernel: kvm-clock: using sched offset of 4135915858 cycles Oct 31 05:29:29.888714 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 31 05:29:29.888722 kernel: tsc: Detected 2294.576 MHz processor Oct 31 05:29:29.888730 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 31 05:29:29.888739 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 31 05:29:29.888747 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Oct 31 05:29:29.888755 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 31 05:29:29.888766 kernel: Using GB pages for direct mapping Oct 31 05:29:29.888779 kernel: ACPI: Early table checksum verification disabled Oct 31 05:29:29.888788 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Oct 31 05:29:29.888796 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:29:29.888804 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:29:29.888812 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:29:29.888820 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Oct 31 05:29:29.888828 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:29:29.888836 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:29:29.888847 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:29:29.888855 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:29:29.888870 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Oct 31 05:29:29.888880 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Oct 31 05:29:29.888887 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Oct 31 05:29:29.888896 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Oct 31 05:29:29.888908 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Oct 31 05:29:29.888919 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Oct 31 05:29:29.888928 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Oct 31 05:29:29.888937 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 31 05:29:29.888946 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 31 05:29:29.888954 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Oct 31 05:29:29.888963 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Oct 31 05:29:29.888971 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Oct 31 05:29:29.888982 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Oct 31 05:29:29.888990 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Oct 31 05:29:29.888999 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Oct 31 05:29:29.889007 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Oct 31 05:29:29.889015 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Oct 31 05:29:29.889024 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Oct 31 05:29:29.889032 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Oct 31 05:29:29.889041 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Oct 31 05:29:29.889049 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Oct 31 05:29:29.889058 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Oct 31 05:29:29.889068 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Oct 31 05:29:29.889077 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 31 05:29:29.889086 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Oct 31 05:29:29.889094 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Oct 31 05:29:29.889103 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Oct 31 05:29:29.889112 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Oct 31 05:29:29.889121 kernel: Zone ranges: Oct 31 05:29:29.889130 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 31 05:29:29.889138 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Oct 31 05:29:29.889149 kernel: Normal empty Oct 31 05:29:29.889157 kernel: Movable zone start for each node Oct 31 05:29:29.889166 kernel: Early memory node ranges Oct 31 05:29:29.889174 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 31 05:29:29.889183 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Oct 31 05:29:29.889191 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Oct 31 05:29:29.889207 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 31 05:29:29.889215 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 31 05:29:29.889224 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Oct 31 05:29:29.889235 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 31 05:29:29.889244 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 31 05:29:29.889252 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 31 05:29:29.889261 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 31 05:29:29.889270 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 31 05:29:29.889278 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 31 05:29:29.889287 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 31 05:29:29.889296 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 31 05:29:29.889304 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 31 05:29:29.889315 kernel: TSC deadline timer available Oct 31 05:29:29.889324 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Oct 31 05:29:29.889333 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Oct 31 05:29:29.889342 kernel: Booting paravirtualized kernel on KVM Oct 31 05:29:29.889351 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 31 05:29:29.889360 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Oct 31 05:29:29.889369 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Oct 31 05:29:29.889377 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Oct 31 05:29:29.889386 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Oct 31 05:29:29.889396 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Oct 31 05:29:29.889405 kernel: kvm-guest: PV spinlocks enabled Oct 31 05:29:29.889414 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 31 05:29:29.889422 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Oct 31 05:29:29.889431 kernel: Policy zone: DMA32 Oct 31 05:29:29.889441 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 05:29:29.889450 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 31 05:29:29.889459 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 31 05:29:29.889470 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 31 05:29:29.889478 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 31 05:29:29.889487 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 192524K reserved, 0K cma-reserved) Oct 31 05:29:29.889496 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Oct 31 05:29:29.889505 kernel: ftrace: allocating 34614 entries in 136 pages Oct 31 05:29:29.889513 kernel: ftrace: allocated 136 pages with 2 groups Oct 31 05:29:29.889546 kernel: rcu: Hierarchical RCU implementation. Oct 31 05:29:29.889555 kernel: rcu: RCU event tracing is enabled. Oct 31 05:29:29.889564 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Oct 31 05:29:29.889575 kernel: Rude variant of Tasks RCU enabled. Oct 31 05:29:29.889584 kernel: Tracing variant of Tasks RCU enabled. Oct 31 05:29:29.889593 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 31 05:29:29.889602 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Oct 31 05:29:29.889610 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Oct 31 05:29:29.889619 kernel: random: crng init done Oct 31 05:29:29.889628 kernel: Console: colour VGA+ 80x25 Oct 31 05:29:29.889647 kernel: printk: console [tty0] enabled Oct 31 05:29:29.889656 kernel: printk: console [ttyS0] enabled Oct 31 05:29:29.889665 kernel: ACPI: Core revision 20210730 Oct 31 05:29:29.889674 kernel: APIC: Switch to symmetric I/O mode setup Oct 31 05:29:29.889684 kernel: x2apic enabled Oct 31 05:29:29.889695 kernel: Switched APIC routing to physical x2apic. Oct 31 05:29:29.889705 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2113312ac93, max_idle_ns: 440795244843 ns Oct 31 05:29:29.889714 kernel: Calibrating delay loop (skipped) preset value.. 4589.15 BogoMIPS (lpj=2294576) Oct 31 05:29:29.889724 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 31 05:29:29.889733 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Oct 31 05:29:29.889744 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Oct 31 05:29:29.889754 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 31 05:29:29.889763 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Oct 31 05:29:29.889772 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Oct 31 05:29:29.889781 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Oct 31 05:29:29.889790 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Oct 31 05:29:29.889799 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Oct 31 05:29:29.889808 kernel: RETBleed: Mitigation: Enhanced IBRS Oct 31 05:29:29.889817 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 31 05:29:29.889826 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 31 05:29:29.889838 kernel: TAA: Mitigation: Clear CPU buffers Oct 31 05:29:29.889847 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Oct 31 05:29:29.889856 kernel: GDS: Unknown: Dependent on hypervisor status Oct 31 05:29:29.889865 kernel: active return thunk: its_return_thunk Oct 31 05:29:29.889874 kernel: ITS: Mitigation: Aligned branch/return thunks Oct 31 05:29:29.889883 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 31 05:29:29.889892 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 31 05:29:29.889901 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 31 05:29:29.889911 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Oct 31 05:29:29.889920 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Oct 31 05:29:29.889929 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Oct 31 05:29:29.889940 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Oct 31 05:29:29.889949 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 31 05:29:29.889958 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Oct 31 05:29:29.889967 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Oct 31 05:29:29.889976 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Oct 31 05:29:29.889985 kernel: x86/fpu: xstate_offset[9]: 2432, xstate_sizes[9]: 8 Oct 31 05:29:29.889994 kernel: x86/fpu: Enabled xstate features 0x2e7, context size is 2440 bytes, using 'compacted' format. Oct 31 05:29:29.890004 kernel: Freeing SMP alternatives memory: 32K Oct 31 05:29:29.890013 kernel: pid_max: default: 32768 minimum: 301 Oct 31 05:29:29.890022 kernel: LSM: Security Framework initializing Oct 31 05:29:29.890031 kernel: SELinux: Initializing. Oct 31 05:29:29.890040 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 31 05:29:29.890051 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 31 05:29:29.890060 kernel: smpboot: CPU0: Intel Xeon Processor (Cascadelake) (family: 0x6, model: 0x55, stepping: 0x6) Oct 31 05:29:29.890069 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Oct 31 05:29:29.890079 kernel: signal: max sigframe size: 3632 Oct 31 05:29:29.890088 kernel: rcu: Hierarchical SRCU implementation. Oct 31 05:29:29.890098 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 31 05:29:29.890107 kernel: smp: Bringing up secondary CPUs ... Oct 31 05:29:29.890116 kernel: x86: Booting SMP configuration: Oct 31 05:29:29.890125 kernel: .... node #0, CPUs: #1 Oct 31 05:29:29.890134 kernel: kvm-clock: cpu 1, msr 341a0041, secondary cpu clock Oct 31 05:29:29.890146 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Oct 31 05:29:29.890155 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Oct 31 05:29:29.890164 kernel: smp: Brought up 1 node, 2 CPUs Oct 31 05:29:29.890173 kernel: smpboot: Max logical packages: 16 Oct 31 05:29:29.890182 kernel: smpboot: Total of 2 processors activated (9178.30 BogoMIPS) Oct 31 05:29:29.890191 kernel: devtmpfs: initialized Oct 31 05:29:29.890206 kernel: x86/mm: Memory block size: 128MB Oct 31 05:29:29.890215 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 31 05:29:29.890225 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Oct 31 05:29:29.890236 kernel: pinctrl core: initialized pinctrl subsystem Oct 31 05:29:29.890246 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 31 05:29:29.890255 kernel: audit: initializing netlink subsys (disabled) Oct 31 05:29:29.890264 kernel: audit: type=2000 audit(1761888568.824:1): state=initialized audit_enabled=0 res=1 Oct 31 05:29:29.890273 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 31 05:29:29.890282 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 31 05:29:29.890291 kernel: cpuidle: using governor menu Oct 31 05:29:29.890300 kernel: ACPI: bus type PCI registered Oct 31 05:29:29.890309 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 31 05:29:29.890321 kernel: dca service started, version 1.12.1 Oct 31 05:29:29.890330 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Oct 31 05:29:29.890339 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Oct 31 05:29:29.890349 kernel: PCI: Using configuration type 1 for base access Oct 31 05:29:29.890358 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 31 05:29:29.890367 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 31 05:29:29.890376 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 31 05:29:29.890386 kernel: ACPI: Added _OSI(Module Device) Oct 31 05:29:29.890395 kernel: ACPI: Added _OSI(Processor Device) Oct 31 05:29:29.890406 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 31 05:29:29.890415 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 31 05:29:29.890424 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 31 05:29:29.890434 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 31 05:29:29.890443 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 31 05:29:29.890452 kernel: ACPI: Interpreter enabled Oct 31 05:29:29.890462 kernel: ACPI: PM: (supports S0 S5) Oct 31 05:29:29.890471 kernel: ACPI: Using IOAPIC for interrupt routing Oct 31 05:29:29.890480 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 31 05:29:29.890492 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Oct 31 05:29:29.890502 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 31 05:29:29.890668 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 31 05:29:29.890761 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 31 05:29:29.890848 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 31 05:29:29.890860 kernel: PCI host bridge to bus 0000:00 Oct 31 05:29:29.890950 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 31 05:29:29.891033 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 31 05:29:29.891110 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 31 05:29:29.891187 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Oct 31 05:29:29.891271 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 31 05:29:29.891347 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Oct 31 05:29:29.891424 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 31 05:29:29.891545 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Oct 31 05:29:29.891653 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Oct 31 05:29:29.891747 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Oct 31 05:29:29.891835 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Oct 31 05:29:29.891923 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Oct 31 05:29:29.892010 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 31 05:29:29.892104 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Oct 31 05:29:29.892206 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Oct 31 05:29:29.892315 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Oct 31 05:29:29.892404 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Oct 31 05:29:29.892499 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Oct 31 05:29:29.892596 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Oct 31 05:29:29.892692 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Oct 31 05:29:29.892784 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Oct 31 05:29:29.892884 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Oct 31 05:29:29.892972 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Oct 31 05:29:29.893064 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Oct 31 05:29:29.893152 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Oct 31 05:29:29.893253 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Oct 31 05:29:29.893376 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Oct 31 05:29:29.893468 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Oct 31 05:29:29.896676 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Oct 31 05:29:29.896790 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Oct 31 05:29:29.896888 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Oct 31 05:29:29.896983 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Oct 31 05:29:29.897077 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Oct 31 05:29:29.897175 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Oct 31 05:29:29.897299 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 31 05:29:29.897395 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Oct 31 05:29:29.897490 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Oct 31 05:29:29.897623 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Oct 31 05:29:29.897721 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Oct 31 05:29:29.897811 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Oct 31 05:29:29.897907 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Oct 31 05:29:29.897995 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Oct 31 05:29:29.898081 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Oct 31 05:29:29.898172 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Oct 31 05:29:29.898265 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Oct 31 05:29:29.898362 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Oct 31 05:29:29.898458 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Oct 31 05:29:29.898556 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Oct 31 05:29:29.898644 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Oct 31 05:29:29.898730 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 31 05:29:29.898826 kernel: pci_bus 0000:02: extended config space not accessible Oct 31 05:29:29.898928 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Oct 31 05:29:29.899029 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Oct 31 05:29:29.899121 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Oct 31 05:29:29.899217 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Oct 31 05:29:29.899318 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Oct 31 05:29:29.899409 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Oct 31 05:29:29.899498 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Oct 31 05:29:29.899596 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Oct 31 05:29:29.899695 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 31 05:29:29.899799 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Oct 31 05:29:29.899894 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Oct 31 05:29:29.900004 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Oct 31 05:29:29.900092 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Oct 31 05:29:29.900601 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 31 05:29:29.900702 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Oct 31 05:29:29.900790 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Oct 31 05:29:29.900879 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 31 05:29:29.900965 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Oct 31 05:29:29.901052 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Oct 31 05:29:29.901136 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 31 05:29:29.901229 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Oct 31 05:29:29.901314 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Oct 31 05:29:29.901400 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 31 05:29:29.901487 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Oct 31 05:29:29.903655 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Oct 31 05:29:29.903756 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 31 05:29:29.903848 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Oct 31 05:29:29.903935 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Oct 31 05:29:29.904023 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 31 05:29:29.904035 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 31 05:29:29.904046 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 31 05:29:29.904055 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 31 05:29:29.904069 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 31 05:29:29.904078 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Oct 31 05:29:29.904087 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Oct 31 05:29:29.904096 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Oct 31 05:29:29.904105 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Oct 31 05:29:29.904114 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Oct 31 05:29:29.904124 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Oct 31 05:29:29.904133 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Oct 31 05:29:29.904142 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Oct 31 05:29:29.904153 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Oct 31 05:29:29.904163 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Oct 31 05:29:29.904172 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Oct 31 05:29:29.904181 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Oct 31 05:29:29.904190 kernel: iommu: Default domain type: Translated Oct 31 05:29:29.904209 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 31 05:29:29.904297 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Oct 31 05:29:29.904384 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 31 05:29:29.904470 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Oct 31 05:29:29.904485 kernel: vgaarb: loaded Oct 31 05:29:29.904494 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 31 05:29:29.904504 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 31 05:29:29.904513 kernel: PTP clock support registered Oct 31 05:29:29.904535 kernel: PCI: Using ACPI for IRQ routing Oct 31 05:29:29.904545 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 31 05:29:29.904554 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 31 05:29:29.904563 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Oct 31 05:29:29.904575 kernel: clocksource: Switched to clocksource kvm-clock Oct 31 05:29:29.904585 kernel: VFS: Disk quotas dquot_6.6.0 Oct 31 05:29:29.904594 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 31 05:29:29.904603 kernel: pnp: PnP ACPI init Oct 31 05:29:29.904696 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Oct 31 05:29:29.904710 kernel: pnp: PnP ACPI: found 5 devices Oct 31 05:29:29.904719 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 31 05:29:29.904729 kernel: NET: Registered PF_INET protocol family Oct 31 05:29:29.904739 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 31 05:29:29.904751 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 31 05:29:29.904761 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 31 05:29:29.904770 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 31 05:29:29.904780 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 31 05:29:29.904789 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 31 05:29:29.904799 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 31 05:29:29.904808 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 31 05:29:29.904817 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 31 05:29:29.904829 kernel: NET: Registered PF_XDP protocol family Oct 31 05:29:29.904918 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Oct 31 05:29:29.905007 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Oct 31 05:29:29.905094 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Oct 31 05:29:29.905182 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Oct 31 05:29:29.905276 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Oct 31 05:29:29.905363 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Oct 31 05:29:29.905454 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Oct 31 05:29:29.905559 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Oct 31 05:29:29.905647 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Oct 31 05:29:29.905733 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Oct 31 05:29:29.905820 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Oct 31 05:29:29.905906 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Oct 31 05:29:29.906011 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Oct 31 05:29:29.906099 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Oct 31 05:29:29.906186 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Oct 31 05:29:29.906278 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Oct 31 05:29:29.906373 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Oct 31 05:29:29.906464 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Oct 31 05:29:29.906558 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Oct 31 05:29:29.906646 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Oct 31 05:29:29.906734 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Oct 31 05:29:29.906824 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 31 05:29:29.906911 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Oct 31 05:29:29.906999 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Oct 31 05:29:29.907087 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Oct 31 05:29:29.907173 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 31 05:29:29.907271 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Oct 31 05:29:29.907363 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Oct 31 05:29:29.907449 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Oct 31 05:29:29.907553 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 31 05:29:29.907641 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Oct 31 05:29:29.907729 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Oct 31 05:29:29.907818 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Oct 31 05:29:29.907910 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 31 05:29:29.907998 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Oct 31 05:29:29.908087 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Oct 31 05:29:29.908182 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Oct 31 05:29:29.908280 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 31 05:29:29.908367 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Oct 31 05:29:29.908459 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Oct 31 05:29:29.916821 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Oct 31 05:29:29.916932 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 31 05:29:29.917026 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Oct 31 05:29:29.917123 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Oct 31 05:29:29.917223 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Oct 31 05:29:29.917311 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 31 05:29:29.917400 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Oct 31 05:29:29.917487 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Oct 31 05:29:29.917590 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Oct 31 05:29:29.917680 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 31 05:29:29.917771 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 31 05:29:29.917853 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 31 05:29:29.917932 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 31 05:29:29.918010 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Oct 31 05:29:29.918089 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Oct 31 05:29:29.918168 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Oct 31 05:29:29.918268 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Oct 31 05:29:29.918357 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Oct 31 05:29:29.918441 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Oct 31 05:29:29.918565 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Oct 31 05:29:29.918657 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Oct 31 05:29:29.918742 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Oct 31 05:29:29.918825 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 31 05:29:29.918913 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Oct 31 05:29:29.919001 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Oct 31 05:29:29.919082 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 31 05:29:29.919175 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Oct 31 05:29:29.919266 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Oct 31 05:29:29.919349 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 31 05:29:29.919437 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Oct 31 05:29:29.919579 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Oct 31 05:29:29.919669 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 31 05:29:29.919757 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Oct 31 05:29:29.919841 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Oct 31 05:29:29.919927 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 31 05:29:29.920013 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Oct 31 05:29:29.920097 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Oct 31 05:29:29.920184 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 31 05:29:29.920279 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Oct 31 05:29:29.920362 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Oct 31 05:29:29.920445 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 31 05:29:29.920458 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Oct 31 05:29:29.920469 kernel: PCI: CLS 0 bytes, default 64 Oct 31 05:29:29.920479 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 31 05:29:29.920490 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Oct 31 05:29:29.920503 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 31 05:29:29.920513 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x2113312ac93, max_idle_ns: 440795244843 ns Oct 31 05:29:29.920530 kernel: Initialise system trusted keyrings Oct 31 05:29:29.920540 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 31 05:29:29.920550 kernel: Key type asymmetric registered Oct 31 05:29:29.920560 kernel: Asymmetric key parser 'x509' registered Oct 31 05:29:29.920570 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 31 05:29:29.920580 kernel: io scheduler mq-deadline registered Oct 31 05:29:29.920590 kernel: io scheduler kyber registered Oct 31 05:29:29.920602 kernel: io scheduler bfq registered Oct 31 05:29:29.920694 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Oct 31 05:29:29.920784 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Oct 31 05:29:29.920873 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:29:29.920963 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Oct 31 05:29:29.921051 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Oct 31 05:29:29.921138 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:29:29.921237 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Oct 31 05:29:29.921326 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Oct 31 05:29:29.921415 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:29:29.921503 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Oct 31 05:29:29.921619 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Oct 31 05:29:29.921708 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:29:29.921800 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Oct 31 05:29:29.921888 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Oct 31 05:29:29.921976 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:29:29.922064 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Oct 31 05:29:29.922150 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Oct 31 05:29:29.922248 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:29:29.922339 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Oct 31 05:29:29.922427 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Oct 31 05:29:29.922515 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:29:29.922610 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Oct 31 05:29:29.922697 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Oct 31 05:29:29.922784 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:29:29.922800 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 31 05:29:29.922812 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Oct 31 05:29:29.922822 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Oct 31 05:29:29.922832 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 31 05:29:29.922843 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 31 05:29:29.922852 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 31 05:29:29.922862 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 31 05:29:29.922873 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 31 05:29:29.922885 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 31 05:29:29.922979 kernel: rtc_cmos 00:03: RTC can wake from S4 Oct 31 05:29:29.923063 kernel: rtc_cmos 00:03: registered as rtc0 Oct 31 05:29:29.923144 kernel: rtc_cmos 00:03: setting system clock to 2025-10-31T05:29:29 UTC (1761888569) Oct 31 05:29:29.923233 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Oct 31 05:29:29.923245 kernel: intel_pstate: CPU model not supported Oct 31 05:29:29.923255 kernel: NET: Registered PF_INET6 protocol family Oct 31 05:29:29.923265 kernel: Segment Routing with IPv6 Oct 31 05:29:29.923278 kernel: In-situ OAM (IOAM) with IPv6 Oct 31 05:29:29.923287 kernel: NET: Registered PF_PACKET protocol family Oct 31 05:29:29.923297 kernel: Key type dns_resolver registered Oct 31 05:29:29.923307 kernel: IPI shorthand broadcast: enabled Oct 31 05:29:29.923317 kernel: sched_clock: Marking stable (758076149, 119877801)->(1110025130, -232071180) Oct 31 05:29:29.923327 kernel: registered taskstats version 1 Oct 31 05:29:29.923340 kernel: Loading compiled-in X.509 certificates Oct 31 05:29:29.923350 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 8306d4e745b00e76b5fae2596c709096b7f28adc' Oct 31 05:29:29.923359 kernel: Key type .fscrypt registered Oct 31 05:29:29.923371 kernel: Key type fscrypt-provisioning registered Oct 31 05:29:29.923381 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 31 05:29:29.923391 kernel: ima: Allocated hash algorithm: sha1 Oct 31 05:29:29.923401 kernel: ima: No architecture policies found Oct 31 05:29:29.923411 kernel: clk: Disabling unused clocks Oct 31 05:29:29.923421 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 31 05:29:29.923431 kernel: Write protecting the kernel read-only data: 28672k Oct 31 05:29:29.923441 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 31 05:29:29.923451 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 31 05:29:29.923463 kernel: Run /init as init process Oct 31 05:29:29.923473 kernel: with arguments: Oct 31 05:29:29.923483 kernel: /init Oct 31 05:29:29.923493 kernel: with environment: Oct 31 05:29:29.923503 kernel: HOME=/ Oct 31 05:29:29.923512 kernel: TERM=linux Oct 31 05:29:29.923562 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 31 05:29:29.923579 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 05:29:29.923595 systemd[1]: Detected virtualization kvm. Oct 31 05:29:29.923606 systemd[1]: Detected architecture x86-64. Oct 31 05:29:29.923616 systemd[1]: Running in initrd. Oct 31 05:29:29.923626 systemd[1]: No hostname configured, using default hostname. Oct 31 05:29:29.923636 systemd[1]: Hostname set to . Oct 31 05:29:29.923646 systemd[1]: Initializing machine ID from VM UUID. Oct 31 05:29:29.923657 systemd[1]: Queued start job for default target initrd.target. Oct 31 05:29:29.923667 systemd[1]: Started systemd-ask-password-console.path. Oct 31 05:29:29.923679 systemd[1]: Reached target cryptsetup.target. Oct 31 05:29:29.923689 systemd[1]: Reached target paths.target. Oct 31 05:29:29.923699 systemd[1]: Reached target slices.target. Oct 31 05:29:29.923709 systemd[1]: Reached target swap.target. Oct 31 05:29:29.923719 systemd[1]: Reached target timers.target. Oct 31 05:29:29.923730 systemd[1]: Listening on iscsid.socket. Oct 31 05:29:29.923740 systemd[1]: Listening on iscsiuio.socket. Oct 31 05:29:29.923753 systemd[1]: Listening on systemd-journald-audit.socket. Oct 31 05:29:29.923763 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 31 05:29:29.923774 systemd[1]: Listening on systemd-journald.socket. Oct 31 05:29:29.923784 systemd[1]: Listening on systemd-networkd.socket. Oct 31 05:29:29.923794 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 05:29:29.923805 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 05:29:29.923815 systemd[1]: Reached target sockets.target. Oct 31 05:29:29.923825 systemd[1]: Starting kmod-static-nodes.service... Oct 31 05:29:29.923835 systemd[1]: Finished network-cleanup.service. Oct 31 05:29:29.923848 systemd[1]: Starting systemd-fsck-usr.service... Oct 31 05:29:29.923858 systemd[1]: Starting systemd-journald.service... Oct 31 05:29:29.923868 systemd[1]: Starting systemd-modules-load.service... Oct 31 05:29:29.923878 systemd[1]: Starting systemd-resolved.service... Oct 31 05:29:29.923889 systemd[1]: Starting systemd-vconsole-setup.service... Oct 31 05:29:29.923899 systemd[1]: Finished kmod-static-nodes.service. Oct 31 05:29:29.923909 systemd[1]: Finished systemd-fsck-usr.service. Oct 31 05:29:29.923925 systemd-journald[202]: Journal started Oct 31 05:29:29.923985 systemd-journald[202]: Runtime Journal (/run/log/journal/dd4a7ba4784c48368310da618a724f21) is 4.7M, max 38.1M, 33.3M free. Oct 31 05:29:29.889558 systemd-modules-load[203]: Inserted module 'overlay' Oct 31 05:29:29.953455 systemd[1]: Started systemd-resolved.service. Oct 31 05:29:29.953508 kernel: audit: type=1130 audit(1761888569.934:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:29.953550 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 31 05:29:29.953571 kernel: audit: type=1130 audit(1761888569.944:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:29.953590 systemd[1]: Started systemd-journald.service. Oct 31 05:29:29.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:29.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:29.912371 systemd-resolved[204]: Positive Trust Anchors: Oct 31 05:29:29.959386 kernel: audit: type=1130 audit(1761888569.953:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:29.959418 kernel: Bridge firewalling registered Oct 31 05:29:29.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:29.912387 systemd-resolved[204]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 05:29:29.963359 kernel: audit: type=1130 audit(1761888569.959:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:29.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:29.912422 systemd-resolved[204]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 05:29:29.915662 systemd-resolved[204]: Defaulting to hostname 'linux'. Oct 31 05:29:29.954149 systemd[1]: Finished systemd-vconsole-setup.service. Oct 31 05:29:29.958404 systemd-modules-load[203]: Inserted module 'br_netfilter' Oct 31 05:29:29.959935 systemd[1]: Reached target nss-lookup.target. Oct 31 05:29:29.964589 systemd[1]: Starting dracut-cmdline-ask.service... Oct 31 05:29:29.966694 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 05:29:29.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:29.975687 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 05:29:29.979781 kernel: audit: type=1130 audit(1761888569.975:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:29.993539 kernel: SCSI subsystem initialized Oct 31 05:29:29.993508 systemd[1]: Finished dracut-cmdline-ask.service. Oct 31 05:29:29.999548 kernel: audit: type=1130 audit(1761888569.993:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:29.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:29.997083 systemd[1]: Starting dracut-cmdline.service... Oct 31 05:29:30.007858 dracut-cmdline[218]: dracut-dracut-053 Oct 31 05:29:30.020845 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 31 05:29:30.020868 kernel: device-mapper: uevent: version 1.0.3 Oct 31 05:29:30.020880 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 31 05:29:30.023375 dracut-cmdline[218]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 05:29:30.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:30.024136 systemd-modules-load[203]: Inserted module 'dm_multipath' Oct 31 05:29:30.029851 kernel: audit: type=1130 audit(1761888570.025:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:30.024833 systemd[1]: Finished systemd-modules-load.service. Oct 31 05:29:30.026896 systemd[1]: Starting systemd-sysctl.service... Oct 31 05:29:30.036239 systemd[1]: Finished systemd-sysctl.service. Oct 31 05:29:30.040001 kernel: audit: type=1130 audit(1761888570.036:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:30.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:30.116546 kernel: Loading iSCSI transport class v2.0-870. Oct 31 05:29:30.135536 kernel: iscsi: registered transport (tcp) Oct 31 05:29:30.163596 kernel: iscsi: registered transport (qla4xxx) Oct 31 05:29:30.163659 kernel: QLogic iSCSI HBA Driver Oct 31 05:29:30.215076 systemd[1]: Finished dracut-cmdline.service. Oct 31 05:29:30.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:30.222563 kernel: audit: type=1130 audit(1761888570.215:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:30.219760 systemd[1]: Starting dracut-pre-udev.service... Oct 31 05:29:30.282606 kernel: raid6: avx512x4 gen() 17619 MB/s Oct 31 05:29:30.299587 kernel: raid6: avx512x4 xor() 7630 MB/s Oct 31 05:29:30.316628 kernel: raid6: avx512x2 gen() 17540 MB/s Oct 31 05:29:30.333605 kernel: raid6: avx512x2 xor() 21531 MB/s Oct 31 05:29:30.350587 kernel: raid6: avx512x1 gen() 17588 MB/s Oct 31 05:29:30.367588 kernel: raid6: avx512x1 xor() 19678 MB/s Oct 31 05:29:30.384589 kernel: raid6: avx2x4 gen() 17538 MB/s Oct 31 05:29:30.401607 kernel: raid6: avx2x4 xor() 6760 MB/s Oct 31 05:29:30.418614 kernel: raid6: avx2x2 gen() 17469 MB/s Oct 31 05:29:30.435603 kernel: raid6: avx2x2 xor() 15873 MB/s Oct 31 05:29:30.452594 kernel: raid6: avx2x1 gen() 13592 MB/s Oct 31 05:29:30.469614 kernel: raid6: avx2x1 xor() 13785 MB/s Oct 31 05:29:30.486620 kernel: raid6: sse2x4 gen() 8206 MB/s Oct 31 05:29:30.503578 kernel: raid6: sse2x4 xor() 5304 MB/s Oct 31 05:29:30.520580 kernel: raid6: sse2x2 gen() 9020 MB/s Oct 31 05:29:30.537595 kernel: raid6: sse2x2 xor() 5329 MB/s Oct 31 05:29:30.554665 kernel: raid6: sse2x1 gen() 8336 MB/s Oct 31 05:29:30.572209 kernel: raid6: sse2x1 xor() 4128 MB/s Oct 31 05:29:30.572319 kernel: raid6: using algorithm avx512x4 gen() 17619 MB/s Oct 31 05:29:30.572358 kernel: raid6: .... xor() 7630 MB/s, rmw enabled Oct 31 05:29:30.572910 kernel: raid6: using avx512x2 recovery algorithm Oct 31 05:29:30.587619 kernel: xor: automatically using best checksumming function avx Oct 31 05:29:30.693563 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 31 05:29:30.710276 systemd[1]: Finished dracut-pre-udev.service. Oct 31 05:29:30.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:30.711000 audit: BPF prog-id=7 op=LOAD Oct 31 05:29:30.711000 audit: BPF prog-id=8 op=LOAD Oct 31 05:29:30.713269 systemd[1]: Starting systemd-udevd.service... Oct 31 05:29:30.736728 systemd-udevd[402]: Using default interface naming scheme 'v252'. Oct 31 05:29:30.742267 systemd[1]: Started systemd-udevd.service. Oct 31 05:29:30.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:30.744904 systemd[1]: Starting dracut-pre-trigger.service... Oct 31 05:29:30.761234 dracut-pre-trigger[408]: rd.md=0: removing MD RAID activation Oct 31 05:29:30.803630 systemd[1]: Finished dracut-pre-trigger.service. Oct 31 05:29:30.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:30.804965 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 05:29:30.860400 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 05:29:30.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:30.919607 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Oct 31 05:29:30.967412 kernel: ACPI: bus type USB registered Oct 31 05:29:30.967435 kernel: usbcore: registered new interface driver usbfs Oct 31 05:29:30.967454 kernel: usbcore: registered new interface driver hub Oct 31 05:29:30.967467 kernel: usbcore: registered new device driver usb Oct 31 05:29:30.967478 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 31 05:29:30.967491 kernel: GPT:17805311 != 125829119 Oct 31 05:29:30.967503 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 31 05:29:30.967514 kernel: GPT:17805311 != 125829119 Oct 31 05:29:30.967537 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 31 05:29:30.967549 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 05:29:30.967561 kernel: cryptd: max_cpu_qlen set to 1000 Oct 31 05:29:30.974538 kernel: AVX2 version of gcm_enc/dec engaged. Oct 31 05:29:30.975536 kernel: AES CTR mode by8 optimization enabled Oct 31 05:29:30.998552 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (460) Oct 31 05:29:31.000912 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 31 05:29:31.084187 kernel: libata version 3.00 loaded. Oct 31 05:29:31.084235 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Oct 31 05:29:31.084586 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Oct 31 05:29:31.084787 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Oct 31 05:29:31.084966 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Oct 31 05:29:31.085152 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Oct 31 05:29:31.085323 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Oct 31 05:29:31.085494 kernel: hub 1-0:1.0: USB hub found Oct 31 05:29:31.085732 kernel: hub 1-0:1.0: 4 ports detected Oct 31 05:29:31.085928 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Oct 31 05:29:31.086265 kernel: hub 2-0:1.0: USB hub found Oct 31 05:29:31.086481 kernel: hub 2-0:1.0: 4 ports detected Oct 31 05:29:31.086685 kernel: ahci 0000:00:1f.2: version 3.0 Oct 31 05:29:31.086858 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Oct 31 05:29:31.086882 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Oct 31 05:29:31.087065 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Oct 31 05:29:31.087250 kernel: scsi host0: ahci Oct 31 05:29:31.087434 kernel: scsi host1: ahci Oct 31 05:29:31.087630 kernel: scsi host2: ahci Oct 31 05:29:31.087806 kernel: scsi host3: ahci Oct 31 05:29:31.087990 kernel: scsi host4: ahci Oct 31 05:29:31.088176 kernel: scsi host5: ahci Oct 31 05:29:31.088357 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 41 Oct 31 05:29:31.088380 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 41 Oct 31 05:29:31.088400 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 41 Oct 31 05:29:31.088420 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 41 Oct 31 05:29:31.088440 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 41 Oct 31 05:29:31.088460 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 41 Oct 31 05:29:31.088575 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 31 05:29:31.091848 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 31 05:29:31.092322 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 31 05:29:31.096934 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 05:29:31.099207 systemd[1]: Starting disk-uuid.service... Oct 31 05:29:31.111564 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 05:29:31.115863 disk-uuid[538]: Primary Header is updated. Oct 31 05:29:31.115863 disk-uuid[538]: Secondary Entries is updated. Oct 31 05:29:31.115863 disk-uuid[538]: Secondary Header is updated. Oct 31 05:29:31.265719 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Oct 31 05:29:31.368607 kernel: ata3: SATA link down (SStatus 0 SControl 300) Oct 31 05:29:31.368729 kernel: ata2: SATA link down (SStatus 0 SControl 300) Oct 31 05:29:31.373715 kernel: ata1: SATA link down (SStatus 0 SControl 300) Oct 31 05:29:31.373791 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 31 05:29:31.376224 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 31 05:29:31.377782 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 31 05:29:31.403564 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 31 05:29:31.409559 kernel: usbcore: registered new interface driver usbhid Oct 31 05:29:31.409641 kernel: usbhid: USB HID core driver Oct 31 05:29:31.414895 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Oct 31 05:29:31.414981 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Oct 31 05:29:32.133559 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 05:29:32.133832 disk-uuid[539]: The operation has completed successfully. Oct 31 05:29:32.182448 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 31 05:29:32.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.182561 systemd[1]: Finished disk-uuid.service. Oct 31 05:29:32.187222 systemd[1]: Starting verity-setup.service... Oct 31 05:29:32.202544 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Oct 31 05:29:32.241039 systemd[1]: Found device dev-mapper-usr.device. Oct 31 05:29:32.243078 systemd[1]: Mounting sysusr-usr.mount... Oct 31 05:29:32.244148 systemd[1]: Finished verity-setup.service. Oct 31 05:29:32.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.326552 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 31 05:29:32.326395 systemd[1]: Mounted sysusr-usr.mount. Oct 31 05:29:32.326992 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 31 05:29:32.327841 systemd[1]: Starting ignition-setup.service... Oct 31 05:29:32.337462 systemd[1]: Starting parse-ip-for-networkd.service... Oct 31 05:29:32.342857 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 05:29:32.342898 kernel: BTRFS info (device vda6): using free space tree Oct 31 05:29:32.342911 kernel: BTRFS info (device vda6): has skinny extents Oct 31 05:29:32.355652 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 31 05:29:32.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.361449 systemd[1]: Finished ignition-setup.service. Oct 31 05:29:32.362768 systemd[1]: Starting ignition-fetch-offline.service... Oct 31 05:29:32.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.481000 audit: BPF prog-id=9 op=LOAD Oct 31 05:29:32.479933 systemd[1]: Finished parse-ip-for-networkd.service. Oct 31 05:29:32.482325 systemd[1]: Starting systemd-networkd.service... Oct 31 05:29:32.496132 ignition[624]: Ignition 2.14.0 Oct 31 05:29:32.496158 ignition[624]: Stage: fetch-offline Oct 31 05:29:32.496288 ignition[624]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:29:32.496332 ignition[624]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:29:32.497951 ignition[624]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:29:32.498159 ignition[624]: parsed url from cmdline: "" Oct 31 05:29:32.498166 ignition[624]: no config URL provided Oct 31 05:29:32.498175 ignition[624]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 05:29:32.498188 ignition[624]: no config at "/usr/lib/ignition/user.ign" Oct 31 05:29:32.498198 ignition[624]: failed to fetch config: resource requires networking Oct 31 05:29:32.498356 ignition[624]: Ignition finished successfully Oct 31 05:29:32.501215 systemd[1]: Finished ignition-fetch-offline.service. Oct 31 05:29:32.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.513588 systemd-networkd[713]: lo: Link UP Oct 31 05:29:32.514169 systemd-networkd[713]: lo: Gained carrier Oct 31 05:29:32.515152 systemd-networkd[713]: Enumeration completed Oct 31 05:29:32.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.515658 systemd[1]: Started systemd-networkd.service. Oct 31 05:29:32.516107 systemd[1]: Reached target network.target. Oct 31 05:29:32.516885 systemd-networkd[713]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 05:29:32.517296 systemd[1]: Starting ignition-fetch.service... Oct 31 05:29:32.518080 systemd-networkd[713]: eth0: Link UP Oct 31 05:29:32.518086 systemd-networkd[713]: eth0: Gained carrier Oct 31 05:29:32.524642 systemd[1]: Starting iscsiuio.service... Oct 31 05:29:32.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.530634 systemd[1]: Started iscsiuio.service. Oct 31 05:29:32.536412 ignition[715]: Ignition 2.14.0 Oct 31 05:29:32.533189 systemd[1]: Starting iscsid.service... Oct 31 05:29:32.538472 iscsid[723]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 31 05:29:32.538472 iscsid[723]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Oct 31 05:29:32.538472 iscsid[723]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 31 05:29:32.538472 iscsid[723]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 31 05:29:32.538472 iscsid[723]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 31 05:29:32.538472 iscsid[723]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 31 05:29:32.538472 iscsid[723]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 31 05:29:32.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.536419 ignition[715]: Stage: fetch Oct 31 05:29:32.539772 systemd[1]: Started iscsid.service. Oct 31 05:29:32.536554 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:29:32.542423 systemd[1]: Starting dracut-initqueue.service... Oct 31 05:29:32.536572 ignition[715]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:29:32.537642 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:29:32.537752 ignition[715]: parsed url from cmdline: "" Oct 31 05:29:32.557489 systemd[1]: Finished dracut-initqueue.service. Oct 31 05:29:32.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.537755 ignition[715]: no config URL provided Oct 31 05:29:32.558512 systemd[1]: Reached target remote-fs-pre.target. Oct 31 05:29:32.537761 ignition[715]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 05:29:32.559153 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 05:29:32.537769 ignition[715]: no config at "/usr/lib/ignition/user.ign" Oct 31 05:29:32.559834 systemd[1]: Reached target remote-fs.target. Oct 31 05:29:32.548047 ignition[715]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Oct 31 05:29:32.561402 systemd[1]: Starting dracut-pre-mount.service... Oct 31 05:29:32.548104 ignition[715]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Oct 31 05:29:32.548115 ignition[715]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Oct 31 05:29:32.552493 ignition[715]: GET error: Get "http://169.254.169.254/openstack/latest/user_data": dial tcp 169.254.169.254:80: connect: network is unreachable Oct 31 05:29:32.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.572066 systemd[1]: Finished dracut-pre-mount.service. Oct 31 05:29:32.590664 systemd-networkd[713]: eth0: DHCPv4 address 10.244.102.214/30, gateway 10.244.102.213 acquired from 10.244.102.213 Oct 31 05:29:32.752800 ignition[715]: GET http://169.254.169.254/openstack/latest/user_data: attempt #2 Oct 31 05:29:32.772943 ignition[715]: GET result: OK Oct 31 05:29:32.773252 ignition[715]: parsing config with SHA512: 84f4ec5e226d85cb979e339353a517697c81a79475187687fc36a901bdc401eb783a1fd15106c55b517d56749d73a4f4f83f45a6d17f7351e5a6eb9dc7128cec Oct 31 05:29:32.789472 unknown[715]: fetched base config from "system" Oct 31 05:29:32.790203 unknown[715]: fetched base config from "system" Oct 31 05:29:32.790221 unknown[715]: fetched user config from "openstack" Oct 31 05:29:32.791297 ignition[715]: fetch: fetch complete Oct 31 05:29:32.791310 ignition[715]: fetch: fetch passed Oct 31 05:29:32.791439 ignition[715]: Ignition finished successfully Oct 31 05:29:32.794657 systemd[1]: Finished ignition-fetch.service. Oct 31 05:29:32.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.797295 systemd[1]: Starting ignition-kargs.service... Oct 31 05:29:32.815033 ignition[738]: Ignition 2.14.0 Oct 31 05:29:32.815052 ignition[738]: Stage: kargs Oct 31 05:29:32.815207 ignition[738]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:29:32.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.819776 systemd[1]: Finished ignition-kargs.service. Oct 31 05:29:32.815228 ignition[738]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:29:32.816463 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:29:32.817893 ignition[738]: kargs: kargs passed Oct 31 05:29:32.817951 ignition[738]: Ignition finished successfully Oct 31 05:29:32.822959 systemd[1]: Starting ignition-disks.service... Oct 31 05:29:32.836182 ignition[743]: Ignition 2.14.0 Oct 31 05:29:32.836194 ignition[743]: Stage: disks Oct 31 05:29:32.836329 ignition[743]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:29:32.836350 ignition[743]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:29:32.837396 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:29:32.838590 ignition[743]: disks: disks passed Oct 31 05:29:32.838655 ignition[743]: Ignition finished successfully Oct 31 05:29:32.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.840413 systemd[1]: Finished ignition-disks.service. Oct 31 05:29:32.840957 systemd[1]: Reached target initrd-root-device.target. Oct 31 05:29:32.841336 systemd[1]: Reached target local-fs-pre.target. Oct 31 05:29:32.841683 systemd[1]: Reached target local-fs.target. Oct 31 05:29:32.842018 systemd[1]: Reached target sysinit.target. Oct 31 05:29:32.842336 systemd[1]: Reached target basic.target. Oct 31 05:29:32.843854 systemd[1]: Starting systemd-fsck-root.service... Oct 31 05:29:32.863876 systemd-fsck[750]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Oct 31 05:29:32.869850 systemd[1]: Finished systemd-fsck-root.service. Oct 31 05:29:32.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:32.872309 systemd[1]: Mounting sysroot.mount... Oct 31 05:29:32.884639 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 31 05:29:32.885250 systemd[1]: Mounted sysroot.mount. Oct 31 05:29:32.885756 systemd[1]: Reached target initrd-root-fs.target. Oct 31 05:29:32.889640 systemd[1]: Mounting sysroot-usr.mount... Oct 31 05:29:32.892088 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 31 05:29:32.893809 systemd[1]: Starting flatcar-openstack-hostname.service... Oct 31 05:29:32.899429 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 31 05:29:32.899511 systemd[1]: Reached target ignition-diskful.target. Oct 31 05:29:32.905666 systemd[1]: Mounted sysroot-usr.mount. Oct 31 05:29:32.910502 systemd[1]: Starting initrd-setup-root.service... Oct 31 05:29:32.921159 initrd-setup-root[761]: cut: /sysroot/etc/passwd: No such file or directory Oct 31 05:29:32.932012 initrd-setup-root[769]: cut: /sysroot/etc/group: No such file or directory Oct 31 05:29:32.941036 initrd-setup-root[778]: cut: /sysroot/etc/shadow: No such file or directory Oct 31 05:29:32.950185 initrd-setup-root[787]: cut: /sysroot/etc/gshadow: No such file or directory Oct 31 05:29:33.021899 systemd[1]: Finished initrd-setup-root.service. Oct 31 05:29:33.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:33.023859 systemd[1]: Starting ignition-mount.service... Oct 31 05:29:33.025312 systemd[1]: Starting sysroot-boot.service... Oct 31 05:29:33.037364 coreos-metadata[756]: Oct 31 05:29:33.036 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Oct 31 05:29:33.040857 bash[805]: umount: /sysroot/usr/share/oem: not mounted. Oct 31 05:29:33.056208 coreos-metadata[756]: Oct 31 05:29:33.056 INFO Fetch successful Oct 31 05:29:33.056757 coreos-metadata[756]: Oct 31 05:29:33.056 INFO wrote hostname srv-29uxp.gb1.brightbox.com to /sysroot/etc/hostname Oct 31 05:29:33.058964 systemd[1]: Finished sysroot-boot.service. Oct 31 05:29:33.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:33.060125 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Oct 31 05:29:33.060214 systemd[1]: Finished flatcar-openstack-hostname.service. Oct 31 05:29:33.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:33.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:33.063226 ignition[806]: INFO : Ignition 2.14.0 Oct 31 05:29:33.063226 ignition[806]: INFO : Stage: mount Oct 31 05:29:33.064164 ignition[806]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:29:33.064164 ignition[806]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:29:33.065345 ignition[806]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:29:33.066472 ignition[806]: INFO : mount: mount passed Oct 31 05:29:33.066472 ignition[806]: INFO : Ignition finished successfully Oct 31 05:29:33.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:33.066586 systemd[1]: Finished ignition-mount.service. Oct 31 05:29:33.261693 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 31 05:29:33.274556 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (814) Oct 31 05:29:33.278414 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 05:29:33.278511 kernel: BTRFS info (device vda6): using free space tree Oct 31 05:29:33.278595 kernel: BTRFS info (device vda6): has skinny extents Oct 31 05:29:33.287404 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 31 05:29:33.290295 systemd[1]: Starting ignition-files.service... Oct 31 05:29:33.315523 ignition[834]: INFO : Ignition 2.14.0 Oct 31 05:29:33.315523 ignition[834]: INFO : Stage: files Oct 31 05:29:33.316483 ignition[834]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:29:33.316483 ignition[834]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:29:33.317659 ignition[834]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:29:33.319752 ignition[834]: DEBUG : files: compiled without relabeling support, skipping Oct 31 05:29:33.320699 ignition[834]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 31 05:29:33.320699 ignition[834]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 31 05:29:33.323602 ignition[834]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 31 05:29:33.324195 ignition[834]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 31 05:29:33.325469 unknown[834]: wrote ssh authorized keys file for user: core Oct 31 05:29:33.326118 ignition[834]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 31 05:29:33.326888 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Oct 31 05:29:33.326888 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 Oct 31 05:29:33.536752 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 31 05:29:33.759206 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Oct 31 05:29:33.760342 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Oct 31 05:29:33.761445 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Oct 31 05:29:33.762304 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 31 05:29:33.763236 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 31 05:29:33.763906 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 31 05:29:33.764694 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 31 05:29:33.765569 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 31 05:29:33.765569 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 31 05:29:33.767380 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 05:29:33.767380 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 05:29:33.767380 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 31 05:29:33.767380 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 31 05:29:33.767380 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 31 05:29:33.767380 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Oct 31 05:29:34.157324 systemd-networkd[713]: eth0: Gained IPv6LL Oct 31 05:29:34.244394 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Oct 31 05:29:35.669735 systemd-networkd[713]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:19b5:24:19ff:fef4:66d6/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:19b5:24:19ff:fef4:66d6/64 assigned by NDisc. Oct 31 05:29:35.669755 systemd-networkd[713]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Oct 31 05:29:36.174555 ignition[834]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Oct 31 05:29:36.177166 ignition[834]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 31 05:29:36.177166 ignition[834]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 31 05:29:36.177166 ignition[834]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Oct 31 05:29:36.177166 ignition[834]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 31 05:29:36.177166 ignition[834]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 31 05:29:36.177166 ignition[834]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Oct 31 05:29:36.177166 ignition[834]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 31 05:29:36.177166 ignition[834]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 31 05:29:36.177166 ignition[834]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Oct 31 05:29:36.177166 ignition[834]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Oct 31 05:29:36.190550 ignition[834]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 31 05:29:36.190550 ignition[834]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 31 05:29:36.190550 ignition[834]: INFO : files: files passed Oct 31 05:29:36.190550 ignition[834]: INFO : Ignition finished successfully Oct 31 05:29:36.192762 systemd[1]: Finished ignition-files.service. Oct 31 05:29:36.198692 kernel: kauditd_printk_skb: 27 callbacks suppressed Oct 31 05:29:36.198716 kernel: audit: type=1130 audit(1761888576.193:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.195054 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 31 05:29:36.199484 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 31 05:29:36.200501 systemd[1]: Starting ignition-quench.service... Oct 31 05:29:36.204339 initrd-setup-root-after-ignition[859]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 31 05:29:36.204793 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 31 05:29:36.211172 kernel: audit: type=1130 audit(1761888576.205:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.211198 kernel: audit: type=1131 audit(1761888576.205:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.205052 systemd[1]: Finished ignition-quench.service. Oct 31 05:29:36.214591 kernel: audit: type=1130 audit(1761888576.210:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.205963 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 31 05:29:36.211667 systemd[1]: Reached target ignition-complete.target. Oct 31 05:29:36.215844 systemd[1]: Starting initrd-parse-etc.service... Oct 31 05:29:36.243066 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 31 05:29:36.243301 systemd[1]: Finished initrd-parse-etc.service. Oct 31 05:29:36.251894 kernel: audit: type=1130 audit(1761888576.244:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.251926 kernel: audit: type=1131 audit(1761888576.244:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.245299 systemd[1]: Reached target initrd-fs.target. Oct 31 05:29:36.252434 systemd[1]: Reached target initrd.target. Oct 31 05:29:36.253464 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 31 05:29:36.254948 systemd[1]: Starting dracut-pre-pivot.service... Oct 31 05:29:36.269037 systemd[1]: Finished dracut-pre-pivot.service. Oct 31 05:29:36.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.274552 kernel: audit: type=1130 audit(1761888576.269:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.273716 systemd[1]: Starting initrd-cleanup.service... Oct 31 05:29:36.288809 systemd[1]: Stopped target nss-lookup.target. Oct 31 05:29:36.289795 systemd[1]: Stopped target remote-cryptsetup.target. Oct 31 05:29:36.290684 systemd[1]: Stopped target timers.target. Oct 31 05:29:36.291488 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 31 05:29:36.292050 systemd[1]: Stopped dracut-pre-pivot.service. Oct 31 05:29:36.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.295570 kernel: audit: type=1131 audit(1761888576.292:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.295920 systemd[1]: Stopped target initrd.target. Oct 31 05:29:36.297184 systemd[1]: Stopped target basic.target. Oct 31 05:29:36.298432 systemd[1]: Stopped target ignition-complete.target. Oct 31 05:29:36.299760 systemd[1]: Stopped target ignition-diskful.target. Oct 31 05:29:36.300861 systemd[1]: Stopped target initrd-root-device.target. Oct 31 05:29:36.302074 systemd[1]: Stopped target remote-fs.target. Oct 31 05:29:36.303144 systemd[1]: Stopped target remote-fs-pre.target. Oct 31 05:29:36.304235 systemd[1]: Stopped target sysinit.target. Oct 31 05:29:36.312828 systemd[1]: Stopped target local-fs.target. Oct 31 05:29:36.313420 systemd[1]: Stopped target local-fs-pre.target. Oct 31 05:29:36.314467 systemd[1]: Stopped target swap.target. Oct 31 05:29:36.315466 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 31 05:29:36.321771 kernel: audit: type=1131 audit(1761888576.316:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.315754 systemd[1]: Stopped dracut-pre-mount.service. Oct 31 05:29:36.316964 systemd[1]: Stopped target cryptsetup.target. Oct 31 05:29:36.323037 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 31 05:29:36.328568 kernel: audit: type=1131 audit(1761888576.324:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.323400 systemd[1]: Stopped dracut-initqueue.service. Oct 31 05:29:36.325158 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 31 05:29:36.325563 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 31 05:29:36.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.331463 systemd[1]: ignition-files.service: Deactivated successfully. Oct 31 05:29:36.331584 systemd[1]: Stopped ignition-files.service. Oct 31 05:29:36.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.333742 systemd[1]: Stopping ignition-mount.service... Oct 31 05:29:36.335896 systemd[1]: Stopping sysroot-boot.service... Oct 31 05:29:36.336283 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 31 05:29:36.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.336446 systemd[1]: Stopped systemd-udev-trigger.service. Oct 31 05:29:36.337455 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 31 05:29:36.337575 systemd[1]: Stopped dracut-pre-trigger.service. Oct 31 05:29:36.346911 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 31 05:29:36.347570 systemd[1]: Finished initrd-cleanup.service. Oct 31 05:29:36.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.351064 ignition[872]: INFO : Ignition 2.14.0 Oct 31 05:29:36.351064 ignition[872]: INFO : Stage: umount Oct 31 05:29:36.352052 ignition[872]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:29:36.352052 ignition[872]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:29:36.353264 ignition[872]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:29:36.354376 ignition[872]: INFO : umount: umount passed Oct 31 05:29:36.354376 ignition[872]: INFO : Ignition finished successfully Oct 31 05:29:36.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.354773 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 31 05:29:36.355393 systemd[1]: Stopped ignition-mount.service. Oct 31 05:29:36.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.356243 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 31 05:29:36.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.356286 systemd[1]: Stopped ignition-disks.service. Oct 31 05:29:36.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.357018 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 31 05:29:36.357054 systemd[1]: Stopped ignition-kargs.service. Oct 31 05:29:36.362347 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 31 05:29:36.362454 systemd[1]: Stopped ignition-fetch.service. Oct 31 05:29:36.363482 systemd[1]: Stopped target network.target. Oct 31 05:29:36.364399 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 31 05:29:36.364494 systemd[1]: Stopped ignition-fetch-offline.service. Oct 31 05:29:36.365845 systemd[1]: Stopped target paths.target. Oct 31 05:29:36.366955 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 31 05:29:36.370612 systemd[1]: Stopped systemd-ask-password-console.path. Oct 31 05:29:36.371726 systemd[1]: Stopped target slices.target. Oct 31 05:29:36.372728 systemd[1]: Stopped target sockets.target. Oct 31 05:29:36.373423 systemd[1]: iscsid.socket: Deactivated successfully. Oct 31 05:29:36.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.373471 systemd[1]: Closed iscsid.socket. Oct 31 05:29:36.376016 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 31 05:29:36.376115 systemd[1]: Closed iscsiuio.socket. Oct 31 05:29:36.377083 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 31 05:29:36.377204 systemd[1]: Stopped ignition-setup.service. Oct 31 05:29:36.378804 systemd[1]: Stopping systemd-networkd.service... Oct 31 05:29:36.381639 systemd[1]: Stopping systemd-resolved.service... Oct 31 05:29:36.383597 systemd-networkd[713]: eth0: DHCPv6 lease lost Oct 31 05:29:36.386626 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 31 05:29:36.387679 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 31 05:29:36.387910 systemd[1]: Stopped systemd-networkd.service. Oct 31 05:29:36.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.390208 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 31 05:29:36.390300 systemd[1]: Closed systemd-networkd.socket. Oct 31 05:29:36.392000 audit: BPF prog-id=9 op=UNLOAD Oct 31 05:29:36.394829 systemd[1]: Stopping network-cleanup.service... Oct 31 05:29:36.398687 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 31 05:29:36.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.398833 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 31 05:29:36.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.400209 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 31 05:29:36.400312 systemd[1]: Stopped systemd-sysctl.service. Oct 31 05:29:36.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.403069 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 31 05:29:36.403143 systemd[1]: Stopped systemd-modules-load.service. Oct 31 05:29:36.409578 systemd[1]: Stopping systemd-udevd.service... Oct 31 05:29:36.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.411929 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 31 05:29:36.412406 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 31 05:29:36.412497 systemd[1]: Stopped systemd-resolved.service. Oct 31 05:29:36.414757 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 31 05:29:36.414893 systemd[1]: Stopped sysroot-boot.service. Oct 31 05:29:36.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.426251 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 31 05:29:36.426781 systemd[1]: Stopped systemd-udevd.service. Oct 31 05:29:36.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.427738 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 31 05:29:36.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.428000 audit: BPF prog-id=6 op=UNLOAD Oct 31 05:29:36.427834 systemd[1]: Stopped network-cleanup.service. Oct 31 05:29:36.428908 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 31 05:29:36.428946 systemd[1]: Closed systemd-udevd-control.socket. Oct 31 05:29:36.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.430016 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 31 05:29:36.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.430047 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 31 05:29:36.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.431270 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 31 05:29:36.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.431311 systemd[1]: Stopped dracut-pre-udev.service. Oct 31 05:29:36.432614 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 31 05:29:36.432654 systemd[1]: Stopped dracut-cmdline.service. Oct 31 05:29:36.433719 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 31 05:29:36.433768 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 31 05:29:36.434905 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 31 05:29:36.434942 systemd[1]: Stopped initrd-setup-root.service. Oct 31 05:29:36.436721 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 31 05:29:36.440861 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Oct 31 05:29:36.441398 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Oct 31 05:29:36.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.442350 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 31 05:29:36.442873 systemd[1]: Stopped kmod-static-nodes.service. Oct 31 05:29:36.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.443700 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 31 05:29:36.444230 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 31 05:29:36.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.446055 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Oct 31 05:29:36.447143 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 31 05:29:36.447766 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 31 05:29:36.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.448771 systemd[1]: Reached target initrd-switch-root.target. Oct 31 05:29:36.450295 systemd[1]: Starting initrd-switch-root.service... Oct 31 05:29:36.461937 systemd[1]: Switching root. Oct 31 05:29:36.480091 systemd-journald[202]: Journal stopped Oct 31 05:29:39.572143 systemd-journald[202]: Received SIGTERM from PID 1 (systemd). Oct 31 05:29:39.572284 kernel: SELinux: Class mctp_socket not defined in policy. Oct 31 05:29:39.572314 kernel: SELinux: Class anon_inode not defined in policy. Oct 31 05:29:39.572333 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 31 05:29:39.572354 kernel: SELinux: policy capability network_peer_controls=1 Oct 31 05:29:39.572373 kernel: SELinux: policy capability open_perms=1 Oct 31 05:29:39.572398 kernel: SELinux: policy capability extended_socket_class=1 Oct 31 05:29:39.572427 kernel: SELinux: policy capability always_check_network=0 Oct 31 05:29:39.572446 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 31 05:29:39.572461 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 31 05:29:39.572480 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 31 05:29:39.572495 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 31 05:29:39.572533 systemd[1]: Successfully loaded SELinux policy in 50.666ms. Oct 31 05:29:39.572556 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.096ms. Oct 31 05:29:39.572574 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 05:29:39.572596 systemd[1]: Detected virtualization kvm. Oct 31 05:29:39.572612 systemd[1]: Detected architecture x86-64. Oct 31 05:29:39.572635 systemd[1]: Detected first boot. Oct 31 05:29:39.572652 systemd[1]: Hostname set to . Oct 31 05:29:39.572673 systemd[1]: Initializing machine ID from VM UUID. Oct 31 05:29:39.572693 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 31 05:29:39.572713 systemd[1]: Populated /etc with preset unit settings. Oct 31 05:29:39.572737 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 05:29:39.572762 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 05:29:39.572783 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 05:29:39.572814 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 31 05:29:39.572830 systemd[1]: Stopped iscsiuio.service. Oct 31 05:29:39.572850 systemd[1]: iscsid.service: Deactivated successfully. Oct 31 05:29:39.572871 systemd[1]: Stopped iscsid.service. Oct 31 05:29:39.572887 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 31 05:29:39.572902 systemd[1]: Stopped initrd-switch-root.service. Oct 31 05:29:39.572918 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 31 05:29:39.572934 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 31 05:29:39.572950 systemd[1]: Created slice system-addon\x2drun.slice. Oct 31 05:29:39.572965 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 31 05:29:39.572987 systemd[1]: Created slice system-getty.slice. Oct 31 05:29:39.573003 systemd[1]: Created slice system-modprobe.slice. Oct 31 05:29:39.573023 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 31 05:29:39.573039 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 31 05:29:39.573058 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 31 05:29:39.573075 systemd[1]: Created slice user.slice. Oct 31 05:29:39.573096 systemd[1]: Started systemd-ask-password-console.path. Oct 31 05:29:39.573112 systemd[1]: Started systemd-ask-password-wall.path. Oct 31 05:29:39.573128 systemd[1]: Set up automount boot.automount. Oct 31 05:29:39.573146 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 31 05:29:39.573161 systemd[1]: Stopped target initrd-switch-root.target. Oct 31 05:29:39.573177 systemd[1]: Stopped target initrd-fs.target. Oct 31 05:29:39.573197 systemd[1]: Stopped target initrd-root-fs.target. Oct 31 05:29:39.573213 systemd[1]: Reached target integritysetup.target. Oct 31 05:29:39.573229 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 05:29:39.573250 systemd[1]: Reached target remote-fs.target. Oct 31 05:29:39.573272 systemd[1]: Reached target slices.target. Oct 31 05:29:39.573288 systemd[1]: Reached target swap.target. Oct 31 05:29:39.573303 systemd[1]: Reached target torcx.target. Oct 31 05:29:39.573320 systemd[1]: Reached target veritysetup.target. Oct 31 05:29:39.573336 systemd[1]: Listening on systemd-coredump.socket. Oct 31 05:29:39.573352 systemd[1]: Listening on systemd-initctl.socket. Oct 31 05:29:39.573367 systemd[1]: Listening on systemd-networkd.socket. Oct 31 05:29:39.573389 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 05:29:39.573406 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 05:29:39.573426 systemd[1]: Listening on systemd-userdbd.socket. Oct 31 05:29:39.573442 systemd[1]: Mounting dev-hugepages.mount... Oct 31 05:29:39.573459 systemd[1]: Mounting dev-mqueue.mount... Oct 31 05:29:39.573475 systemd[1]: Mounting media.mount... Oct 31 05:29:39.573490 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:29:39.573515 systemd[1]: Mounting sys-kernel-debug.mount... Oct 31 05:29:39.573538 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 31 05:29:39.573560 systemd[1]: Mounting tmp.mount... Oct 31 05:29:39.575029 systemd[1]: Starting flatcar-tmpfiles.service... Oct 31 05:29:39.575067 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:29:39.575084 systemd[1]: Starting kmod-static-nodes.service... Oct 31 05:29:39.575100 systemd[1]: Starting modprobe@configfs.service... Oct 31 05:29:39.575124 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:29:39.575140 systemd[1]: Starting modprobe@drm.service... Oct 31 05:29:39.575157 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:29:39.575172 systemd[1]: Starting modprobe@fuse.service... Oct 31 05:29:39.575189 systemd[1]: Starting modprobe@loop.service... Oct 31 05:29:39.575205 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 31 05:29:39.575227 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 31 05:29:39.575244 systemd[1]: Stopped systemd-fsck-root.service. Oct 31 05:29:39.575260 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 31 05:29:39.575276 systemd[1]: Stopped systemd-fsck-usr.service. Oct 31 05:29:39.575292 systemd[1]: Stopped systemd-journald.service. Oct 31 05:29:39.575307 systemd[1]: Starting systemd-journald.service... Oct 31 05:29:39.575323 systemd[1]: Starting systemd-modules-load.service... Oct 31 05:29:39.575338 systemd[1]: Starting systemd-network-generator.service... Oct 31 05:29:39.575355 systemd[1]: Starting systemd-remount-fs.service... Oct 31 05:29:39.575374 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 05:29:39.575395 systemd[1]: verity-setup.service: Deactivated successfully. Oct 31 05:29:39.575412 systemd[1]: Stopped verity-setup.service. Oct 31 05:29:39.575429 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:29:39.575445 systemd[1]: Mounted dev-hugepages.mount. Oct 31 05:29:39.575461 systemd[1]: Mounted dev-mqueue.mount. Oct 31 05:29:39.575477 systemd[1]: Mounted media.mount. Oct 31 05:29:39.575494 systemd[1]: Mounted sys-kernel-debug.mount. Oct 31 05:29:39.575777 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 31 05:29:39.575802 systemd[1]: Mounted tmp.mount. Oct 31 05:29:39.575824 systemd[1]: Finished kmod-static-nodes.service. Oct 31 05:29:39.575841 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 31 05:29:39.575857 systemd[1]: Finished modprobe@configfs.service. Oct 31 05:29:39.575873 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:29:39.575892 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:29:39.575908 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 05:29:39.575927 systemd[1]: Finished modprobe@drm.service. Oct 31 05:29:39.575944 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:29:39.575960 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:29:39.575975 systemd[1]: Finished systemd-network-generator.service. Oct 31 05:29:39.575995 systemd-journald[973]: Journal started Oct 31 05:29:39.576074 systemd-journald[973]: Runtime Journal (/run/log/journal/dd4a7ba4784c48368310da618a724f21) is 4.7M, max 38.1M, 33.3M free. Oct 31 05:29:36.626000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 31 05:29:36.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 05:29:36.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 05:29:36.694000 audit: BPF prog-id=10 op=LOAD Oct 31 05:29:36.694000 audit: BPF prog-id=10 op=UNLOAD Oct 31 05:29:36.694000 audit: BPF prog-id=11 op=LOAD Oct 31 05:29:36.694000 audit: BPF prog-id=11 op=UNLOAD Oct 31 05:29:36.789000 audit[905]: AVC avc: denied { associate } for pid=905 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 31 05:29:36.789000 audit[905]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=887 pid=905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:29:36.789000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 05:29:36.791000 audit[905]: AVC avc: denied { associate } for pid=905 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 31 05:29:36.791000 audit[905]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=887 pid=905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:29:36.791000 audit: CWD cwd="/" Oct 31 05:29:36.791000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:36.791000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:36.791000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 05:29:39.387000 audit: BPF prog-id=12 op=LOAD Oct 31 05:29:39.387000 audit: BPF prog-id=3 op=UNLOAD Oct 31 05:29:39.387000 audit: BPF prog-id=13 op=LOAD Oct 31 05:29:39.387000 audit: BPF prog-id=14 op=LOAD Oct 31 05:29:39.387000 audit: BPF prog-id=4 op=UNLOAD Oct 31 05:29:39.387000 audit: BPF prog-id=5 op=UNLOAD Oct 31 05:29:39.388000 audit: BPF prog-id=15 op=LOAD Oct 31 05:29:39.389000 audit: BPF prog-id=12 op=UNLOAD Oct 31 05:29:39.389000 audit: BPF prog-id=16 op=LOAD Oct 31 05:29:39.389000 audit: BPF prog-id=17 op=LOAD Oct 31 05:29:39.389000 audit: BPF prog-id=13 op=UNLOAD Oct 31 05:29:39.389000 audit: BPF prog-id=14 op=UNLOAD Oct 31 05:29:39.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.587605 systemd[1]: Started systemd-journald.service. Oct 31 05:29:39.587643 kernel: fuse: init (API version 7.34) Oct 31 05:29:39.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.401000 audit: BPF prog-id=15 op=UNLOAD Oct 31 05:29:39.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.512000 audit: BPF prog-id=18 op=LOAD Oct 31 05:29:39.512000 audit: BPF prog-id=19 op=LOAD Oct 31 05:29:39.512000 audit: BPF prog-id=20 op=LOAD Oct 31 05:29:39.512000 audit: BPF prog-id=16 op=UNLOAD Oct 31 05:29:39.512000 audit: BPF prog-id=17 op=UNLOAD Oct 31 05:29:39.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.570000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 31 05:29:39.570000 audit[973]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd434319c0 a2=4000 a3=7ffd43431a5c items=0 ppid=1 pid=973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:29:39.570000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 31 05:29:39.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.787101 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 05:29:39.385572 systemd[1]: Queued start job for default target multi-user.target. Oct 31 05:29:36.787601 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 05:29:39.385589 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 31 05:29:39.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.787621 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 05:29:39.391180 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 31 05:29:36.787664 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 31 05:29:39.578960 systemd[1]: Finished systemd-modules-load.service. Oct 31 05:29:36.787676 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 31 05:29:39.580087 systemd[1]: Finished systemd-remount-fs.service. Oct 31 05:29:36.787722 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 31 05:29:39.580846 systemd[1]: Reached target network-pre.target. Oct 31 05:29:36.787736 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 31 05:29:39.582457 systemd[1]: Mounting sys-kernel-config.mount... Oct 31 05:29:36.787947 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 31 05:29:39.582984 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 31 05:29:39.611660 kernel: loop: module loaded Oct 31 05:29:39.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:36.787993 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 05:29:39.584782 systemd[1]: Starting systemd-hwdb-update.service... Oct 31 05:29:36.788009 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 05:29:39.586724 systemd[1]: Starting systemd-journal-flush.service... Oct 31 05:29:36.788939 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 31 05:29:39.587644 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 05:29:36.788976 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 31 05:29:39.589317 systemd[1]: Starting systemd-random-seed.service... Oct 31 05:29:36.788996 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 31 05:29:39.592485 systemd[1]: Starting systemd-sysctl.service... Oct 31 05:29:36.789012 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 31 05:29:39.594341 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 31 05:29:36.789030 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 31 05:29:39.595668 systemd[1]: Finished modprobe@fuse.service. Oct 31 05:29:36.789045 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 31 05:29:39.596432 systemd[1]: Mounted sys-kernel-config.mount. Oct 31 05:29:39.005477 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:39Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 05:29:39.607640 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 31 05:29:39.006216 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:39Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 05:29:39.609645 systemd[1]: Finished systemd-random-seed.service. Oct 31 05:29:39.006473 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:39Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 05:29:39.610166 systemd[1]: Reached target first-boot-complete.target. Oct 31 05:29:39.006912 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:39Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 05:29:39.611395 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:29:39.007033 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:39Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 31 05:29:39.007155 /usr/lib/systemd/system-generators/torcx-generator[905]: time="2025-10-31T05:29:39Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 31 05:29:39.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.617691 systemd[1]: Finished modprobe@loop.service. Oct 31 05:29:39.618659 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 31 05:29:39.619216 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 05:29:39.625881 systemd-journald[973]: Time spent on flushing to /var/log/journal/dd4a7ba4784c48368310da618a724f21 is 56.722ms for 1314 entries. Oct 31 05:29:39.625881 systemd-journald[973]: System Journal (/var/log/journal/dd4a7ba4784c48368310da618a724f21) is 8.0M, max 584.8M, 576.8M free. Oct 31 05:29:39.689023 systemd-journald[973]: Received client request to flush runtime journal. Oct 31 05:29:39.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.626088 systemd[1]: Finished systemd-sysctl.service. Oct 31 05:29:39.678149 systemd[1]: Finished flatcar-tmpfiles.service. Oct 31 05:29:39.680458 systemd[1]: Starting systemd-sysusers.service... Oct 31 05:29:39.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.690221 systemd[1]: Finished systemd-journal-flush.service. Oct 31 05:29:39.713998 systemd[1]: Finished systemd-sysusers.service. Oct 31 05:29:39.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.716040 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 05:29:39.752968 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 05:29:39.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.754757 systemd[1]: Starting systemd-udev-settle.service... Oct 31 05:29:39.764672 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 05:29:39.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:39.767865 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 31 05:29:40.218327 systemd[1]: Finished systemd-hwdb-update.service. Oct 31 05:29:40.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.219000 audit: BPF prog-id=21 op=LOAD Oct 31 05:29:40.219000 audit: BPF prog-id=22 op=LOAD Oct 31 05:29:40.219000 audit: BPF prog-id=7 op=UNLOAD Oct 31 05:29:40.219000 audit: BPF prog-id=8 op=UNLOAD Oct 31 05:29:40.220442 systemd[1]: Starting systemd-udevd.service... Oct 31 05:29:40.242206 systemd-udevd[1016]: Using default interface naming scheme 'v252'. Oct 31 05:29:40.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.268000 audit: BPF prog-id=23 op=LOAD Oct 31 05:29:40.264916 systemd[1]: Started systemd-udevd.service. Oct 31 05:29:40.272789 systemd[1]: Starting systemd-networkd.service... Oct 31 05:29:40.276000 audit: BPF prog-id=24 op=LOAD Oct 31 05:29:40.276000 audit: BPF prog-id=25 op=LOAD Oct 31 05:29:40.276000 audit: BPF prog-id=26 op=LOAD Oct 31 05:29:40.279762 systemd[1]: Starting systemd-userdbd.service... Oct 31 05:29:40.321848 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 31 05:29:40.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.323202 systemd[1]: Started systemd-userdbd.service. Oct 31 05:29:40.404924 systemd-networkd[1031]: lo: Link UP Oct 31 05:29:40.404934 systemd-networkd[1031]: lo: Gained carrier Oct 31 05:29:40.405459 systemd-networkd[1031]: Enumeration completed Oct 31 05:29:40.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.405575 systemd[1]: Started systemd-networkd.service. Oct 31 05:29:40.405647 systemd-networkd[1031]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 05:29:40.407354 systemd-networkd[1031]: eth0: Link UP Oct 31 05:29:40.407363 systemd-networkd[1031]: eth0: Gained carrier Oct 31 05:29:40.415537 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 31 05:29:40.447586 kernel: ACPI: button: Power Button [PWRF] Oct 31 05:29:40.453746 systemd-networkd[1031]: eth0: DHCPv4 address 10.244.102.214/30, gateway 10.244.102.213 acquired from 10.244.102.213 Oct 31 05:29:40.462593 kernel: mousedev: PS/2 mouse device common for all mice Oct 31 05:29:40.475039 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 05:29:40.478000 audit[1027]: AVC avc: denied { confidentiality } for pid=1027 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 31 05:29:40.478000 audit[1027]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557a3dcb3970 a1=338ec a2=7fc1a7872bc5 a3=5 items=110 ppid=1016 pid=1027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:29:40.478000 audit: CWD cwd="/" Oct 31 05:29:40.478000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=1 name=(null) inode=14811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=2 name=(null) inode=14811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=3 name=(null) inode=14812 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=4 name=(null) inode=14811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=5 name=(null) inode=14813 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=6 name=(null) inode=14811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=7 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=8 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=9 name=(null) inode=14815 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=10 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=11 name=(null) inode=14816 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=12 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=13 name=(null) inode=14817 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=14 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=15 name=(null) inode=14818 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=16 name=(null) inode=14814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=17 name=(null) inode=14819 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=18 name=(null) inode=14811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=19 name=(null) inode=14820 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=20 name=(null) inode=14820 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=21 name=(null) inode=14821 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=22 name=(null) inode=14820 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=23 name=(null) inode=14822 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=24 name=(null) inode=14820 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=25 name=(null) inode=14823 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=26 name=(null) inode=14820 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=27 name=(null) inode=14824 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=28 name=(null) inode=14820 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=29 name=(null) inode=14825 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=30 name=(null) inode=14811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=31 name=(null) inode=14826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=32 name=(null) inode=14826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=33 name=(null) inode=14827 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=34 name=(null) inode=14826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=35 name=(null) inode=14828 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=36 name=(null) inode=14826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=37 name=(null) inode=14829 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=38 name=(null) inode=14826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=39 name=(null) inode=14830 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=40 name=(null) inode=14826 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=41 name=(null) inode=14831 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=42 name=(null) inode=14811 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=43 name=(null) inode=14832 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=44 name=(null) inode=14832 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=45 name=(null) inode=14833 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=46 name=(null) inode=14832 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=47 name=(null) inode=14834 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=48 name=(null) inode=14832 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=49 name=(null) inode=14835 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=50 name=(null) inode=14832 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=51 name=(null) inode=14836 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=52 name=(null) inode=14832 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=53 name=(null) inode=14837 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=55 name=(null) inode=14838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=56 name=(null) inode=14838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=57 name=(null) inode=14839 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=58 name=(null) inode=14838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=59 name=(null) inode=14840 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=60 name=(null) inode=14838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=61 name=(null) inode=14841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=62 name=(null) inode=14841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=63 name=(null) inode=14842 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=64 name=(null) inode=14841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=65 name=(null) inode=14843 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=66 name=(null) inode=14841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=67 name=(null) inode=14844 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=68 name=(null) inode=14841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=69 name=(null) inode=14845 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=70 name=(null) inode=14841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=71 name=(null) inode=14846 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=72 name=(null) inode=14838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=73 name=(null) inode=14847 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=74 name=(null) inode=14847 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=75 name=(null) inode=14848 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=76 name=(null) inode=14847 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=77 name=(null) inode=14849 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=78 name=(null) inode=14847 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=79 name=(null) inode=14850 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=80 name=(null) inode=14847 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=81 name=(null) inode=14851 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=82 name=(null) inode=14847 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=83 name=(null) inode=14852 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=84 name=(null) inode=14838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=85 name=(null) inode=14853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=86 name=(null) inode=14853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=87 name=(null) inode=14854 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=88 name=(null) inode=14853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=89 name=(null) inode=14855 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=90 name=(null) inode=14853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=91 name=(null) inode=14856 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=92 name=(null) inode=14853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=93 name=(null) inode=14857 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=94 name=(null) inode=14853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=95 name=(null) inode=14858 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=96 name=(null) inode=14838 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=97 name=(null) inode=14859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=98 name=(null) inode=14859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=99 name=(null) inode=14860 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=100 name=(null) inode=14859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=101 name=(null) inode=14861 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=102 name=(null) inode=14859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=103 name=(null) inode=14862 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=104 name=(null) inode=14859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=105 name=(null) inode=14863 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=106 name=(null) inode=14859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=107 name=(null) inode=14864 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PATH item=109 name=(null) inode=14865 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:29:40.478000 audit: PROCTITLE proctitle="(udev-worker)" Oct 31 05:29:40.512539 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Oct 31 05:29:40.525538 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Oct 31 05:29:40.531751 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Oct 31 05:29:40.531899 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Oct 31 05:29:40.655503 systemd[1]: Finished systemd-udev-settle.service. Oct 31 05:29:40.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.658992 systemd[1]: Starting lvm2-activation-early.service... Oct 31 05:29:40.685785 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 05:29:40.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.710923 systemd[1]: Finished lvm2-activation-early.service. Oct 31 05:29:40.711495 systemd[1]: Reached target cryptsetup.target. Oct 31 05:29:40.713182 systemd[1]: Starting lvm2-activation.service... Oct 31 05:29:40.720815 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 05:29:40.742969 systemd[1]: Finished lvm2-activation.service. Oct 31 05:29:40.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.743708 systemd[1]: Reached target local-fs-pre.target. Oct 31 05:29:40.744208 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 31 05:29:40.744244 systemd[1]: Reached target local-fs.target. Oct 31 05:29:40.744718 systemd[1]: Reached target machines.target. Oct 31 05:29:40.746877 systemd[1]: Starting ldconfig.service... Oct 31 05:29:40.747955 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:29:40.748019 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:29:40.749266 systemd[1]: Starting systemd-boot-update.service... Oct 31 05:29:40.750788 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 31 05:29:40.753295 systemd[1]: Starting systemd-machine-id-commit.service... Oct 31 05:29:40.759710 systemd[1]: Starting systemd-sysext.service... Oct 31 05:29:40.768717 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1048 (bootctl) Oct 31 05:29:40.770083 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 31 05:29:40.785387 systemd[1]: Unmounting usr-share-oem.mount... Oct 31 05:29:40.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.789649 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 31 05:29:40.799545 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 31 05:29:40.799718 systemd[1]: Unmounted usr-share-oem.mount. Oct 31 05:29:40.818552 kernel: loop0: detected capacity change from 0 to 229808 Oct 31 05:29:40.837309 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 31 05:29:40.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.842338 systemd[1]: Finished systemd-machine-id-commit.service. Oct 31 05:29:40.864545 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 31 05:29:40.884712 kernel: loop1: detected capacity change from 0 to 229808 Oct 31 05:29:40.894513 (sd-sysext)[1060]: Using extensions 'kubernetes'. Oct 31 05:29:40.894983 (sd-sysext)[1060]: Merged extensions into '/usr'. Oct 31 05:29:40.901174 systemd-fsck[1057]: fsck.fat 4.2 (2021-01-31) Oct 31 05:29:40.901174 systemd-fsck[1057]: /dev/vda1: 790 files, 120772/258078 clusters Oct 31 05:29:40.903574 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 31 05:29:40.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.905564 systemd[1]: Mounting boot.mount... Oct 31 05:29:40.922882 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:29:40.924967 systemd[1]: Mounting usr-share-oem.mount... Oct 31 05:29:40.928129 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:29:40.932064 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:29:40.936820 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:29:40.939569 systemd[1]: Starting modprobe@loop.service... Oct 31 05:29:40.940069 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:29:40.940252 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:29:40.940421 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:29:40.949733 systemd[1]: Mounted boot.mount. Oct 31 05:29:40.953491 systemd[1]: Mounted usr-share-oem.mount. Oct 31 05:29:40.955131 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:29:40.955750 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:29:40.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.958055 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:29:40.958194 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:29:40.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.959008 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:29:40.959146 systemd[1]: Finished modprobe@loop.service. Oct 31 05:29:40.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.960790 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 05:29:40.960908 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 05:29:40.963107 systemd[1]: Finished systemd-sysext.service. Oct 31 05:29:40.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.965680 systemd[1]: Starting ensure-sysext.service... Oct 31 05:29:40.969976 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 31 05:29:40.974957 systemd[1]: Finished systemd-boot-update.service. Oct 31 05:29:40.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:40.983294 systemd[1]: Reloading. Oct 31 05:29:41.003910 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 31 05:29:41.006504 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 31 05:29:41.009890 systemd-tmpfiles[1068]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 31 05:29:41.138425 ldconfig[1047]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 31 05:29:41.141368 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2025-10-31T05:29:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 05:29:41.141407 /usr/lib/systemd/system-generators/torcx-generator[1087]: time="2025-10-31T05:29:41Z" level=info msg="torcx already run" Oct 31 05:29:41.218668 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 05:29:41.218883 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 05:29:41.239250 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 05:29:41.300000 audit: BPF prog-id=27 op=LOAD Oct 31 05:29:41.303319 kernel: kauditd_printk_skb: 242 callbacks suppressed Oct 31 05:29:41.303387 kernel: audit: type=1334 audit(1761888581.300:168): prog-id=27 op=LOAD Oct 31 05:29:41.305000 audit: BPF prog-id=28 op=LOAD Oct 31 05:29:41.307755 kernel: audit: type=1334 audit(1761888581.305:169): prog-id=28 op=LOAD Oct 31 05:29:41.307829 kernel: audit: type=1334 audit(1761888581.305:170): prog-id=21 op=UNLOAD Oct 31 05:29:41.305000 audit: BPF prog-id=21 op=UNLOAD Oct 31 05:29:41.309143 kernel: audit: type=1334 audit(1761888581.305:171): prog-id=22 op=UNLOAD Oct 31 05:29:41.305000 audit: BPF prog-id=22 op=UNLOAD Oct 31 05:29:41.308000 audit: BPF prog-id=29 op=LOAD Oct 31 05:29:41.311907 kernel: audit: type=1334 audit(1761888581.308:172): prog-id=29 op=LOAD Oct 31 05:29:41.311953 kernel: audit: type=1334 audit(1761888581.308:173): prog-id=18 op=UNLOAD Oct 31 05:29:41.308000 audit: BPF prog-id=18 op=UNLOAD Oct 31 05:29:41.311000 audit: BPF prog-id=30 op=LOAD Oct 31 05:29:41.314685 kernel: audit: type=1334 audit(1761888581.311:174): prog-id=30 op=LOAD Oct 31 05:29:41.314725 kernel: audit: type=1334 audit(1761888581.314:175): prog-id=31 op=LOAD Oct 31 05:29:41.314000 audit: BPF prog-id=31 op=LOAD Oct 31 05:29:41.314000 audit: BPF prog-id=19 op=UNLOAD Oct 31 05:29:41.317288 kernel: audit: type=1334 audit(1761888581.314:176): prog-id=19 op=UNLOAD Oct 31 05:29:41.317347 kernel: audit: type=1334 audit(1761888581.314:177): prog-id=20 op=UNLOAD Oct 31 05:29:41.314000 audit: BPF prog-id=20 op=UNLOAD Oct 31 05:29:41.317000 audit: BPF prog-id=32 op=LOAD Oct 31 05:29:41.317000 audit: BPF prog-id=23 op=UNLOAD Oct 31 05:29:41.319000 audit: BPF prog-id=33 op=LOAD Oct 31 05:29:41.319000 audit: BPF prog-id=24 op=UNLOAD Oct 31 05:29:41.319000 audit: BPF prog-id=34 op=LOAD Oct 31 05:29:41.319000 audit: BPF prog-id=35 op=LOAD Oct 31 05:29:41.319000 audit: BPF prog-id=25 op=UNLOAD Oct 31 05:29:41.319000 audit: BPF prog-id=26 op=UNLOAD Oct 31 05:29:41.330905 systemd[1]: Finished ldconfig.service. Oct 31 05:29:41.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.332712 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 31 05:29:41.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.336930 systemd[1]: Starting audit-rules.service... Oct 31 05:29:41.338884 systemd[1]: Starting clean-ca-certificates.service... Oct 31 05:29:41.340922 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 31 05:29:41.344000 audit: BPF prog-id=36 op=LOAD Oct 31 05:29:41.345667 systemd[1]: Starting systemd-resolved.service... Oct 31 05:29:41.346000 audit: BPF prog-id=37 op=LOAD Oct 31 05:29:41.350317 systemd[1]: Starting systemd-timesyncd.service... Oct 31 05:29:41.352275 systemd[1]: Starting systemd-update-utmp.service... Oct 31 05:29:41.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.353669 systemd[1]: Finished clean-ca-certificates.service. Oct 31 05:29:41.357000 audit[1143]: SYSTEM_BOOT pid=1143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.366813 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:29:41.368661 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:29:41.371867 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:29:41.374624 systemd[1]: Starting modprobe@loop.service... Oct 31 05:29:41.375107 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:29:41.375311 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:29:41.375539 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 05:29:41.377134 systemd[1]: Finished systemd-update-utmp.service. Oct 31 05:29:41.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.379285 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:29:41.379617 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:29:41.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.384853 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:29:41.386724 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:29:41.387152 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:29:41.387273 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:29:41.387396 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 05:29:41.388772 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:29:41.388930 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:29:41.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.401292 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:29:41.401449 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:29:41.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.403201 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:29:41.403344 systemd[1]: Finished modprobe@loop.service. Oct 31 05:29:41.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.408331 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:29:41.411029 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:29:41.413700 systemd[1]: Starting modprobe@drm.service... Oct 31 05:29:41.416472 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:29:41.420199 systemd[1]: Starting modprobe@loop.service... Oct 31 05:29:41.420868 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:29:41.421104 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:29:41.423172 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 31 05:29:41.423842 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 05:29:41.425772 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:29:41.426018 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:29:41.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.428055 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 05:29:41.428198 systemd[1]: Finished modprobe@drm.service. Oct 31 05:29:41.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.431446 systemd[1]: Finished ensure-sysext.service. Oct 31 05:29:41.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.433942 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:29:41.434100 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:29:41.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.434646 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 05:29:41.437150 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:29:41.437296 systemd[1]: Finished modprobe@loop.service. Oct 31 05:29:41.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.437881 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 05:29:41.438181 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 31 05:29:41.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.440144 systemd[1]: Starting systemd-update-done.service... Oct 31 05:29:41.453957 systemd[1]: Finished systemd-update-done.service. Oct 31 05:29:41.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:29:41.469000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 31 05:29:41.469000 audit[1165]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe3007de00 a2=420 a3=0 items=0 ppid=1135 pid=1165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:29:41.469000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 31 05:29:41.469900 augenrules[1165]: No rules Oct 31 05:29:41.470865 systemd[1]: Finished audit-rules.service. Oct 31 05:29:41.490192 systemd-resolved[1138]: Positive Trust Anchors: Oct 31 05:29:41.490700 systemd-resolved[1138]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 05:29:41.490841 systemd-resolved[1138]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 05:29:41.493907 systemd[1]: Started systemd-timesyncd.service. Oct 31 05:29:41.494535 systemd[1]: Reached target time-set.target. Oct 31 05:29:41.501038 systemd-resolved[1138]: Using system hostname 'srv-29uxp.gb1.brightbox.com'. Oct 31 05:29:41.503300 systemd[1]: Started systemd-resolved.service. Oct 31 05:29:41.504566 systemd[1]: Reached target network.target. Oct 31 05:29:41.505442 systemd[1]: Reached target nss-lookup.target. Oct 31 05:29:41.506320 systemd[1]: Reached target sysinit.target. Oct 31 05:29:41.507392 systemd[1]: Started motdgen.path. Oct 31 05:29:41.508272 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 31 05:29:41.509649 systemd[1]: Started logrotate.timer. Oct 31 05:29:41.510359 systemd[1]: Started mdadm.timer. Oct 31 05:29:41.510848 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 31 05:29:41.511351 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 31 05:29:41.511411 systemd[1]: Reached target paths.target. Oct 31 05:29:41.511898 systemd[1]: Reached target timers.target. Oct 31 05:29:41.512815 systemd[1]: Listening on dbus.socket. Oct 31 05:29:41.515071 systemd[1]: Starting docker.socket... Oct 31 05:29:41.519802 systemd[1]: Listening on sshd.socket. Oct 31 05:29:41.520444 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:29:41.521004 systemd[1]: Listening on docker.socket. Oct 31 05:29:41.521625 systemd[1]: Reached target sockets.target. Oct 31 05:29:41.522061 systemd[1]: Reached target basic.target. Oct 31 05:29:41.522543 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 05:29:41.522659 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 05:29:41.523924 systemd[1]: Starting containerd.service... Oct 31 05:29:41.526057 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 31 05:29:41.527917 systemd[1]: Starting dbus.service... Oct 31 05:29:41.530890 systemd[1]: Starting enable-oem-cloudinit.service... Oct 31 05:29:41.534732 systemd[1]: Starting extend-filesystems.service... Oct 31 05:29:41.536273 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 31 05:29:41.574737 jq[1178]: false Oct 31 05:29:41.538571 systemd[1]: Starting motdgen.service... Oct 31 05:29:41.540963 systemd[1]: Starting prepare-helm.service... Oct 31 05:29:41.543719 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 31 05:29:41.546734 systemd[1]: Starting sshd-keygen.service... Oct 31 05:29:41.553286 systemd[1]: Starting systemd-logind.service... Oct 31 05:29:41.553760 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:29:41.588039 jq[1189]: true Oct 31 05:29:41.553854 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 31 05:29:41.554434 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 31 05:29:41.555313 systemd[1]: Starting update-engine.service... Oct 31 05:29:41.558529 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 31 05:29:41.594261 tar[1191]: linux-amd64/LICENSE Oct 31 05:29:41.594261 tar[1191]: linux-amd64/helm Oct 31 05:29:41.565070 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 31 05:29:41.565318 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 31 05:29:41.569688 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:29:41.569712 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:29:41.587135 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 31 05:29:41.587309 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 31 05:29:41.602393 dbus-daemon[1175]: [system] SELinux support is enabled Oct 31 05:29:41.602609 systemd[1]: Started dbus.service. Oct 31 05:29:41.605136 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 31 05:29:41.605167 systemd[1]: Reached target system-config.target. Oct 31 05:29:41.605600 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 31 05:29:41.605618 systemd[1]: Reached target user-config.target. Oct 31 05:29:41.609538 extend-filesystems[1179]: Found loop1 Oct 31 05:29:41.609538 extend-filesystems[1179]: Found vda Oct 31 05:29:41.609538 extend-filesystems[1179]: Found vda1 Oct 31 05:29:41.609538 extend-filesystems[1179]: Found vda2 Oct 31 05:29:41.609538 extend-filesystems[1179]: Found vda3 Oct 31 05:29:41.609538 extend-filesystems[1179]: Found usr Oct 31 05:29:41.609538 extend-filesystems[1179]: Found vda4 Oct 31 05:29:41.609538 extend-filesystems[1179]: Found vda6 Oct 31 05:29:41.609538 extend-filesystems[1179]: Found vda7 Oct 31 05:29:41.609538 extend-filesystems[1179]: Found vda9 Oct 31 05:29:41.609538 extend-filesystems[1179]: Checking size of /dev/vda9 Oct 31 05:29:41.611244 dbus-daemon[1175]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1031 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 31 05:29:41.634972 jq[1192]: true Oct 31 05:29:41.616752 systemd[1]: Starting systemd-hostnamed.service... Oct 31 05:29:41.613175 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 31 05:29:41.619640 systemd-timesyncd[1142]: Contacted time server 217.114.59.66:123 (0.flatcar.pool.ntp.org). Oct 31 05:29:41.619774 systemd-timesyncd[1142]: Initial clock synchronization to Fri 2025-10-31 05:29:41.963517 UTC. Oct 31 05:29:41.660292 extend-filesystems[1179]: Resized partition /dev/vda9 Oct 31 05:29:41.670935 systemd[1]: motdgen.service: Deactivated successfully. Oct 31 05:29:41.671151 systemd[1]: Finished motdgen.service. Oct 31 05:29:41.682581 extend-filesystems[1222]: resize2fs 1.46.5 (30-Dec-2021) Oct 31 05:29:41.687539 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Oct 31 05:29:41.708317 update_engine[1188]: I1031 05:29:41.707693 1188 main.cc:92] Flatcar Update Engine starting Oct 31 05:29:41.719336 update_engine[1188]: I1031 05:29:41.714677 1188 update_check_scheduler.cc:74] Next update check in 5m57s Oct 31 05:29:41.711189 systemd[1]: Started update-engine.service. Oct 31 05:29:41.713640 systemd[1]: Started locksmithd.service. Oct 31 05:29:41.719580 bash[1230]: Updated "/home/core/.ssh/authorized_keys" Oct 31 05:29:41.720598 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 31 05:29:41.756943 env[1194]: time="2025-10-31T05:29:41.756799807Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 31 05:29:41.776664 systemd-logind[1187]: Watching system buttons on /dev/input/event2 (Power Button) Oct 31 05:29:41.776997 systemd-logind[1187]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 31 05:29:41.778599 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Oct 31 05:29:41.779832 systemd-logind[1187]: New seat seat0. Oct 31 05:29:41.781568 systemd[1]: Started systemd-logind.service. Oct 31 05:29:41.790633 extend-filesystems[1222]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 31 05:29:41.790633 extend-filesystems[1222]: old_desc_blocks = 1, new_desc_blocks = 8 Oct 31 05:29:41.790633 extend-filesystems[1222]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Oct 31 05:29:41.793643 extend-filesystems[1179]: Resized filesystem in /dev/vda9 Oct 31 05:29:41.791476 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 31 05:29:41.791655 systemd[1]: Finished extend-filesystems.service. Oct 31 05:29:41.850127 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 31 05:29:41.850278 systemd[1]: Started systemd-hostnamed.service. Oct 31 05:29:41.851824 dbus-daemon[1175]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1205 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 31 05:29:41.854939 systemd[1]: Starting polkit.service... Oct 31 05:29:41.868963 env[1194]: time="2025-10-31T05:29:41.868923484Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 31 05:29:41.869116 env[1194]: time="2025-10-31T05:29:41.869098532Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 31 05:29:41.872168 polkitd[1237]: Started polkitd version 121 Oct 31 05:29:41.880532 env[1194]: time="2025-10-31T05:29:41.879643771Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 31 05:29:41.880532 env[1194]: time="2025-10-31T05:29:41.879682624Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 31 05:29:41.880532 env[1194]: time="2025-10-31T05:29:41.879913444Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 05:29:41.880532 env[1194]: time="2025-10-31T05:29:41.879930695Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 31 05:29:41.880532 env[1194]: time="2025-10-31T05:29:41.879945772Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 31 05:29:41.880532 env[1194]: time="2025-10-31T05:29:41.879955962Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 31 05:29:41.880532 env[1194]: time="2025-10-31T05:29:41.880023571Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 31 05:29:41.880532 env[1194]: time="2025-10-31T05:29:41.880268854Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 31 05:29:41.880532 env[1194]: time="2025-10-31T05:29:41.880420043Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 05:29:41.880532 env[1194]: time="2025-10-31T05:29:41.880435538Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 31 05:29:41.880844 env[1194]: time="2025-10-31T05:29:41.880482007Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 31 05:29:41.880844 env[1194]: time="2025-10-31T05:29:41.880494198Z" level=info msg="metadata content store policy set" policy=shared Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.882714403Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.882746273Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.882762789Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.882820512Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.882835669Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.882848749Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.882862156Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.882910076Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.882924124Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.882937264Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.882950297Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.882963861Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.883063365Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 31 05:29:41.883689 env[1194]: time="2025-10-31T05:29:41.883139743Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 31 05:29:41.884100 env[1194]: time="2025-10-31T05:29:41.883447748Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 31 05:29:41.884100 env[1194]: time="2025-10-31T05:29:41.883486583Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.884100 env[1194]: time="2025-10-31T05:29:41.883501177Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 31 05:29:41.884100 env[1194]: time="2025-10-31T05:29:41.883582359Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.884100 env[1194]: time="2025-10-31T05:29:41.883598257Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.884100 env[1194]: time="2025-10-31T05:29:41.883610697Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.883622080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884283422Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884299053Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884311146Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884324234Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884347424Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884464788Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884480160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884493011Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884504767Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884545142Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884557695Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884583211Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 31 05:29:41.885271 env[1194]: time="2025-10-31T05:29:41.884627276Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 31 05:29:41.885733 env[1194]: time="2025-10-31T05:29:41.884828584Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 31 05:29:41.885733 env[1194]: time="2025-10-31T05:29:41.884884675Z" level=info msg="Connect containerd service" Oct 31 05:29:41.885733 env[1194]: time="2025-10-31T05:29:41.884930318Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 31 05:29:41.886972 env[1194]: time="2025-10-31T05:29:41.886211747Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 05:29:41.886972 env[1194]: time="2025-10-31T05:29:41.886551280Z" level=info msg="Start subscribing containerd event" Oct 31 05:29:41.886972 env[1194]: time="2025-10-31T05:29:41.886623673Z" level=info msg="Start recovering state" Oct 31 05:29:41.886972 env[1194]: time="2025-10-31T05:29:41.886696141Z" level=info msg="Start event monitor" Oct 31 05:29:41.886972 env[1194]: time="2025-10-31T05:29:41.886711582Z" level=info msg="Start snapshots syncer" Oct 31 05:29:41.886972 env[1194]: time="2025-10-31T05:29:41.886721681Z" level=info msg="Start cni network conf syncer for default" Oct 31 05:29:41.886972 env[1194]: time="2025-10-31T05:29:41.886729706Z" level=info msg="Start streaming server" Oct 31 05:29:41.887511 env[1194]: time="2025-10-31T05:29:41.887491296Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 31 05:29:41.888218 polkitd[1237]: Loading rules from directory /etc/polkit-1/rules.d Oct 31 05:29:41.888293 polkitd[1237]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 31 05:29:41.888419 env[1194]: time="2025-10-31T05:29:41.888401490Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 31 05:29:41.888641 systemd[1]: Started containerd.service. Oct 31 05:29:41.889635 env[1194]: time="2025-10-31T05:29:41.889617709Z" level=info msg="containerd successfully booted in 0.153585s" Oct 31 05:29:41.901011 polkitd[1237]: Finished loading, compiling and executing 2 rules Oct 31 05:29:41.901578 dbus-daemon[1175]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 31 05:29:41.901744 systemd[1]: Started polkit.service. Oct 31 05:29:41.901969 polkitd[1237]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 31 05:29:41.917317 systemd-hostnamed[1205]: Hostname set to (static) Oct 31 05:29:42.028989 systemd-networkd[1031]: eth0: Gained IPv6LL Oct 31 05:29:42.031939 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 31 05:29:42.032730 systemd[1]: Reached target network-online.target. Oct 31 05:29:42.035109 systemd[1]: Starting kubelet.service... Oct 31 05:29:42.413807 tar[1191]: linux-amd64/README.md Oct 31 05:29:42.419486 systemd[1]: Finished prepare-helm.service. Oct 31 05:29:42.577375 locksmithd[1231]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 31 05:29:42.955215 sshd_keygen[1207]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 31 05:29:42.994834 systemd[1]: Finished sshd-keygen.service. Oct 31 05:29:42.999103 systemd[1]: Starting issuegen.service... Oct 31 05:29:43.006775 systemd[1]: issuegen.service: Deactivated successfully. Oct 31 05:29:43.006959 systemd[1]: Finished issuegen.service. Oct 31 05:29:43.009143 systemd[1]: Starting systemd-user-sessions.service... Oct 31 05:29:43.018850 systemd[1]: Finished systemd-user-sessions.service. Oct 31 05:29:43.021120 systemd[1]: Started getty@tty1.service. Oct 31 05:29:43.023318 systemd[1]: Started serial-getty@ttyS0.service. Oct 31 05:29:43.024031 systemd[1]: Reached target getty.target. Oct 31 05:29:43.122753 systemd[1]: Created slice system-sshd.slice. Oct 31 05:29:43.124727 systemd[1]: Started sshd@0-10.244.102.214:22-139.178.68.195:44920.service. Oct 31 05:29:43.269483 systemd[1]: Started kubelet.service. Oct 31 05:29:43.519714 systemd-networkd[1031]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:19b5:24:19ff:fef4:66d6/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:19b5:24:19ff:fef4:66d6/64 assigned by NDisc. Oct 31 05:29:43.519724 systemd-networkd[1031]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Oct 31 05:29:44.033906 kubelet[1271]: E1031 05:29:44.033817 1271 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:29:44.039482 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:29:44.039702 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:29:44.040152 systemd[1]: kubelet.service: Consumed 1.327s CPU time. Oct 31 05:29:44.071662 sshd[1267]: Accepted publickey for core from 139.178.68.195 port 44920 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:29:44.077476 sshd[1267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:29:44.090579 systemd[1]: Created slice user-500.slice. Oct 31 05:29:44.093384 systemd[1]: Starting user-runtime-dir@500.service... Oct 31 05:29:44.102325 systemd-logind[1187]: New session 1 of user core. Oct 31 05:29:44.110118 systemd[1]: Finished user-runtime-dir@500.service. Oct 31 05:29:44.117056 systemd[1]: Starting user@500.service... Oct 31 05:29:44.123646 (systemd)[1279]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:29:44.207795 systemd[1279]: Queued start job for default target default.target. Oct 31 05:29:44.208702 systemd[1279]: Reached target paths.target. Oct 31 05:29:44.208892 systemd[1279]: Reached target sockets.target. Oct 31 05:29:44.209005 systemd[1279]: Reached target timers.target. Oct 31 05:29:44.209103 systemd[1279]: Reached target basic.target. Oct 31 05:29:44.209236 systemd[1279]: Reached target default.target. Oct 31 05:29:44.209353 systemd[1279]: Startup finished in 76ms. Oct 31 05:29:44.209977 systemd[1]: Started user@500.service. Oct 31 05:29:44.214745 systemd[1]: Started session-1.scope. Oct 31 05:29:44.868893 systemd[1]: Started sshd@1-10.244.102.214:22-139.178.68.195:44922.service. Oct 31 05:29:45.838361 sshd[1289]: Accepted publickey for core from 139.178.68.195 port 44922 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:29:45.841905 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:29:45.851730 systemd-logind[1187]: New session 2 of user core. Oct 31 05:29:45.852663 systemd[1]: Started session-2.scope. Oct 31 05:29:46.486671 sshd[1289]: pam_unix(sshd:session): session closed for user core Oct 31 05:29:46.490930 systemd[1]: sshd@1-10.244.102.214:22-139.178.68.195:44922.service: Deactivated successfully. Oct 31 05:29:46.491777 systemd[1]: session-2.scope: Deactivated successfully. Oct 31 05:29:46.492702 systemd-logind[1187]: Session 2 logged out. Waiting for processes to exit. Oct 31 05:29:46.493783 systemd-logind[1187]: Removed session 2. Oct 31 05:29:46.647272 systemd[1]: Started sshd@2-10.244.102.214:22-139.178.68.195:44924.service. Oct 31 05:29:47.585170 sshd[1295]: Accepted publickey for core from 139.178.68.195 port 44924 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:29:47.588781 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:29:47.598643 systemd-logind[1187]: New session 3 of user core. Oct 31 05:29:47.600111 systemd[1]: Started session-3.scope. Oct 31 05:29:48.236841 sshd[1295]: pam_unix(sshd:session): session closed for user core Oct 31 05:29:48.241174 systemd-logind[1187]: Session 3 logged out. Waiting for processes to exit. Oct 31 05:29:48.241907 systemd[1]: sshd@2-10.244.102.214:22-139.178.68.195:44924.service: Deactivated successfully. Oct 31 05:29:48.242612 systemd[1]: session-3.scope: Deactivated successfully. Oct 31 05:29:48.243404 systemd-logind[1187]: Removed session 3. Oct 31 05:29:48.664367 coreos-metadata[1174]: Oct 31 05:29:48.663 WARN failed to locate config-drive, using the metadata service API instead Oct 31 05:29:48.724396 coreos-metadata[1174]: Oct 31 05:29:48.724 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Oct 31 05:29:48.750230 coreos-metadata[1174]: Oct 31 05:29:48.750 INFO Fetch successful Oct 31 05:29:48.750409 coreos-metadata[1174]: Oct 31 05:29:48.750 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 31 05:29:48.781473 coreos-metadata[1174]: Oct 31 05:29:48.781 INFO Fetch successful Oct 31 05:29:48.783895 unknown[1174]: wrote ssh authorized keys file for user: core Oct 31 05:29:48.800674 update-ssh-keys[1302]: Updated "/home/core/.ssh/authorized_keys" Oct 31 05:29:48.801937 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 31 05:29:48.802985 systemd[1]: Reached target multi-user.target. Oct 31 05:29:48.807056 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 31 05:29:48.822533 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 31 05:29:48.822967 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 31 05:29:48.823930 systemd[1]: Startup finished in 935ms (kernel) + 6.878s (initrd) + 12.261s (userspace) = 20.075s. Oct 31 05:29:54.291932 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 31 05:29:54.292431 systemd[1]: Stopped kubelet.service. Oct 31 05:29:54.292577 systemd[1]: kubelet.service: Consumed 1.327s CPU time. Oct 31 05:29:54.296796 systemd[1]: Starting kubelet.service... Oct 31 05:29:54.424893 systemd[1]: Started kubelet.service. Oct 31 05:29:54.489305 kubelet[1308]: E1031 05:29:54.489259 1308 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:29:54.495407 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:29:54.495637 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:29:58.505322 systemd[1]: Started sshd@3-10.244.102.214:22-139.178.68.195:34864.service. Oct 31 05:29:59.414785 sshd[1314]: Accepted publickey for core from 139.178.68.195 port 34864 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:29:59.419161 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:29:59.430384 systemd-logind[1187]: New session 4 of user core. Oct 31 05:29:59.431283 systemd[1]: Started session-4.scope. Oct 31 05:30:00.047783 sshd[1314]: pam_unix(sshd:session): session closed for user core Oct 31 05:30:00.054344 systemd-logind[1187]: Session 4 logged out. Waiting for processes to exit. Oct 31 05:30:00.054670 systemd[1]: sshd@3-10.244.102.214:22-139.178.68.195:34864.service: Deactivated successfully. Oct 31 05:30:00.055656 systemd[1]: session-4.scope: Deactivated successfully. Oct 31 05:30:00.058330 systemd-logind[1187]: Removed session 4. Oct 31 05:30:00.205277 systemd[1]: Started sshd@4-10.244.102.214:22-139.178.68.195:34872.service. Oct 31 05:30:01.130690 sshd[1320]: Accepted publickey for core from 139.178.68.195 port 34872 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:30:01.134851 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:30:01.144202 systemd-logind[1187]: New session 5 of user core. Oct 31 05:30:01.144242 systemd[1]: Started session-5.scope. Oct 31 05:30:01.763167 sshd[1320]: pam_unix(sshd:session): session closed for user core Oct 31 05:30:01.768305 systemd-logind[1187]: Session 5 logged out. Waiting for processes to exit. Oct 31 05:30:01.769054 systemd[1]: sshd@4-10.244.102.214:22-139.178.68.195:34872.service: Deactivated successfully. Oct 31 05:30:01.770890 systemd[1]: session-5.scope: Deactivated successfully. Oct 31 05:30:01.772956 systemd-logind[1187]: Removed session 5. Oct 31 05:30:01.913388 systemd[1]: Started sshd@5-10.244.102.214:22-139.178.68.195:34886.service. Oct 31 05:30:02.804634 sshd[1326]: Accepted publickey for core from 139.178.68.195 port 34886 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:30:02.807034 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:30:02.819897 systemd[1]: Started session-6.scope. Oct 31 05:30:02.820625 systemd-logind[1187]: New session 6 of user core. Oct 31 05:30:03.428390 sshd[1326]: pam_unix(sshd:session): session closed for user core Oct 31 05:30:03.431324 systemd[1]: sshd@5-10.244.102.214:22-139.178.68.195:34886.service: Deactivated successfully. Oct 31 05:30:03.432122 systemd[1]: session-6.scope: Deactivated successfully. Oct 31 05:30:03.432759 systemd-logind[1187]: Session 6 logged out. Waiting for processes to exit. Oct 31 05:30:03.433878 systemd-logind[1187]: Removed session 6. Oct 31 05:30:03.576150 systemd[1]: Started sshd@6-10.244.102.214:22-139.178.68.195:47172.service. Oct 31 05:30:04.469751 sshd[1332]: Accepted publickey for core from 139.178.68.195 port 47172 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:30:04.472289 sshd[1332]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:30:04.478778 systemd-logind[1187]: New session 7 of user core. Oct 31 05:30:04.479869 systemd[1]: Started session-7.scope. Oct 31 05:30:04.583674 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 31 05:30:04.583932 systemd[1]: Stopped kubelet.service. Oct 31 05:30:04.586458 systemd[1]: Starting kubelet.service... Oct 31 05:30:04.701733 systemd[1]: Started kubelet.service. Oct 31 05:30:04.744122 kubelet[1339]: E1031 05:30:04.743944 1339 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:30:04.747914 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:30:04.748192 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:30:04.967614 sudo[1345]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 31 05:30:04.967931 sudo[1345]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 05:30:04.981073 dbus-daemon[1175]: \xd0\xed%M\u001bV: received setenforce notice (enforcing=1038236608) Oct 31 05:30:04.981369 sudo[1345]: pam_unix(sudo:session): session closed for user root Oct 31 05:30:05.127730 sshd[1332]: pam_unix(sshd:session): session closed for user core Oct 31 05:30:05.133257 systemd[1]: sshd@6-10.244.102.214:22-139.178.68.195:47172.service: Deactivated successfully. Oct 31 05:30:05.134365 systemd[1]: session-7.scope: Deactivated successfully. Oct 31 05:30:05.135232 systemd-logind[1187]: Session 7 logged out. Waiting for processes to exit. Oct 31 05:30:05.136131 systemd-logind[1187]: Removed session 7. Oct 31 05:30:05.278973 systemd[1]: Started sshd@7-10.244.102.214:22-139.178.68.195:47174.service. Oct 31 05:30:06.197264 sshd[1349]: Accepted publickey for core from 139.178.68.195 port 47174 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:30:06.200311 sshd[1349]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:30:06.208516 systemd-logind[1187]: New session 8 of user core. Oct 31 05:30:06.210363 systemd[1]: Started session-8.scope. Oct 31 05:30:06.688071 sudo[1353]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 31 05:30:06.688415 sudo[1353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 05:30:06.693831 sudo[1353]: pam_unix(sudo:session): session closed for user root Oct 31 05:30:06.701777 sudo[1352]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 31 05:30:06.702070 sudo[1352]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 05:30:06.713436 systemd[1]: Stopping audit-rules.service... Oct 31 05:30:06.714000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 05:30:06.715386 auditctl[1356]: No rules Oct 31 05:30:06.715887 kernel: kauditd_printk_skb: 37 callbacks suppressed Oct 31 05:30:06.715942 kernel: audit: type=1305 audit(1761888606.714:213): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 05:30:06.714000 audit[1356]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc9201690 a2=420 a3=0 items=0 ppid=1 pid=1356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:06.721740 kernel: audit: type=1300 audit(1761888606.714:213): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc9201690 a2=420 a3=0 items=0 ppid=1 pid=1356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:06.716263 systemd[1]: audit-rules.service: Deactivated successfully. Oct 31 05:30:06.714000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 31 05:30:06.716435 systemd[1]: Stopped audit-rules.service. Oct 31 05:30:06.718190 systemd[1]: Starting audit-rules.service... Oct 31 05:30:06.723296 kernel: audit: type=1327 audit(1761888606.714:213): proctitle=2F7362696E2F617564697463746C002D44 Oct 31 05:30:06.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:06.726132 kernel: audit: type=1131 audit(1761888606.715:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:06.753390 augenrules[1373]: No rules Oct 31 05:30:06.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:06.754262 systemd[1]: Finished audit-rules.service. Oct 31 05:30:06.758989 kernel: audit: type=1130 audit(1761888606.754:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:06.759090 kernel: audit: type=1106 audit(1761888606.756:216): pid=1352 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:30:06.756000 audit[1352]: USER_END pid=1352 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:30:06.757327 sudo[1352]: pam_unix(sudo:session): session closed for user root Oct 31 05:30:06.756000 audit[1352]: CRED_DISP pid=1352 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:30:06.765031 kernel: audit: type=1104 audit(1761888606.756:217): pid=1352 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:30:06.904450 sshd[1349]: pam_unix(sshd:session): session closed for user core Oct 31 05:30:06.905000 audit[1349]: USER_END pid=1349 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:30:06.909669 systemd[1]: sshd@7-10.244.102.214:22-139.178.68.195:47174.service: Deactivated successfully. Oct 31 05:30:06.911053 systemd[1]: session-8.scope: Deactivated successfully. Oct 31 05:30:06.914082 systemd-logind[1187]: Session 8 logged out. Waiting for processes to exit. Oct 31 05:30:06.915567 systemd-logind[1187]: Removed session 8. Oct 31 05:30:06.905000 audit[1349]: CRED_DISP pid=1349 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:30:06.920594 kernel: audit: type=1106 audit(1761888606.905:218): pid=1349 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:30:06.920752 kernel: audit: type=1104 audit(1761888606.905:219): pid=1349 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:30:06.920780 kernel: audit: type=1131 audit(1761888606.905:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.102.214:22-139.178.68.195:47174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:06.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.102.214:22-139.178.68.195:47174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:07.056630 systemd[1]: Started sshd@8-10.244.102.214:22-139.178.68.195:47182.service. Oct 31 05:30:07.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.102.214:22-139.178.68.195:47182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:07.966000 audit[1379]: USER_ACCT pid=1379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:30:07.967934 sshd[1379]: Accepted publickey for core from 139.178.68.195 port 47182 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:30:07.969000 audit[1379]: CRED_ACQ pid=1379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:30:07.970000 audit[1379]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc17d33a60 a2=3 a3=0 items=0 ppid=1 pid=1379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:07.970000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:30:07.972291 sshd[1379]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:30:07.983092 systemd[1]: Started session-9.scope. Oct 31 05:30:07.984344 systemd-logind[1187]: New session 9 of user core. Oct 31 05:30:07.991000 audit[1379]: USER_START pid=1379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:30:07.993000 audit[1381]: CRED_ACQ pid=1381 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:30:08.451000 audit[1382]: USER_ACCT pid=1382 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:30:08.451000 audit[1382]: CRED_REFR pid=1382 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:30:08.452237 sudo[1382]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 31 05:30:08.452975 sudo[1382]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 05:30:08.454000 audit[1382]: USER_START pid=1382 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:30:08.484097 systemd[1]: Starting docker.service... Oct 31 05:30:08.530240 env[1392]: time="2025-10-31T05:30:08.530162352Z" level=info msg="Starting up" Oct 31 05:30:08.531945 env[1392]: time="2025-10-31T05:30:08.531917122Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 31 05:30:08.532080 env[1392]: time="2025-10-31T05:30:08.532064717Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 31 05:30:08.532172 env[1392]: time="2025-10-31T05:30:08.532153066Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 31 05:30:08.532240 env[1392]: time="2025-10-31T05:30:08.532227956Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 31 05:30:08.534903 env[1392]: time="2025-10-31T05:30:08.534877965Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 31 05:30:08.535027 env[1392]: time="2025-10-31T05:30:08.535011851Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 31 05:30:08.535102 env[1392]: time="2025-10-31T05:30:08.535085955Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 31 05:30:08.535165 env[1392]: time="2025-10-31T05:30:08.535152096Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 31 05:30:08.556443 env[1392]: time="2025-10-31T05:30:08.556399555Z" level=info msg="Loading containers: start." Oct 31 05:30:08.629000 audit[1425]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.629000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe40a3e1f0 a2=0 a3=7ffe40a3e1dc items=0 ppid=1392 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.629000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 31 05:30:08.632000 audit[1427]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.632000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffde41aeca0 a2=0 a3=7ffde41aec8c items=0 ppid=1392 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.632000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 31 05:30:08.635000 audit[1429]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.635000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc50340b70 a2=0 a3=7ffc50340b5c items=0 ppid=1392 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.635000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 31 05:30:08.638000 audit[1431]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.638000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff4709cc50 a2=0 a3=7fff4709cc3c items=0 ppid=1392 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 31 05:30:08.641000 audit[1433]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.641000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc88122060 a2=0 a3=7ffc8812204c items=0 ppid=1392 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 31 05:30:08.663000 audit[1438]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.663000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe7d8641c0 a2=0 a3=7ffe7d8641ac items=0 ppid=1392 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.663000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 31 05:30:08.669000 audit[1440]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.669000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe2da6b430 a2=0 a3=7ffe2da6b41c items=0 ppid=1392 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.669000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 31 05:30:08.671000 audit[1442]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.671000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe33d76d70 a2=0 a3=7ffe33d76d5c items=0 ppid=1392 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.671000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 31 05:30:08.674000 audit[1444]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.674000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe477dd990 a2=0 a3=7ffe477dd97c items=0 ppid=1392 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.674000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:30:08.686000 audit[1448]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.686000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcc6fb52e0 a2=0 a3=7ffcc6fb52cc items=0 ppid=1392 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.686000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:30:08.692000 audit[1449]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.692000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd714d5040 a2=0 a3=7ffd714d502c items=0 ppid=1392 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.692000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:30:08.705560 kernel: Initializing XFRM netlink socket Oct 31 05:30:08.751433 env[1392]: time="2025-10-31T05:30:08.751278186Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 31 05:30:08.786000 audit[1457]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.786000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcb70745b0 a2=0 a3=7ffcb707459c items=0 ppid=1392 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.786000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 31 05:30:08.800000 audit[1460]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.800000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe6d913b40 a2=0 a3=7ffe6d913b2c items=0 ppid=1392 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.800000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 31 05:30:08.804000 audit[1463]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.804000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe43a8db30 a2=0 a3=7ffe43a8db1c items=0 ppid=1392 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.804000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 31 05:30:08.806000 audit[1465]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.806000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd41f11460 a2=0 a3=7ffd41f1144c items=0 ppid=1392 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.806000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 31 05:30:08.809000 audit[1467]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.809000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe63dd24c0 a2=0 a3=7ffe63dd24ac items=0 ppid=1392 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.809000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 31 05:30:08.811000 audit[1469]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.811000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd1ecc2c30 a2=0 a3=7ffd1ecc2c1c items=0 ppid=1392 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.811000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 31 05:30:08.814000 audit[1471]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.814000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffeab4d9cb0 a2=0 a3=7ffeab4d9c9c items=0 ppid=1392 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.814000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 31 05:30:08.823000 audit[1474]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.823000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffa2bea570 a2=0 a3=7fffa2bea55c items=0 ppid=1392 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.823000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 31 05:30:08.826000 audit[1476]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.826000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd11b492d0 a2=0 a3=7ffd11b492bc items=0 ppid=1392 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.826000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 31 05:30:08.830000 audit[1478]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.830000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffdfff14ae0 a2=0 a3=7ffdfff14acc items=0 ppid=1392 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.830000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 31 05:30:08.832000 audit[1480]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.832000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffca61dce90 a2=0 a3=7ffca61dce7c items=0 ppid=1392 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.832000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 31 05:30:08.834891 systemd-networkd[1031]: docker0: Link UP Oct 31 05:30:08.841000 audit[1484]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.841000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd32236890 a2=0 a3=7ffd3223687c items=0 ppid=1392 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.841000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:30:08.847000 audit[1485]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:08.847000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff91654ff0 a2=0 a3=7fff91654fdc items=0 ppid=1392 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:08.847000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:30:08.849463 env[1392]: time="2025-10-31T05:30:08.849386570Z" level=info msg="Loading containers: done." Oct 31 05:30:08.866627 env[1392]: time="2025-10-31T05:30:08.866571940Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 31 05:30:08.866850 env[1392]: time="2025-10-31T05:30:08.866821682Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 31 05:30:08.867023 env[1392]: time="2025-10-31T05:30:08.866963261Z" level=info msg="Daemon has completed initialization" Oct 31 05:30:08.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:08.878293 systemd[1]: Started docker.service. Oct 31 05:30:08.887588 env[1392]: time="2025-10-31T05:30:08.887513636Z" level=info msg="API listen on /run/docker.sock" Oct 31 05:30:10.166795 env[1194]: time="2025-10-31T05:30:10.166716882Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\"" Oct 31 05:30:11.112911 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2363257726.mount: Deactivated successfully. Oct 31 05:30:13.073936 env[1194]: time="2025-10-31T05:30:13.073637210Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:13.080345 env[1194]: time="2025-10-31T05:30:13.080273184Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b7335a56022aba291f5df653c01b7ab98d64fb5cab221378617f4a1236e06a62,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:13.082319 env[1194]: time="2025-10-31T05:30:13.082190003Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\" returns image reference \"sha256:b7335a56022aba291f5df653c01b7ab98d64fb5cab221378617f4a1236e06a62\"" Oct 31 05:30:13.087438 env[1194]: time="2025-10-31T05:30:13.087370094Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\"" Oct 31 05:30:13.089565 env[1194]: time="2025-10-31T05:30:13.089464766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:13.092400 env[1194]: time="2025-10-31T05:30:13.092340171Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:1b9c6c00bc1fe86860e72efb8e4148f9e436a132eba4ca636ca4f48d61d6dfb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:13.545226 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 31 05:30:13.551369 kernel: kauditd_printk_skb: 84 callbacks suppressed Oct 31 05:30:13.551641 kernel: audit: type=1131 audit(1761888613.545:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:13.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:13.571548 kernel: audit: type=1334 audit(1761888613.568:256): prog-id=43 op=UNLOAD Oct 31 05:30:13.571683 kernel: audit: type=1334 audit(1761888613.568:257): prog-id=42 op=UNLOAD Oct 31 05:30:13.571716 kernel: audit: type=1334 audit(1761888613.568:258): prog-id=41 op=UNLOAD Oct 31 05:30:13.568000 audit: BPF prog-id=43 op=UNLOAD Oct 31 05:30:13.568000 audit: BPF prog-id=42 op=UNLOAD Oct 31 05:30:13.568000 audit: BPF prog-id=41 op=UNLOAD Oct 31 05:30:14.834854 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Oct 31 05:30:14.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:14.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:14.835435 systemd[1]: Stopped kubelet.service. Oct 31 05:30:14.849547 kernel: audit: type=1130 audit(1761888614.834:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:14.849682 kernel: audit: type=1131 audit(1761888614.835:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:14.842677 systemd[1]: Starting kubelet.service... Oct 31 05:30:14.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:14.984784 systemd[1]: Started kubelet.service. Oct 31 05:30:14.988626 kernel: audit: type=1130 audit(1761888614.984:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:15.063935 kubelet[1525]: E1031 05:30:15.063873 1525 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:30:15.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:30:15.066398 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:30:15.066618 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:30:15.073389 kernel: audit: type=1131 audit(1761888615.066:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:30:15.756585 env[1194]: time="2025-10-31T05:30:15.756500804Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:15.757996 env[1194]: time="2025-10-31T05:30:15.757968765Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8bb43160a0df4d7d34c89d9edbc48735bc2f830771e4b501937338221be0f668,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:15.763078 env[1194]: time="2025-10-31T05:30:15.762941134Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:15.766097 env[1194]: time="2025-10-31T05:30:15.766070954Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:1082a6ab67fb46397314dd36b36cb197ba4a4c5365033e9ad22bc7edaaaabd5c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:15.766459 env[1194]: time="2025-10-31T05:30:15.766422324Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\" returns image reference \"sha256:8bb43160a0df4d7d34c89d9edbc48735bc2f830771e4b501937338221be0f668\"" Oct 31 05:30:15.768334 env[1194]: time="2025-10-31T05:30:15.768263682Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\"" Oct 31 05:30:17.759014 env[1194]: time="2025-10-31T05:30:17.758950096Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:17.761762 env[1194]: time="2025-10-31T05:30:17.761723677Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:33b680aadf474b7e5e73957fc00c6af86dd0484c699c8461ba33ee656d1823bf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:17.763550 env[1194]: time="2025-10-31T05:30:17.763496742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:17.764422 env[1194]: time="2025-10-31T05:30:17.764386670Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\" returns image reference \"sha256:33b680aadf474b7e5e73957fc00c6af86dd0484c699c8461ba33ee656d1823bf\"" Oct 31 05:30:17.765984 env[1194]: time="2025-10-31T05:30:17.765954590Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\"" Oct 31 05:30:17.766818 env[1194]: time="2025-10-31T05:30:17.766265975Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:3e7b57c9d9f06b77f0064e5be7f3df61e0151101160acd5fdecce911df28a189,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:19.354405 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3369894247.mount: Deactivated successfully. Oct 31 05:30:20.151261 env[1194]: time="2025-10-31T05:30:20.151118743Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:20.152743 env[1194]: time="2025-10-31T05:30:20.152677850Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:20.154736 env[1194]: time="2025-10-31T05:30:20.154675650Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:20.156224 env[1194]: time="2025-10-31T05:30:20.156185216Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:71445ec84ad98bd52a7784865a9d31b1b50b56092d3f7699edc39eefd71befe1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:20.157536 env[1194]: time="2025-10-31T05:30:20.157492347Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\" returns image reference \"sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3\"" Oct 31 05:30:20.158228 env[1194]: time="2025-10-31T05:30:20.158204043Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" Oct 31 05:30:20.913135 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3091747362.mount: Deactivated successfully. Oct 31 05:30:24.552038 env[1194]: time="2025-10-31T05:30:24.551909528Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:24.553881 env[1194]: time="2025-10-31T05:30:24.553841253Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:24.555845 env[1194]: time="2025-10-31T05:30:24.555811141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:24.557501 env[1194]: time="2025-10-31T05:30:24.557474287Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:24.558476 env[1194]: time="2025-10-31T05:30:24.558420378Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b\"" Oct 31 05:30:24.560625 env[1194]: time="2025-10-31T05:30:24.560594483Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Oct 31 05:30:25.084959 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Oct 31 05:30:25.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:25.093547 kernel: audit: type=1130 audit(1761888625.085:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:25.085503 systemd[1]: Stopped kubelet.service. Oct 31 05:30:25.090549 systemd[1]: Starting kubelet.service... Oct 31 05:30:25.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:25.098551 kernel: audit: type=1131 audit(1761888625.085:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:25.226248 systemd[1]: Started kubelet.service. Oct 31 05:30:25.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:25.231667 kernel: audit: type=1130 audit(1761888625.226:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:25.293960 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1824274268.mount: Deactivated successfully. Oct 31 05:30:25.300913 env[1194]: time="2025-10-31T05:30:25.300875455Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:25.302376 env[1194]: time="2025-10-31T05:30:25.302347195Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:25.304136 env[1194]: time="2025-10-31T05:30:25.304111181Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:25.305727 env[1194]: time="2025-10-31T05:30:25.305688851Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:25.306262 env[1194]: time="2025-10-31T05:30:25.306236785Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Oct 31 05:30:25.307221 env[1194]: time="2025-10-31T05:30:25.307198391Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" Oct 31 05:30:25.309812 kubelet[1535]: E1031 05:30:25.309768 1535 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:30:25.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:30:25.311769 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:30:25.311917 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:30:25.315545 kernel: audit: type=1131 audit(1761888625.310:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:30:25.967799 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount536661813.mount: Deactivated successfully. Oct 31 05:30:26.763624 update_engine[1188]: I1031 05:30:26.762678 1188 update_attempter.cc:509] Updating boot flags... Oct 31 05:30:31.765648 env[1194]: time="2025-10-31T05:30:31.765512418Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:31.767977 env[1194]: time="2025-10-31T05:30:31.767932286Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:31.770009 env[1194]: time="2025-10-31T05:30:31.769978526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:31.774240 env[1194]: time="2025-10-31T05:30:31.774160934Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:31.775759 env[1194]: time="2025-10-31T05:30:31.775713367Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1\"" Oct 31 05:30:35.334799 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Oct 31 05:30:35.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:35.335825 systemd[1]: Stopped kubelet.service. Oct 31 05:30:35.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:35.342050 kernel: audit: type=1130 audit(1761888635.335:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:35.342238 kernel: audit: type=1131 audit(1761888635.335:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:35.342850 systemd[1]: Starting kubelet.service... Oct 31 05:30:35.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:35.742498 systemd[1]: Started kubelet.service. Oct 31 05:30:35.747620 kernel: audit: type=1130 audit(1761888635.742:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:35.797308 kubelet[1580]: E1031 05:30:35.797255 1580 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:30:35.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:30:35.799437 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:30:35.799593 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:30:35.803572 kernel: audit: type=1131 audit(1761888635.799:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:30:36.522740 systemd[1]: Stopped kubelet.service. Oct 31 05:30:36.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:36.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:36.526213 systemd[1]: Starting kubelet.service... Oct 31 05:30:36.529406 kernel: audit: type=1130 audit(1761888636.521:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:36.529486 kernel: audit: type=1131 audit(1761888636.521:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:36.561940 systemd[1]: Reloading. Oct 31 05:30:36.698380 /usr/lib/systemd/system-generators/torcx-generator[1615]: time="2025-10-31T05:30:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 05:30:36.698815 /usr/lib/systemd/system-generators/torcx-generator[1615]: time="2025-10-31T05:30:36Z" level=info msg="torcx already run" Oct 31 05:30:36.802841 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 05:30:36.803695 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 05:30:36.824143 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 05:30:36.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.909529 kernel: audit: type=1400 audit(1761888636.898:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.909596 kernel: audit: type=1400 audit(1761888636.898:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.909622 kernel: audit: type=1400 audit(1761888636.898:275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.916968 kernel: audit: type=1400 audit(1761888636.898:276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.912000 audit: BPF prog-id=46 op=LOAD Oct 31 05:30:36.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.912000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.916000 audit: BPF prog-id=47 op=LOAD Oct 31 05:30:36.916000 audit: BPF prog-id=27 op=UNLOAD Oct 31 05:30:36.916000 audit: BPF prog-id=28 op=UNLOAD Oct 31 05:30:36.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.917000 audit: BPF prog-id=48 op=LOAD Oct 31 05:30:36.917000 audit: BPF prog-id=29 op=UNLOAD Oct 31 05:30:36.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit: BPF prog-id=49 op=LOAD Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.918000 audit: BPF prog-id=50 op=LOAD Oct 31 05:30:36.919000 audit: BPF prog-id=30 op=UNLOAD Oct 31 05:30:36.919000 audit: BPF prog-id=31 op=UNLOAD Oct 31 05:30:36.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.921000 audit: BPF prog-id=51 op=LOAD Oct 31 05:30:36.921000 audit: BPF prog-id=32 op=UNLOAD Oct 31 05:30:36.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.923000 audit: BPF prog-id=52 op=LOAD Oct 31 05:30:36.923000 audit: BPF prog-id=33 op=UNLOAD Oct 31 05:30:36.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.924000 audit: BPF prog-id=53 op=LOAD Oct 31 05:30:36.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.924000 audit: BPF prog-id=54 op=LOAD Oct 31 05:30:36.924000 audit: BPF prog-id=34 op=UNLOAD Oct 31 05:30:36.924000 audit: BPF prog-id=35 op=UNLOAD Oct 31 05:30:36.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.927000 audit: BPF prog-id=55 op=LOAD Oct 31 05:30:36.927000 audit: BPF prog-id=38 op=UNLOAD Oct 31 05:30:36.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.927000 audit: BPF prog-id=56 op=LOAD Oct 31 05:30:36.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.928000 audit: BPF prog-id=57 op=LOAD Oct 31 05:30:36.928000 audit: BPF prog-id=39 op=UNLOAD Oct 31 05:30:36.928000 audit: BPF prog-id=40 op=UNLOAD Oct 31 05:30:36.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.930000 audit: BPF prog-id=58 op=LOAD Oct 31 05:30:36.931000 audit: BPF prog-id=37 op=UNLOAD Oct 31 05:30:36.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.932000 audit: BPF prog-id=59 op=LOAD Oct 31 05:30:36.932000 audit: BPF prog-id=36 op=UNLOAD Oct 31 05:30:36.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:36.934000 audit: BPF prog-id=60 op=LOAD Oct 31 05:30:36.934000 audit: BPF prog-id=44 op=UNLOAD Oct 31 05:30:36.964278 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Oct 31 05:30:36.964526 systemd[1]: kubelet.service: Failed with result 'signal'. Oct 31 05:30:36.964958 systemd[1]: Stopped kubelet.service. Oct 31 05:30:36.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:30:36.967922 systemd[1]: Starting kubelet.service... Oct 31 05:30:37.096580 systemd[1]: Started kubelet.service. Oct 31 05:30:37.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:37.149118 kubelet[1666]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 05:30:37.149118 kubelet[1666]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 05:30:37.149118 kubelet[1666]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 05:30:37.149671 kubelet[1666]: I1031 05:30:37.149171 1666 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 05:30:37.742212 kubelet[1666]: I1031 05:30:37.742168 1666 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Oct 31 05:30:37.742541 kubelet[1666]: I1031 05:30:37.742513 1666 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 05:30:37.742899 kubelet[1666]: I1031 05:30:37.742882 1666 server.go:956] "Client rotation is on, will bootstrap in background" Oct 31 05:30:37.802791 kubelet[1666]: E1031 05:30:37.802733 1666 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.244.102.214:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.102.214:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Oct 31 05:30:37.806710 kubelet[1666]: I1031 05:30:37.806679 1666 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 05:30:37.819561 kubelet[1666]: E1031 05:30:37.819481 1666 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 05:30:37.819719 kubelet[1666]: I1031 05:30:37.819576 1666 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 31 05:30:37.825924 kubelet[1666]: I1031 05:30:37.825897 1666 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 31 05:30:37.826228 kubelet[1666]: I1031 05:30:37.826195 1666 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 05:30:37.826419 kubelet[1666]: I1031 05:30:37.826227 1666 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-29uxp.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 05:30:37.826615 kubelet[1666]: I1031 05:30:37.826445 1666 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 05:30:37.826615 kubelet[1666]: I1031 05:30:37.826460 1666 container_manager_linux.go:303] "Creating device plugin manager" Oct 31 05:30:37.827596 kubelet[1666]: I1031 05:30:37.827573 1666 state_mem.go:36] "Initialized new in-memory state store" Oct 31 05:30:37.831343 kubelet[1666]: I1031 05:30:37.831318 1666 kubelet.go:480] "Attempting to sync node with API server" Oct 31 05:30:37.831426 kubelet[1666]: I1031 05:30:37.831350 1666 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 05:30:37.836367 kubelet[1666]: I1031 05:30:37.836338 1666 kubelet.go:386] "Adding apiserver pod source" Oct 31 05:30:37.836498 kubelet[1666]: I1031 05:30:37.836384 1666 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 05:30:37.845335 kubelet[1666]: E1031 05:30:37.845296 1666 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.244.102.214:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-29uxp.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.102.214:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Oct 31 05:30:37.855874 kubelet[1666]: E1031 05:30:37.855366 1666 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.244.102.214:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.102.214:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Oct 31 05:30:37.856600 kubelet[1666]: I1031 05:30:37.856568 1666 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 05:30:37.857754 kubelet[1666]: I1031 05:30:37.857722 1666 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Oct 31 05:30:37.859204 kubelet[1666]: W1031 05:30:37.859161 1666 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 31 05:30:37.864482 kubelet[1666]: I1031 05:30:37.864451 1666 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 31 05:30:37.864594 kubelet[1666]: I1031 05:30:37.864550 1666 server.go:1289] "Started kubelet" Oct 31 05:30:37.864712 kubelet[1666]: I1031 05:30:37.864683 1666 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 05:30:37.865795 kubelet[1666]: I1031 05:30:37.865776 1666 server.go:317] "Adding debug handlers to kubelet server" Oct 31 05:30:37.868837 kubelet[1666]: I1031 05:30:37.868782 1666 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 05:30:37.871000 audit[1666]: AVC avc: denied { mac_admin } for pid=1666 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:37.871000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:30:37.871000 audit[1666]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009d3e30 a1=c0009dad38 a2=c0009d3e00 a3=25 items=0 ppid=1 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.871000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:30:37.872260 kubelet[1666]: I1031 05:30:37.872237 1666 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 05:30:37.871000 audit[1666]: AVC avc: denied { mac_admin } for pid=1666 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:37.871000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:30:37.871000 audit[1666]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ba28a0 a1=c0009dad50 a2=c0009d3ec0 a3=25 items=0 ppid=1 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.871000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:30:37.872620 kubelet[1666]: I1031 05:30:37.872601 1666 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 05:30:37.872849 kubelet[1666]: I1031 05:30:37.872835 1666 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 05:30:37.874019 kubelet[1666]: E1031 05:30:37.872540 1666 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.102.214:6443/api/v1/namespaces/default/events\": dial tcp 10.244.102.214:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-29uxp.gb1.brightbox.com.18737c6199b5ad85 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-29uxp.gb1.brightbox.com,UID:srv-29uxp.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-29uxp.gb1.brightbox.com,},FirstTimestamp:2025-10-31 05:30:37.864488325 +0000 UTC m=+0.762320058,LastTimestamp:2025-10-31 05:30:37.864488325 +0000 UTC m=+0.762320058,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-29uxp.gb1.brightbox.com,}" Oct 31 05:30:37.875797 kubelet[1666]: I1031 05:30:37.875778 1666 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 05:30:37.879172 kubelet[1666]: E1031 05:30:37.879152 1666 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 31 05:30:37.879364 kubelet[1666]: I1031 05:30:37.879350 1666 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 05:30:37.882000 audit[1681]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:37.882000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe8c704ac0 a2=0 a3=7ffe8c704aac items=0 ppid=1666 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 05:30:37.883749 kubelet[1666]: I1031 05:30:37.883728 1666 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 31 05:30:37.884055 kubelet[1666]: E1031 05:30:37.884034 1666 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-29uxp.gb1.brightbox.com\" not found" Oct 31 05:30:37.883000 audit[1682]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:37.883000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe04aa2240 a2=0 a3=7ffe04aa222c items=0 ppid=1666 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.884569 kubelet[1666]: I1031 05:30:37.884451 1666 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 31 05:30:37.884569 kubelet[1666]: I1031 05:30:37.884516 1666 reconciler.go:26] "Reconciler: start to sync state" Oct 31 05:30:37.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 05:30:37.885184 kubelet[1666]: E1031 05:30:37.885146 1666 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.102.214:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-29uxp.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.102.214:6443: connect: connection refused" interval="200ms" Oct 31 05:30:37.886166 kubelet[1666]: E1031 05:30:37.886141 1666 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.244.102.214:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.102.214:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Oct 31 05:30:37.886468 kubelet[1666]: I1031 05:30:37.886452 1666 factory.go:223] Registration of the systemd container factory successfully Oct 31 05:30:37.886592 kubelet[1666]: I1031 05:30:37.886551 1666 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 05:30:37.887788 kubelet[1666]: I1031 05:30:37.887770 1666 factory.go:223] Registration of the containerd container factory successfully Oct 31 05:30:37.888000 audit[1685]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:37.888000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd242986e0 a2=0 a3=7ffd242986cc items=0 ppid=1666 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 05:30:37.890000 audit[1687]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:37.890000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff985f02d0 a2=0 a3=7fff985f02bc items=0 ppid=1666 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 05:30:37.902000 audit[1691]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:37.902000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff21374d40 a2=0 a3=7fff21374d2c items=0 ppid=1666 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 31 05:30:37.903551 kubelet[1666]: I1031 05:30:37.903493 1666 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Oct 31 05:30:37.904000 audit[1692]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:37.904000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeebb23e40 a2=0 a3=7ffeebb23e2c items=0 ppid=1666 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 05:30:37.905026 kubelet[1666]: I1031 05:30:37.904900 1666 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Oct 31 05:30:37.905026 kubelet[1666]: I1031 05:30:37.904973 1666 status_manager.go:230] "Starting to sync pod status with apiserver" Oct 31 05:30:37.905124 kubelet[1666]: I1031 05:30:37.905027 1666 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 05:30:37.905124 kubelet[1666]: I1031 05:30:37.905055 1666 kubelet.go:2436] "Starting kubelet main sync loop" Oct 31 05:30:37.905204 kubelet[1666]: E1031 05:30:37.905175 1666 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 31 05:30:37.906000 audit[1693]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:37.906000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca2994720 a2=0 a3=7ffca299470c items=0 ppid=1666 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 05:30:37.908000 audit[1695]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:37.908000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda3812520 a2=0 a3=7ffda381250c items=0 ppid=1666 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.908000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 05:30:37.910000 audit[1697]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:37.910000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfcd6b020 a2=0 a3=7ffcfcd6b00c items=0 ppid=1666 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.910000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 05:30:37.913483 kubelet[1666]: E1031 05:30:37.913437 1666 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.244.102.214:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.102.214:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Oct 31 05:30:37.915000 audit[1698]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:37.915000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd579e9100 a2=0 a3=7ffd579e90ec items=0 ppid=1666 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 05:30:37.916000 audit[1699]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:37.916000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc892ab320 a2=0 a3=7ffc892ab30c items=0 ppid=1666 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 05:30:37.917000 audit[1702]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:37.917000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffb8c10050 a2=0 a3=7fffb8c1003c items=0 ppid=1666 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.917000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 05:30:37.923124 kubelet[1666]: I1031 05:30:37.923102 1666 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 05:30:37.923124 kubelet[1666]: I1031 05:30:37.923121 1666 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 05:30:37.923244 kubelet[1666]: I1031 05:30:37.923153 1666 state_mem.go:36] "Initialized new in-memory state store" Oct 31 05:30:37.924372 kubelet[1666]: I1031 05:30:37.924356 1666 policy_none.go:49] "None policy: Start" Oct 31 05:30:37.924440 kubelet[1666]: I1031 05:30:37.924386 1666 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 31 05:30:37.924440 kubelet[1666]: I1031 05:30:37.924407 1666 state_mem.go:35] "Initializing new in-memory state store" Oct 31 05:30:37.930931 systemd[1]: Created slice kubepods.slice. Oct 31 05:30:37.936381 systemd[1]: Created slice kubepods-burstable.slice. Oct 31 05:30:37.939779 systemd[1]: Created slice kubepods-besteffort.slice. Oct 31 05:30:37.947768 kubelet[1666]: E1031 05:30:37.947737 1666 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Oct 31 05:30:37.947000 audit[1666]: AVC avc: denied { mac_admin } for pid=1666 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:37.947000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:30:37.947000 audit[1666]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dac690 a1=c000daf098 a2=c000dac660 a3=25 items=0 ppid=1 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:37.947000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:30:37.948812 kubelet[1666]: E1031 05:30:37.948786 1666 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Oct 31 05:30:37.949255 kubelet[1666]: I1031 05:30:37.949235 1666 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 05:30:37.949416 kubelet[1666]: I1031 05:30:37.949374 1666 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 05:30:37.950066 kubelet[1666]: I1031 05:30:37.950044 1666 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 05:30:37.951849 kubelet[1666]: E1031 05:30:37.951826 1666 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 05:30:37.952199 kubelet[1666]: E1031 05:30:37.952180 1666 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-29uxp.gb1.brightbox.com\" not found" Oct 31 05:30:38.021987 systemd[1]: Created slice kubepods-burstable-pod09aad140f1918cc586d44567a652c8e8.slice. Oct 31 05:30:38.031314 kubelet[1666]: E1031 05:30:38.031283 1666 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-29uxp.gb1.brightbox.com\" not found" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.033570 systemd[1]: Created slice kubepods-burstable-pod191b56618ee0b866bf42ef9da4dd3078.slice. Oct 31 05:30:38.035352 kubelet[1666]: E1031 05:30:38.035330 1666 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-29uxp.gb1.brightbox.com\" not found" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.041629 systemd[1]: Created slice kubepods-burstable-pod492d2c0e6f7cd8410877ca0239e2e42b.slice. Oct 31 05:30:38.043271 kubelet[1666]: E1031 05:30:38.043247 1666 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-29uxp.gb1.brightbox.com\" not found" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.053359 kubelet[1666]: I1031 05:30:38.053336 1666 kubelet_node_status.go:75] "Attempting to register node" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.054088 kubelet[1666]: E1031 05:30:38.054035 1666 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.102.214:6443/api/v1/nodes\": dial tcp 10.244.102.214:6443: connect: connection refused" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.086081 kubelet[1666]: I1031 05:30:38.086020 1666 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/09aad140f1918cc586d44567a652c8e8-usr-share-ca-certificates\") pod \"kube-apiserver-srv-29uxp.gb1.brightbox.com\" (UID: \"09aad140f1918cc586d44567a652c8e8\") " pod="kube-system/kube-apiserver-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.086081 kubelet[1666]: I1031 05:30:38.086088 1666 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/191b56618ee0b866bf42ef9da4dd3078-ca-certs\") pod \"kube-controller-manager-srv-29uxp.gb1.brightbox.com\" (UID: \"191b56618ee0b866bf42ef9da4dd3078\") " pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.086350 kubelet[1666]: I1031 05:30:38.086127 1666 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/191b56618ee0b866bf42ef9da4dd3078-flexvolume-dir\") pod \"kube-controller-manager-srv-29uxp.gb1.brightbox.com\" (UID: \"191b56618ee0b866bf42ef9da4dd3078\") " pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.086350 kubelet[1666]: I1031 05:30:38.086172 1666 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/191b56618ee0b866bf42ef9da4dd3078-k8s-certs\") pod \"kube-controller-manager-srv-29uxp.gb1.brightbox.com\" (UID: \"191b56618ee0b866bf42ef9da4dd3078\") " pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.086350 kubelet[1666]: I1031 05:30:38.086223 1666 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/191b56618ee0b866bf42ef9da4dd3078-kubeconfig\") pod \"kube-controller-manager-srv-29uxp.gb1.brightbox.com\" (UID: \"191b56618ee0b866bf42ef9da4dd3078\") " pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.086350 kubelet[1666]: I1031 05:30:38.086262 1666 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/191b56618ee0b866bf42ef9da4dd3078-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-29uxp.gb1.brightbox.com\" (UID: \"191b56618ee0b866bf42ef9da4dd3078\") " pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.086350 kubelet[1666]: I1031 05:30:38.086309 1666 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/492d2c0e6f7cd8410877ca0239e2e42b-kubeconfig\") pod \"kube-scheduler-srv-29uxp.gb1.brightbox.com\" (UID: \"492d2c0e6f7cd8410877ca0239e2e42b\") " pod="kube-system/kube-scheduler-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.086620 kubelet[1666]: I1031 05:30:38.086339 1666 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/09aad140f1918cc586d44567a652c8e8-ca-certs\") pod \"kube-apiserver-srv-29uxp.gb1.brightbox.com\" (UID: \"09aad140f1918cc586d44567a652c8e8\") " pod="kube-system/kube-apiserver-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.086620 kubelet[1666]: I1031 05:30:38.086372 1666 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/09aad140f1918cc586d44567a652c8e8-k8s-certs\") pod \"kube-apiserver-srv-29uxp.gb1.brightbox.com\" (UID: \"09aad140f1918cc586d44567a652c8e8\") " pod="kube-system/kube-apiserver-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.087204 kubelet[1666]: E1031 05:30:38.087160 1666 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.102.214:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-29uxp.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.102.214:6443: connect: connection refused" interval="400ms" Oct 31 05:30:38.258253 kubelet[1666]: I1031 05:30:38.258185 1666 kubelet_node_status.go:75] "Attempting to register node" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.259045 kubelet[1666]: E1031 05:30:38.258881 1666 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.102.214:6443/api/v1/nodes\": dial tcp 10.244.102.214:6443: connect: connection refused" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.335834 env[1194]: time="2025-10-31T05:30:38.335716821Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-29uxp.gb1.brightbox.com,Uid:09aad140f1918cc586d44567a652c8e8,Namespace:kube-system,Attempt:0,}" Oct 31 05:30:38.340480 env[1194]: time="2025-10-31T05:30:38.340379719Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-29uxp.gb1.brightbox.com,Uid:191b56618ee0b866bf42ef9da4dd3078,Namespace:kube-system,Attempt:0,}" Oct 31 05:30:38.345654 env[1194]: time="2025-10-31T05:30:38.345497355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-29uxp.gb1.brightbox.com,Uid:492d2c0e6f7cd8410877ca0239e2e42b,Namespace:kube-system,Attempt:0,}" Oct 31 05:30:38.488690 kubelet[1666]: E1031 05:30:38.488618 1666 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.102.214:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-29uxp.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.102.214:6443: connect: connection refused" interval="800ms" Oct 31 05:30:38.665196 kubelet[1666]: I1031 05:30:38.664988 1666 kubelet_node_status.go:75] "Attempting to register node" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.666301 kubelet[1666]: E1031 05:30:38.666256 1666 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.102.214:6443/api/v1/nodes\": dial tcp 10.244.102.214:6443: connect: connection refused" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:38.876123 kubelet[1666]: E1031 05:30:38.876028 1666 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.244.102.214:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.102.214:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Oct 31 05:30:39.033745 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3838024011.mount: Deactivated successfully. Oct 31 05:30:39.039939 kubelet[1666]: E1031 05:30:39.039891 1666 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.244.102.214:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.102.214:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Oct 31 05:30:39.045673 env[1194]: time="2025-10-31T05:30:39.045584173Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:39.047551 env[1194]: time="2025-10-31T05:30:39.047495122Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:39.048364 env[1194]: time="2025-10-31T05:30:39.048338282Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:39.049144 env[1194]: time="2025-10-31T05:30:39.049120873Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:39.050374 env[1194]: time="2025-10-31T05:30:39.050349408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:39.051912 env[1194]: time="2025-10-31T05:30:39.051887186Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:39.052639 env[1194]: time="2025-10-31T05:30:39.052616929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:39.053433 env[1194]: time="2025-10-31T05:30:39.053408395Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:39.056425 env[1194]: time="2025-10-31T05:30:39.056394057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:39.057292 env[1194]: time="2025-10-31T05:30:39.057267811Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:39.058607 env[1194]: time="2025-10-31T05:30:39.058582835Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:39.059381 env[1194]: time="2025-10-31T05:30:39.059357152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:39.089135 env[1194]: time="2025-10-31T05:30:39.083352824Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:30:39.089135 env[1194]: time="2025-10-31T05:30:39.083409091Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:30:39.089135 env[1194]: time="2025-10-31T05:30:39.083421483Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:30:39.089135 env[1194]: time="2025-10-31T05:30:39.086080257Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ffc4433ca5ad66667e0367996abe57d852f243fe6f5f4c4b0522751e9f80063 pid=1718 runtime=io.containerd.runc.v2 Oct 31 05:30:39.091061 env[1194]: time="2025-10-31T05:30:39.090980721Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:30:39.091195 env[1194]: time="2025-10-31T05:30:39.091041959Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:30:39.091195 env[1194]: time="2025-10-31T05:30:39.091055112Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:30:39.091307 env[1194]: time="2025-10-31T05:30:39.091222373Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0a63a0c54fa686609dd18237e020dfeeefdbfd14b78106eff09102e02da04a61 pid=1719 runtime=io.containerd.runc.v2 Oct 31 05:30:39.112744 systemd[1]: Started cri-containerd-3ffc4433ca5ad66667e0367996abe57d852f243fe6f5f4c4b0522751e9f80063.scope. Oct 31 05:30:39.124277 env[1194]: time="2025-10-31T05:30:39.116398125Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:30:39.124277 env[1194]: time="2025-10-31T05:30:39.116508961Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:30:39.124277 env[1194]: time="2025-10-31T05:30:39.116555394Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:30:39.124277 env[1194]: time="2025-10-31T05:30:39.116862171Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f57af6910d42557521c10b0410a6d543c23ad2969f61019da98e1d9d010f15fe pid=1753 runtime=io.containerd.runc.v2 Oct 31 05:30:39.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.149000 audit: BPF prog-id=61 op=LOAD Oct 31 05:30:39.150000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.150000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1718 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666334343333636135616436363636376530333637393936616265 Oct 31 05:30:39.152148 systemd[1]: Started cri-containerd-0a63a0c54fa686609dd18237e020dfeeefdbfd14b78106eff09102e02da04a61.scope. Oct 31 05:30:39.154000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.157132 kubelet[1666]: E1031 05:30:39.156968 1666 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.244.102.214:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-29uxp.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.102.214:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Oct 31 05:30:39.154000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1718 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666334343333636135616436363636376530333637393936616265 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit: BPF prog-id=62 op=LOAD Oct 31 05:30:39.158000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000312350 items=0 ppid=1718 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666334343333636135616436363636376530333637393936616265 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.158000 audit: BPF prog-id=63 op=LOAD Oct 31 05:30:39.158000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000312398 items=0 ppid=1718 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666334343333636135616436363636376530333637393936616265 Oct 31 05:30:39.159000 audit: BPF prog-id=63 op=UNLOAD Oct 31 05:30:39.159000 audit: BPF prog-id=62 op=UNLOAD Oct 31 05:30:39.159000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.159000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.159000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.159000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.159000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.159000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.159000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.159000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.159000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.159000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.159000 audit: BPF prog-id=64 op=LOAD Oct 31 05:30:39.159000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003127a8 items=0 ppid=1718 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366666334343333636135616436363636376530333637393936616265 Oct 31 05:30:39.175175 systemd[1]: Started cri-containerd-f57af6910d42557521c10b0410a6d543c23ad2969f61019da98e1d9d010f15fe.scope. Oct 31 05:30:39.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.188000 audit: BPF prog-id=65 op=LOAD Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1719 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061363361306335346661363836363039646431383233376530323064 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1719 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061363361306335346661363836363039646431383233376530323064 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit: BPF prog-id=66 op=LOAD Oct 31 05:30:39.189000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020adc0 items=0 ppid=1719 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061363361306335346661363836363039646431383233376530323064 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit: BPF prog-id=67 op=LOAD Oct 31 05:30:39.189000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020ae08 items=0 ppid=1719 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061363361306335346661363836363039646431383233376530323064 Oct 31 05:30:39.189000 audit: BPF prog-id=67 op=UNLOAD Oct 31 05:30:39.189000 audit: BPF prog-id=66 op=UNLOAD Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { perfmon } for pid=1751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit[1751]: AVC avc: denied { bpf } for pid=1751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.189000 audit: BPF prog-id=68 op=LOAD Oct 31 05:30:39.189000 audit[1751]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020b218 items=0 ppid=1719 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061363361306335346661363836363039646431383233376530323064 Oct 31 05:30:39.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.213000 audit: BPF prog-id=69 op=LOAD Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1753 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635376166363931306434323535373532316331306230343130613664 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1753 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635376166363931306434323535373532316331306230343130613664 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit: BPF prog-id=70 op=LOAD Oct 31 05:30:39.214000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000308660 items=0 ppid=1753 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635376166363931306434323535373532316331306230343130613664 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit: BPF prog-id=71 op=LOAD Oct 31 05:30:39.214000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003086a8 items=0 ppid=1753 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635376166363931306434323535373532316331306230343130613664 Oct 31 05:30:39.214000 audit: BPF prog-id=71 op=UNLOAD Oct 31 05:30:39.214000 audit: BPF prog-id=70 op=UNLOAD Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.214000 audit: BPF prog-id=72 op=LOAD Oct 31 05:30:39.214000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000308ab8 items=0 ppid=1753 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635376166363931306434323535373532316331306230343130613664 Oct 31 05:30:39.224577 kubelet[1666]: E1031 05:30:39.224479 1666 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.244.102.214:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.102.214:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Oct 31 05:30:39.231017 env[1194]: time="2025-10-31T05:30:39.230923629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-29uxp.gb1.brightbox.com,Uid:191b56618ee0b866bf42ef9da4dd3078,Namespace:kube-system,Attempt:0,} returns sandbox id \"3ffc4433ca5ad66667e0367996abe57d852f243fe6f5f4c4b0522751e9f80063\"" Oct 31 05:30:39.238144 env[1194]: time="2025-10-31T05:30:39.238094597Z" level=info msg="CreateContainer within sandbox \"3ffc4433ca5ad66667e0367996abe57d852f243fe6f5f4c4b0522751e9f80063\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 31 05:30:39.262261 env[1194]: time="2025-10-31T05:30:39.262153182Z" level=info msg="CreateContainer within sandbox \"3ffc4433ca5ad66667e0367996abe57d852f243fe6f5f4c4b0522751e9f80063\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"f2419e66ecbb5f0b30d8736feff26d65ef9eaca96ad0e82b69f4a55213a40c0a\"" Oct 31 05:30:39.269438 env[1194]: time="2025-10-31T05:30:39.269395517Z" level=info msg="StartContainer for \"f2419e66ecbb5f0b30d8736feff26d65ef9eaca96ad0e82b69f4a55213a40c0a\"" Oct 31 05:30:39.279737 env[1194]: time="2025-10-31T05:30:39.279672530Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-29uxp.gb1.brightbox.com,Uid:492d2c0e6f7cd8410877ca0239e2e42b,Namespace:kube-system,Attempt:0,} returns sandbox id \"0a63a0c54fa686609dd18237e020dfeeefdbfd14b78106eff09102e02da04a61\"" Oct 31 05:30:39.283082 env[1194]: time="2025-10-31T05:30:39.283035557Z" level=info msg="CreateContainer within sandbox \"0a63a0c54fa686609dd18237e020dfeeefdbfd14b78106eff09102e02da04a61\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 31 05:30:39.291125 kubelet[1666]: E1031 05:30:39.290985 1666 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.102.214:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-29uxp.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.102.214:6443: connect: connection refused" interval="1.6s" Oct 31 05:30:39.297416 env[1194]: time="2025-10-31T05:30:39.297372982Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-29uxp.gb1.brightbox.com,Uid:09aad140f1918cc586d44567a652c8e8,Namespace:kube-system,Attempt:0,} returns sandbox id \"f57af6910d42557521c10b0410a6d543c23ad2969f61019da98e1d9d010f15fe\"" Oct 31 05:30:39.297729 env[1194]: time="2025-10-31T05:30:39.297574103Z" level=info msg="CreateContainer within sandbox \"0a63a0c54fa686609dd18237e020dfeeefdbfd14b78106eff09102e02da04a61\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e6eaf6a16e60ac0d5538555618db554054e97c1e373bea9d83ba590a29987e57\"" Oct 31 05:30:39.298661 env[1194]: time="2025-10-31T05:30:39.298421190Z" level=info msg="StartContainer for \"e6eaf6a16e60ac0d5538555618db554054e97c1e373bea9d83ba590a29987e57\"" Oct 31 05:30:39.301850 env[1194]: time="2025-10-31T05:30:39.301805797Z" level=info msg="CreateContainer within sandbox \"f57af6910d42557521c10b0410a6d543c23ad2969f61019da98e1d9d010f15fe\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 31 05:30:39.316529 systemd[1]: Started cri-containerd-f2419e66ecbb5f0b30d8736feff26d65ef9eaca96ad0e82b69f4a55213a40c0a.scope. Oct 31 05:30:39.337969 env[1194]: time="2025-10-31T05:30:39.337891271Z" level=info msg="CreateContainer within sandbox \"f57af6910d42557521c10b0410a6d543c23ad2969f61019da98e1d9d010f15fe\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"e4ddac77fc759bf95db8366de1ba530880cd33b37bfd4e3bf0759529db02ca88\"" Oct 31 05:30:39.339832 env[1194]: time="2025-10-31T05:30:39.339786553Z" level=info msg="StartContainer for \"e4ddac77fc759bf95db8366de1ba530880cd33b37bfd4e3bf0759529db02ca88\"" Oct 31 05:30:39.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.346000 audit: BPF prog-id=73 op=LOAD Oct 31 05:30:39.348000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.348000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1718 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632343139653636656362623566306233306438373336666566663236 Oct 31 05:30:39.349000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.349000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1718 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632343139653636656362623566306233306438373336666566663236 Oct 31 05:30:39.349000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.349000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.349000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.349000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.349000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.349000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.349000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.349000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.349000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.352181 systemd[1]: Started cri-containerd-e6eaf6a16e60ac0d5538555618db554054e97c1e373bea9d83ba590a29987e57.scope. Oct 31 05:30:39.349000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.349000 audit: BPF prog-id=74 op=LOAD Oct 31 05:30:39.349000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00008f050 items=0 ppid=1718 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632343139653636656362623566306233306438373336666566663236 Oct 31 05:30:39.351000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.351000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.351000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.351000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.351000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.351000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.351000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.351000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.351000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.351000 audit: BPF prog-id=75 op=LOAD Oct 31 05:30:39.351000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00008f098 items=0 ppid=1718 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632343139653636656362623566306233306438373336666566663236 Oct 31 05:30:39.352000 audit: BPF prog-id=75 op=UNLOAD Oct 31 05:30:39.352000 audit: BPF prog-id=74 op=UNLOAD Oct 31 05:30:39.352000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.352000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.352000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.352000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.352000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.352000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.352000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.352000 audit[1830]: AVC avc: denied { perfmon } for pid=1830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.352000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.352000 audit[1830]: AVC avc: denied { bpf } for pid=1830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.352000 audit: BPF prog-id=76 op=LOAD Oct 31 05:30:39.352000 audit[1830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00008f4a8 items=0 ppid=1718 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632343139653636656362623566306233306438373336666566663236 Oct 31 05:30:39.389654 systemd[1]: Started cri-containerd-e4ddac77fc759bf95db8366de1ba530880cd33b37bfd4e3bf0759529db02ca88.scope. Oct 31 05:30:39.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.393000 audit: BPF prog-id=77 op=LOAD Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1719 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536656166366131366536306163306435353338353535363138646235 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1719 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536656166366131366536306163306435353338353535363138646235 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit: BPF prog-id=78 op=LOAD Oct 31 05:30:39.395000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000230350 items=0 ppid=1719 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536656166366131366536306163306435353338353535363138646235 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit: BPF prog-id=79 op=LOAD Oct 31 05:30:39.395000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000230398 items=0 ppid=1719 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536656166366131366536306163306435353338353535363138646235 Oct 31 05:30:39.395000 audit: BPF prog-id=79 op=UNLOAD Oct 31 05:30:39.395000 audit: BPF prog-id=78 op=UNLOAD Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { perfmon } for pid=1849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit[1849]: AVC avc: denied { bpf } for pid=1849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.395000 audit: BPF prog-id=80 op=LOAD Oct 31 05:30:39.395000 audit[1849]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002307a8 items=0 ppid=1719 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536656166366131366536306163306435353338353535363138646235 Oct 31 05:30:39.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.429000 audit: BPF prog-id=81 op=LOAD Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1753 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534646461633737666337353962663935646238333636646531626135 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1753 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534646461633737666337353962663935646238333636646531626135 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit: BPF prog-id=82 op=LOAD Oct 31 05:30:39.432000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000099a30 items=0 ppid=1753 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534646461633737666337353962663935646238333636646531626135 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit: BPF prog-id=83 op=LOAD Oct 31 05:30:39.432000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099a78 items=0 ppid=1753 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534646461633737666337353962663935646238333636646531626135 Oct 31 05:30:39.432000 audit: BPF prog-id=83 op=UNLOAD Oct 31 05:30:39.432000 audit: BPF prog-id=82 op=UNLOAD Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:39.432000 audit: BPF prog-id=84 op=LOAD Oct 31 05:30:39.432000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000099e88 items=0 ppid=1753 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:39.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534646461633737666337353962663935646238333636646531626135 Oct 31 05:30:39.442781 env[1194]: time="2025-10-31T05:30:39.442722434Z" level=info msg="StartContainer for \"f2419e66ecbb5f0b30d8736feff26d65ef9eaca96ad0e82b69f4a55213a40c0a\" returns successfully" Oct 31 05:30:39.469499 kubelet[1666]: I1031 05:30:39.469130 1666 kubelet_node_status.go:75] "Attempting to register node" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:39.469499 kubelet[1666]: E1031 05:30:39.469469 1666 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.102.214:6443/api/v1/nodes\": dial tcp 10.244.102.214:6443: connect: connection refused" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:39.470018 env[1194]: time="2025-10-31T05:30:39.469980452Z" level=info msg="StartContainer for \"e6eaf6a16e60ac0d5538555618db554054e97c1e373bea9d83ba590a29987e57\" returns successfully" Oct 31 05:30:39.490793 env[1194]: time="2025-10-31T05:30:39.490740002Z" level=info msg="StartContainer for \"e4ddac77fc759bf95db8366de1ba530880cd33b37bfd4e3bf0759529db02ca88\" returns successfully" Oct 31 05:30:39.863841 kubelet[1666]: E1031 05:30:39.863752 1666 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.244.102.214:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.102.214:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Oct 31 05:30:39.925216 kubelet[1666]: E1031 05:30:39.925188 1666 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-29uxp.gb1.brightbox.com\" not found" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:39.928440 kubelet[1666]: E1031 05:30:39.928417 1666 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-29uxp.gb1.brightbox.com\" not found" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:39.935465 kubelet[1666]: E1031 05:30:39.935440 1666 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-29uxp.gb1.brightbox.com\" not found" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:40.837208 kernel: kauditd_printk_skb: 560 callbacks suppressed Oct 31 05:30:40.837390 kernel: audit: type=1400 audit(1761888640.832:570): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:40.832000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:40.832000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0004f1440 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:30:40.843552 kernel: audit: type=1300 audit(1761888640.832:570): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0004f1440 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:30:40.832000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:30:40.848553 kernel: audit: type=1327 audit(1761888640.832:570): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:30:40.843000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:40.855544 kernel: audit: type=1400 audit(1761888640.843:571): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:40.843000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0001555c0 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:30:40.860537 kernel: audit: type=1300 audit(1761888640.843:571): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0001555c0 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:30:40.843000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:30:40.869826 kernel: audit: type=1327 audit(1761888640.843:571): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:30:40.937752 kubelet[1666]: E1031 05:30:40.937709 1666 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-29uxp.gb1.brightbox.com\" not found" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:40.938829 kubelet[1666]: E1031 05:30:40.938810 1666 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-29uxp.gb1.brightbox.com\" not found" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:41.072305 kubelet[1666]: I1031 05:30:41.072278 1666 kubelet_node_status.go:75] "Attempting to register node" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:41.846000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:41.853547 kernel: audit: type=1400 audit(1761888641.846:572): avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:41.846000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:41.863819 kernel: audit: type=1400 audit(1761888641.846:573): avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:41.863926 kernel: audit: type=1300 audit(1761888641.846:573): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0042d5170 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:30:41.846000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0042d5170 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:30:41.846000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:30:41.868549 kernel: audit: type=1327 audit(1761888641.846:573): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:30:41.846000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003cfe000 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:30:41.846000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:30:41.858000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:41.858000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4d a1=c0026140c0 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:30:41.858000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:30:41.865000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:41.865000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0042c2360 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:30:41.865000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:30:41.865000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:41.865000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5c a1=c0039adc50 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:30:41.865000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:30:41.868000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525841 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:41.868000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c003cfe6c0 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:30:41.868000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:30:41.964759 kubelet[1666]: E1031 05:30:41.964711 1666 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-29uxp.gb1.brightbox.com\" not found" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:42.063419 kubelet[1666]: I1031 05:30:42.063387 1666 kubelet_node_status.go:78] "Successfully registered node" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:42.085043 kubelet[1666]: I1031 05:30:42.085007 1666 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:42.094144 kubelet[1666]: E1031 05:30:42.094090 1666 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-srv-29uxp.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:42.094299 kubelet[1666]: I1031 05:30:42.094141 1666 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:42.096043 kubelet[1666]: E1031 05:30:42.095960 1666 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-29uxp.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:42.096200 kubelet[1666]: I1031 05:30:42.096187 1666 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:42.099428 kubelet[1666]: E1031 05:30:42.099406 1666 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-29uxp.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:42.297420 kubelet[1666]: I1031 05:30:42.297256 1666 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:42.301355 kubelet[1666]: E1031 05:30:42.301301 1666 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-29uxp.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:42.855625 kubelet[1666]: I1031 05:30:42.855548 1666 apiserver.go:52] "Watching apiserver" Oct 31 05:30:42.884964 kubelet[1666]: I1031 05:30:42.884894 1666 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 31 05:30:43.659558 kubelet[1666]: I1031 05:30:43.659434 1666 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:43.670362 kubelet[1666]: I1031 05:30:43.670322 1666 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 31 05:30:44.103782 systemd[1]: Reloading. Oct 31 05:30:44.219026 /usr/lib/systemd/system-generators/torcx-generator[1961]: time="2025-10-31T05:30:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 05:30:44.219058 /usr/lib/systemd/system-generators/torcx-generator[1961]: time="2025-10-31T05:30:44Z" level=info msg="torcx already run" Oct 31 05:30:44.330356 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 05:30:44.330686 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 05:30:44.351820 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit: BPF prog-id=85 op=LOAD Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.440000 audit: BPF prog-id=86 op=LOAD Oct 31 05:30:44.440000 audit: BPF prog-id=46 op=UNLOAD Oct 31 05:30:44.440000 audit: BPF prog-id=47 op=UNLOAD Oct 31 05:30:44.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.443000 audit: BPF prog-id=87 op=LOAD Oct 31 05:30:44.444000 audit: BPF prog-id=48 op=UNLOAD Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit: BPF prog-id=88 op=LOAD Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.444000 audit: BPF prog-id=89 op=LOAD Oct 31 05:30:44.445000 audit: BPF prog-id=49 op=UNLOAD Oct 31 05:30:44.445000 audit: BPF prog-id=50 op=UNLOAD Oct 31 05:30:44.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.447000 audit: BPF prog-id=90 op=LOAD Oct 31 05:30:44.447000 audit: BPF prog-id=77 op=UNLOAD Oct 31 05:30:44.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.450000 audit: BPF prog-id=91 op=LOAD Oct 31 05:30:44.450000 audit: BPF prog-id=51 op=UNLOAD Oct 31 05:30:44.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.452000 audit: BPF prog-id=92 op=LOAD Oct 31 05:30:44.452000 audit: BPF prog-id=61 op=UNLOAD Oct 31 05:30:44.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.454000 audit: BPF prog-id=93 op=LOAD Oct 31 05:30:44.454000 audit: BPF prog-id=52 op=UNLOAD Oct 31 05:30:44.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.455000 audit: BPF prog-id=94 op=LOAD Oct 31 05:30:44.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.455000 audit: BPF prog-id=95 op=LOAD Oct 31 05:30:44.455000 audit: BPF prog-id=53 op=UNLOAD Oct 31 05:30:44.455000 audit: BPF prog-id=54 op=UNLOAD Oct 31 05:30:44.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.457000 audit: BPF prog-id=96 op=LOAD Oct 31 05:30:44.457000 audit: BPF prog-id=65 op=UNLOAD Oct 31 05:30:44.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.458000 audit: BPF prog-id=97 op=LOAD Oct 31 05:30:44.458000 audit: BPF prog-id=81 op=UNLOAD Oct 31 05:30:44.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.461000 audit: BPF prog-id=98 op=LOAD Oct 31 05:30:44.461000 audit: BPF prog-id=55 op=UNLOAD Oct 31 05:30:44.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.462000 audit: BPF prog-id=99 op=LOAD Oct 31 05:30:44.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.462000 audit: BPF prog-id=100 op=LOAD Oct 31 05:30:44.462000 audit: BPF prog-id=56 op=UNLOAD Oct 31 05:30:44.462000 audit: BPF prog-id=57 op=UNLOAD Oct 31 05:30:44.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.465000 audit: BPF prog-id=101 op=LOAD Oct 31 05:30:44.465000 audit: BPF prog-id=73 op=UNLOAD Oct 31 05:30:44.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.466000 audit: BPF prog-id=102 op=LOAD Oct 31 05:30:44.467000 audit: BPF prog-id=58 op=UNLOAD Oct 31 05:30:44.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.468000 audit: BPF prog-id=103 op=LOAD Oct 31 05:30:44.469000 audit: BPF prog-id=69 op=UNLOAD Oct 31 05:30:44.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.471000 audit: BPF prog-id=104 op=LOAD Oct 31 05:30:44.471000 audit: BPF prog-id=59 op=UNLOAD Oct 31 05:30:44.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:44.472000 audit: BPF prog-id=105 op=LOAD Oct 31 05:30:44.473000 audit: BPF prog-id=60 op=UNLOAD Oct 31 05:30:44.495390 systemd[1]: Stopping kubelet.service... Oct 31 05:30:44.523132 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 05:30:44.523755 systemd[1]: Stopped kubelet.service. Oct 31 05:30:44.524008 systemd[1]: kubelet.service: Consumed 1.203s CPU time. Oct 31 05:30:44.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:44.527813 systemd[1]: Starting kubelet.service... Oct 31 05:30:45.361000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=525866 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 31 05:30:45.361000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000540800 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:30:45.361000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:30:45.730549 systemd[1]: Started kubelet.service. Oct 31 05:30:45.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:30:45.843252 kubelet[2011]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 05:30:45.843790 kubelet[2011]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 05:30:45.843861 kubelet[2011]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 05:30:45.844038 kubelet[2011]: I1031 05:30:45.844008 2011 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 05:30:45.854826 kubelet[2011]: I1031 05:30:45.854784 2011 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Oct 31 05:30:45.855563 kubelet[2011]: I1031 05:30:45.855547 2011 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 05:30:45.856729 kubelet[2011]: I1031 05:30:45.856707 2011 server.go:956] "Client rotation is on, will bootstrap in background" Oct 31 05:30:45.859019 kubelet[2011]: I1031 05:30:45.858998 2011 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" Oct 31 05:30:45.952632 kubelet[2011]: I1031 05:30:45.952581 2011 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 05:30:45.966098 kubelet[2011]: E1031 05:30:45.966031 2011 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 05:30:45.966433 kubelet[2011]: I1031 05:30:45.966410 2011 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 31 05:30:45.971069 kubelet[2011]: I1031 05:30:45.971038 2011 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 31 05:30:45.971826 kubelet[2011]: I1031 05:30:45.971792 2011 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 05:30:45.972513 kubelet[2011]: I1031 05:30:45.972235 2011 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-29uxp.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 05:30:45.972841 kubelet[2011]: I1031 05:30:45.972827 2011 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 05:30:45.972923 kubelet[2011]: I1031 05:30:45.972913 2011 container_manager_linux.go:303] "Creating device plugin manager" Oct 31 05:30:45.973067 kubelet[2011]: I1031 05:30:45.973057 2011 state_mem.go:36] "Initialized new in-memory state store" Oct 31 05:30:45.973404 kubelet[2011]: I1031 05:30:45.973391 2011 kubelet.go:480] "Attempting to sync node with API server" Oct 31 05:30:45.973623 kubelet[2011]: I1031 05:30:45.973610 2011 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 05:30:45.973732 kubelet[2011]: I1031 05:30:45.973722 2011 kubelet.go:386] "Adding apiserver pod source" Oct 31 05:30:45.973822 kubelet[2011]: I1031 05:30:45.973813 2011 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 05:30:45.980295 kubelet[2011]: I1031 05:30:45.980267 2011 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 05:30:45.982248 kubelet[2011]: I1031 05:30:45.981064 2011 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Oct 31 05:30:45.988233 kubelet[2011]: I1031 05:30:45.988179 2011 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 31 05:30:45.988509 kubelet[2011]: I1031 05:30:45.988497 2011 server.go:1289] "Started kubelet" Oct 31 05:30:46.009146 kernel: kauditd_printk_skb: 263 callbacks suppressed Oct 31 05:30:46.013820 kernel: audit: type=1400 audit(1761888646.003:825): avc: denied { mac_admin } for pid=2011 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:46.013880 kernel: audit: type=1401 audit(1761888646.003:825): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:30:46.003000 audit[2011]: AVC avc: denied { mac_admin } for pid=2011 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:46.003000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:30:46.003000 audit[2011]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aaf4a0 a1=c00061b278 a2=c000aaf470 a3=25 items=0 ppid=1 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:46.016156 kubelet[2011]: I1031 05:30:46.015763 2011 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 05:30:46.018547 kernel: audit: type=1300 audit(1761888646.003:825): arch=c000003e syscall=188 success=no exit=-22 a0=c000aaf4a0 a1=c00061b278 a2=c000aaf470 a3=25 items=0 ppid=1 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:46.018627 kubelet[2011]: I1031 05:30:46.018505 2011 server.go:317] "Adding debug handlers to kubelet server" Oct 31 05:30:46.003000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:30:46.023558 kernel: audit: type=1327 audit(1761888646.003:825): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:30:46.041244 kubelet[2011]: I1031 05:30:46.041108 2011 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 05:30:46.041973 kubelet[2011]: I1031 05:30:46.041927 2011 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 05:30:46.043000 audit[2011]: AVC avc: denied { mac_admin } for pid=2011 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:46.046377 kubelet[2011]: I1031 05:30:46.044144 2011 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 05:30:46.043000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:30:46.048705 kernel: audit: type=1400 audit(1761888646.043:826): avc: denied { mac_admin } for pid=2011 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:46.048789 kernel: audit: type=1401 audit(1761888646.043:826): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:30:46.048827 kubelet[2011]: I1031 05:30:46.048789 2011 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 05:30:46.043000 audit[2011]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b3e340 a1=c000b24fd8 a2=c00097f170 a3=25 items=0 ppid=1 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:46.053204 kernel: audit: type=1300 audit(1761888646.043:826): arch=c000003e syscall=188 success=no exit=-22 a0=c000b3e340 a1=c000b24fd8 a2=c00097f170 a3=25 items=0 ppid=1 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:46.043000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:30:46.058550 kernel: audit: type=1327 audit(1761888646.043:826): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:30:46.064029 kubelet[2011]: I1031 05:30:46.062882 2011 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 05:30:46.074105 kubelet[2011]: I1031 05:30:46.074047 2011 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 05:30:46.090715 kubelet[2011]: I1031 05:30:46.090675 2011 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 31 05:30:46.094793 kubelet[2011]: I1031 05:30:46.091130 2011 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 31 05:30:46.095002 kubelet[2011]: E1031 05:30:46.091399 2011 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-29uxp.gb1.brightbox.com\" not found" Oct 31 05:30:46.095266 kubelet[2011]: I1031 05:30:46.095253 2011 reconciler.go:26] "Reconciler: start to sync state" Oct 31 05:30:46.102070 kubelet[2011]: I1031 05:30:46.102036 2011 factory.go:223] Registration of the systemd container factory successfully Oct 31 05:30:46.102923 kubelet[2011]: I1031 05:30:46.102883 2011 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 05:30:46.108750 kubelet[2011]: I1031 05:30:46.108726 2011 factory.go:223] Registration of the containerd container factory successfully Oct 31 05:30:46.121226 kubelet[2011]: I1031 05:30:46.121169 2011 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Oct 31 05:30:46.122496 kubelet[2011]: I1031 05:30:46.122473 2011 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Oct 31 05:30:46.122695 kubelet[2011]: I1031 05:30:46.122683 2011 status_manager.go:230] "Starting to sync pod status with apiserver" Oct 31 05:30:46.122796 kubelet[2011]: I1031 05:30:46.122783 2011 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 05:30:46.122862 kubelet[2011]: I1031 05:30:46.122852 2011 kubelet.go:2436] "Starting kubelet main sync loop" Oct 31 05:30:46.123005 kubelet[2011]: E1031 05:30:46.122981 2011 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 31 05:30:46.189420 kubelet[2011]: I1031 05:30:46.189382 2011 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 05:30:46.189420 kubelet[2011]: I1031 05:30:46.189401 2011 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 05:30:46.189420 kubelet[2011]: I1031 05:30:46.189430 2011 state_mem.go:36] "Initialized new in-memory state store" Oct 31 05:30:46.189735 kubelet[2011]: I1031 05:30:46.189705 2011 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 31 05:30:46.189782 kubelet[2011]: I1031 05:30:46.189736 2011 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 31 05:30:46.189782 kubelet[2011]: I1031 05:30:46.189767 2011 policy_none.go:49] "None policy: Start" Oct 31 05:30:46.189864 kubelet[2011]: I1031 05:30:46.189792 2011 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 31 05:30:46.189864 kubelet[2011]: I1031 05:30:46.189817 2011 state_mem.go:35] "Initializing new in-memory state store" Oct 31 05:30:46.189963 kubelet[2011]: I1031 05:30:46.189947 2011 state_mem.go:75] "Updated machine memory state" Oct 31 05:30:46.196000 audit[2011]: AVC avc: denied { mac_admin } for pid=2011 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:46.198539 kubelet[2011]: E1031 05:30:46.197012 2011 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Oct 31 05:30:46.199626 kubelet[2011]: E1031 05:30:46.199590 2011 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Oct 31 05:30:46.199975 kubelet[2011]: I1031 05:30:46.199962 2011 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 05:30:46.196000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:30:46.200449 kubelet[2011]: I1031 05:30:46.200257 2011 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 05:30:46.200769 kubelet[2011]: I1031 05:30:46.200758 2011 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 05:30:46.201703 kernel: audit: type=1400 audit(1761888646.196:827): avc: denied { mac_admin } for pid=2011 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:46.201778 kernel: audit: type=1401 audit(1761888646.196:827): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:30:46.196000 audit[2011]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e4cb10 a1=c000e40cd8 a2=c000e4cae0 a3=25 items=0 ppid=1 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:46.196000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:30:46.207947 kubelet[2011]: E1031 05:30:46.207125 2011 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 05:30:46.224243 kubelet[2011]: I1031 05:30:46.224186 2011 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.229696 kubelet[2011]: I1031 05:30:46.224738 2011 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.229696 kubelet[2011]: I1031 05:30:46.224983 2011 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.236873 kubelet[2011]: I1031 05:30:46.235828 2011 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 31 05:30:46.236873 kubelet[2011]: I1031 05:30:46.236143 2011 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 31 05:30:46.238826 kubelet[2011]: I1031 05:30:46.237602 2011 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 31 05:30:46.238826 kubelet[2011]: E1031 05:30:46.237814 2011 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-29uxp.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.299817 kubelet[2011]: I1031 05:30:46.299545 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/09aad140f1918cc586d44567a652c8e8-ca-certs\") pod \"kube-apiserver-srv-29uxp.gb1.brightbox.com\" (UID: \"09aad140f1918cc586d44567a652c8e8\") " pod="kube-system/kube-apiserver-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.299817 kubelet[2011]: I1031 05:30:46.299635 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/09aad140f1918cc586d44567a652c8e8-k8s-certs\") pod \"kube-apiserver-srv-29uxp.gb1.brightbox.com\" (UID: \"09aad140f1918cc586d44567a652c8e8\") " pod="kube-system/kube-apiserver-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.299817 kubelet[2011]: I1031 05:30:46.299677 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/492d2c0e6f7cd8410877ca0239e2e42b-kubeconfig\") pod \"kube-scheduler-srv-29uxp.gb1.brightbox.com\" (UID: \"492d2c0e6f7cd8410877ca0239e2e42b\") " pod="kube-system/kube-scheduler-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.299817 kubelet[2011]: I1031 05:30:46.299719 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/09aad140f1918cc586d44567a652c8e8-usr-share-ca-certificates\") pod \"kube-apiserver-srv-29uxp.gb1.brightbox.com\" (UID: \"09aad140f1918cc586d44567a652c8e8\") " pod="kube-system/kube-apiserver-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.299817 kubelet[2011]: I1031 05:30:46.299765 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/191b56618ee0b866bf42ef9da4dd3078-ca-certs\") pod \"kube-controller-manager-srv-29uxp.gb1.brightbox.com\" (UID: \"191b56618ee0b866bf42ef9da4dd3078\") " pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.300355 kubelet[2011]: I1031 05:30:46.299815 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/191b56618ee0b866bf42ef9da4dd3078-flexvolume-dir\") pod \"kube-controller-manager-srv-29uxp.gb1.brightbox.com\" (UID: \"191b56618ee0b866bf42ef9da4dd3078\") " pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.300355 kubelet[2011]: I1031 05:30:46.299846 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/191b56618ee0b866bf42ef9da4dd3078-k8s-certs\") pod \"kube-controller-manager-srv-29uxp.gb1.brightbox.com\" (UID: \"191b56618ee0b866bf42ef9da4dd3078\") " pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.300355 kubelet[2011]: I1031 05:30:46.299886 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/191b56618ee0b866bf42ef9da4dd3078-kubeconfig\") pod \"kube-controller-manager-srv-29uxp.gb1.brightbox.com\" (UID: \"191b56618ee0b866bf42ef9da4dd3078\") " pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.300355 kubelet[2011]: I1031 05:30:46.299936 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/191b56618ee0b866bf42ef9da4dd3078-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-29uxp.gb1.brightbox.com\" (UID: \"191b56618ee0b866bf42ef9da4dd3078\") " pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.335870 kubelet[2011]: I1031 05:30:46.335719 2011 kubelet_node_status.go:75] "Attempting to register node" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.351612 kubelet[2011]: I1031 05:30:46.351563 2011 kubelet_node_status.go:124] "Node was previously registered" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.351819 kubelet[2011]: I1031 05:30:46.351751 2011 kubelet_node_status.go:78] "Successfully registered node" node="srv-29uxp.gb1.brightbox.com" Oct 31 05:30:46.892000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:46.892000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000dff440 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:30:46.892000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:30:46.892000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:46.892000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000dff600 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:30:46.892000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:30:46.893000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:46.893000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000dff7c0 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:30:46.893000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:30:46.893000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:30:46.893000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000add9a0 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:30:46.893000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:30:47.042287 kubelet[2011]: I1031 05:30:47.042207 2011 apiserver.go:52] "Watching apiserver" Oct 31 05:30:47.096012 kubelet[2011]: I1031 05:30:47.095956 2011 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 31 05:30:47.125817 kubelet[2011]: I1031 05:30:47.125736 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-29uxp.gb1.brightbox.com" podStartSLOduration=4.1257046 podStartE2EDuration="4.1257046s" podCreationTimestamp="2025-10-31 05:30:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:30:47.10862403 +0000 UTC m=+1.361242310" watchObservedRunningTime="2025-10-31 05:30:47.1257046 +0000 UTC m=+1.378322859" Oct 31 05:30:47.126098 kubelet[2011]: I1031 05:30:47.125873 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-29uxp.gb1.brightbox.com" podStartSLOduration=1.125868442 podStartE2EDuration="1.125868442s" podCreationTimestamp="2025-10-31 05:30:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:30:47.124399707 +0000 UTC m=+1.377017968" watchObservedRunningTime="2025-10-31 05:30:47.125868442 +0000 UTC m=+1.378486724" Oct 31 05:30:47.157376 kubelet[2011]: I1031 05:30:47.157263 2011 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:47.161365 kubelet[2011]: I1031 05:30:47.161311 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-29uxp.gb1.brightbox.com" podStartSLOduration=1.16129214 podStartE2EDuration="1.16129214s" podCreationTimestamp="2025-10-31 05:30:46 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:30:47.138083093 +0000 UTC m=+1.390701388" watchObservedRunningTime="2025-10-31 05:30:47.16129214 +0000 UTC m=+1.413910423" Oct 31 05:30:47.167095 kubelet[2011]: I1031 05:30:47.167052 2011 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 31 05:30:47.167827 kubelet[2011]: E1031 05:30:47.167618 2011 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-29uxp.gb1.brightbox.com\" already exists" pod="kube-system/kube-scheduler-srv-29uxp.gb1.brightbox.com" Oct 31 05:30:50.165567 kubelet[2011]: I1031 05:30:50.165510 2011 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 31 05:30:50.167464 env[1194]: time="2025-10-31T05:30:50.167314150Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 31 05:30:50.168828 kubelet[2011]: I1031 05:30:50.168789 2011 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 31 05:30:51.228269 systemd[1]: Created slice kubepods-besteffort-pod7a252abd_e487_4f13_89fb_d3487956a9d1.slice. Oct 31 05:30:51.332648 kubelet[2011]: I1031 05:30:51.332611 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wrxjk\" (UniqueName: \"kubernetes.io/projected/7a252abd-e487-4f13-89fb-d3487956a9d1-kube-api-access-wrxjk\") pod \"kube-proxy-v2mw5\" (UID: \"7a252abd-e487-4f13-89fb-d3487956a9d1\") " pod="kube-system/kube-proxy-v2mw5" Oct 31 05:30:51.333199 kubelet[2011]: I1031 05:30:51.333171 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/7a252abd-e487-4f13-89fb-d3487956a9d1-kube-proxy\") pod \"kube-proxy-v2mw5\" (UID: \"7a252abd-e487-4f13-89fb-d3487956a9d1\") " pod="kube-system/kube-proxy-v2mw5" Oct 31 05:30:51.333306 kubelet[2011]: I1031 05:30:51.333294 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7a252abd-e487-4f13-89fb-d3487956a9d1-xtables-lock\") pod \"kube-proxy-v2mw5\" (UID: \"7a252abd-e487-4f13-89fb-d3487956a9d1\") " pod="kube-system/kube-proxy-v2mw5" Oct 31 05:30:51.333402 kubelet[2011]: I1031 05:30:51.333390 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7a252abd-e487-4f13-89fb-d3487956a9d1-lib-modules\") pod \"kube-proxy-v2mw5\" (UID: \"7a252abd-e487-4f13-89fb-d3487956a9d1\") " pod="kube-system/kube-proxy-v2mw5" Oct 31 05:30:51.345741 systemd[1]: Created slice kubepods-besteffort-pod0e299336_2930_4455_b76d_b3382dcc04a3.slice. Oct 31 05:30:51.433968 kubelet[2011]: I1031 05:30:51.433891 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b6vqk\" (UniqueName: \"kubernetes.io/projected/0e299336-2930-4455-b76d-b3382dcc04a3-kube-api-access-b6vqk\") pod \"tigera-operator-7dcd859c48-7c4bv\" (UID: \"0e299336-2930-4455-b76d-b3382dcc04a3\") " pod="tigera-operator/tigera-operator-7dcd859c48-7c4bv" Oct 31 05:30:51.434475 kubelet[2011]: I1031 05:30:51.434426 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0e299336-2930-4455-b76d-b3382dcc04a3-var-lib-calico\") pod \"tigera-operator-7dcd859c48-7c4bv\" (UID: \"0e299336-2930-4455-b76d-b3382dcc04a3\") " pod="tigera-operator/tigera-operator-7dcd859c48-7c4bv" Oct 31 05:30:51.451052 kubelet[2011]: I1031 05:30:51.450986 2011 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 31 05:30:51.538322 env[1194]: time="2025-10-31T05:30:51.537378931Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v2mw5,Uid:7a252abd-e487-4f13-89fb-d3487956a9d1,Namespace:kube-system,Attempt:0,}" Oct 31 05:30:51.565091 env[1194]: time="2025-10-31T05:30:51.564959797Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:30:51.565320 env[1194]: time="2025-10-31T05:30:51.565296943Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:30:51.565436 env[1194]: time="2025-10-31T05:30:51.565416185Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:30:51.565806 env[1194]: time="2025-10-31T05:30:51.565763223Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5246b8b052462e64d77d5924c53f346b3ef12d1d7e8c23d0813f37d7c8296cd3 pid=2065 runtime=io.containerd.runc.v2 Oct 31 05:30:51.596681 systemd[1]: Started cri-containerd-5246b8b052462e64d77d5924c53f346b3ef12d1d7e8c23d0813f37d7c8296cd3.scope. Oct 31 05:30:51.618955 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 31 05:30:51.619129 kernel: audit: type=1400 audit(1761888651.613:832): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.622325 kernel: audit: type=1400 audit(1761888651.613:833): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.627704 kernel: audit: type=1400 audit(1761888651.613:834): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.634093 kernel: audit: type=1400 audit(1761888651.613:835): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.634181 kernel: audit: type=1400 audit(1761888651.613:836): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.637546 kernel: audit: type=1400 audit(1761888651.613:837): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.641546 kernel: audit: type=1400 audit(1761888651.613:838): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.648762 kernel: audit: type=1400 audit(1761888651.613:839): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.648836 kernel: audit: type=1400 audit(1761888651.613:840): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.649538 env[1194]: time="2025-10-31T05:30:51.649480620Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-7c4bv,Uid:0e299336-2930-4455-b76d-b3382dcc04a3,Namespace:tigera-operator,Attempt:0,}" Oct 31 05:30:51.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.617000 audit: BPF prog-id=106 op=LOAD Oct 31 05:30:51.619000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.619000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2065 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343662386230353234363265363464373764353932346335336633 Oct 31 05:30:51.619000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.619000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2065 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343662386230353234363265363464373764353932346335336633 Oct 31 05:30:51.619000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.619000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.653532 kernel: audit: type=1400 audit(1761888651.617:841): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.619000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.619000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.619000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.619000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.619000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.619000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.619000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.619000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.619000 audit: BPF prog-id=107 op=LOAD Oct 31 05:30:51.619000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000252dc0 items=0 ppid=2065 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343662386230353234363265363464373764353932346335336633 Oct 31 05:30:51.620000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.620000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.620000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.620000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.620000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.620000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.620000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.620000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.620000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.620000 audit: BPF prog-id=108 op=LOAD Oct 31 05:30:51.620000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000252e08 items=0 ppid=2065 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343662386230353234363265363464373764353932346335336633 Oct 31 05:30:51.620000 audit: BPF prog-id=108 op=UNLOAD Oct 31 05:30:51.620000 audit: BPF prog-id=107 op=UNLOAD Oct 31 05:30:51.621000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.621000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.621000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.621000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.621000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.621000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.621000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.621000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.621000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.621000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.621000 audit: BPF prog-id=109 op=LOAD Oct 31 05:30:51.621000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000253218 items=0 ppid=2065 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532343662386230353234363265363464373764353932346335336633 Oct 31 05:30:51.660953 env[1194]: time="2025-10-31T05:30:51.660914544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v2mw5,Uid:7a252abd-e487-4f13-89fb-d3487956a9d1,Namespace:kube-system,Attempt:0,} returns sandbox id \"5246b8b052462e64d77d5924c53f346b3ef12d1d7e8c23d0813f37d7c8296cd3\"" Oct 31 05:30:51.667969 env[1194]: time="2025-10-31T05:30:51.667928874Z" level=info msg="CreateContainer within sandbox \"5246b8b052462e64d77d5924c53f346b3ef12d1d7e8c23d0813f37d7c8296cd3\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 31 05:30:51.670744 env[1194]: time="2025-10-31T05:30:51.670413160Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:30:51.670744 env[1194]: time="2025-10-31T05:30:51.670461742Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:30:51.670744 env[1194]: time="2025-10-31T05:30:51.670473789Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:30:51.670744 env[1194]: time="2025-10-31T05:30:51.670617955Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/abefea55818a1f2a7ea2d12bfe7cdd436df31887c35412228aa641fb3d388f50 pid=2107 runtime=io.containerd.runc.v2 Oct 31 05:30:51.678128 env[1194]: time="2025-10-31T05:30:51.678082974Z" level=info msg="CreateContainer within sandbox \"5246b8b052462e64d77d5924c53f346b3ef12d1d7e8c23d0813f37d7c8296cd3\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"0e35a752f2b9a44d17a7839284ed6d9ccfe23b2771d7a038265bcc3032a331bf\"" Oct 31 05:30:51.680694 env[1194]: time="2025-10-31T05:30:51.680659794Z" level=info msg="StartContainer for \"0e35a752f2b9a44d17a7839284ed6d9ccfe23b2771d7a038265bcc3032a331bf\"" Oct 31 05:30:51.691437 systemd[1]: Started cri-containerd-abefea55818a1f2a7ea2d12bfe7cdd436df31887c35412228aa641fb3d388f50.scope. Oct 31 05:30:51.713630 systemd[1]: Started cri-containerd-0e35a752f2b9a44d17a7839284ed6d9ccfe23b2771d7a038265bcc3032a331bf.scope. Oct 31 05:30:51.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.714000 audit: BPF prog-id=110 op=LOAD Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2107 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162656665613535383138613166326137656132643132626665376364 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2107 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162656665613535383138613166326137656132643132626665376364 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit: BPF prog-id=111 op=LOAD Oct 31 05:30:51.715000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00035c9d0 items=0 ppid=2107 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162656665613535383138613166326137656132643132626665376364 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit: BPF prog-id=112 op=LOAD Oct 31 05:30:51.715000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00035ca18 items=0 ppid=2107 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162656665613535383138613166326137656132643132626665376364 Oct 31 05:30:51.715000 audit: BPF prog-id=112 op=UNLOAD Oct 31 05:30:51.715000 audit: BPF prog-id=111 op=UNLOAD Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.715000 audit: BPF prog-id=113 op=LOAD Oct 31 05:30:51.715000 audit[2117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00035ce28 items=0 ppid=2107 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162656665613535383138613166326137656132643132626665376364 Oct 31 05:30:51.749000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.749000 audit[2134]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f138ae5c2f8 items=0 ppid=2065 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065333561373532663262396134346431376137383339323834656436 Oct 31 05:30:51.749000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.749000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.749000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.749000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.749000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.749000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.749000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.749000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.749000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.749000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.749000 audit: BPF prog-id=114 op=LOAD Oct 31 05:30:51.749000 audit[2134]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024238 items=0 ppid=2065 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065333561373532663262396134346431376137383339323834656436 Oct 31 05:30:51.750000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.750000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.750000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.750000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.750000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.750000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.750000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.750000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.750000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.750000 audit: BPF prog-id=115 op=LOAD Oct 31 05:30:51.750000 audit[2134]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024288 items=0 ppid=2065 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065333561373532663262396134346431376137383339323834656436 Oct 31 05:30:51.751000 audit: BPF prog-id=115 op=UNLOAD Oct 31 05:30:51.751000 audit: BPF prog-id=114 op=UNLOAD Oct 31 05:30:51.751000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.751000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.751000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.751000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.751000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.751000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.751000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.751000 audit[2134]: AVC avc: denied { perfmon } for pid=2134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.751000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.751000 audit[2134]: AVC avc: denied { bpf } for pid=2134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:51.751000 audit: BPF prog-id=116 op=LOAD Oct 31 05:30:51.751000 audit[2134]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024318 items=0 ppid=2065 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:51.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065333561373532663262396134346431376137383339323834656436 Oct 31 05:30:51.766001 env[1194]: time="2025-10-31T05:30:51.765958512Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-7c4bv,Uid:0e299336-2930-4455-b76d-b3382dcc04a3,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"abefea55818a1f2a7ea2d12bfe7cdd436df31887c35412228aa641fb3d388f50\"" Oct 31 05:30:51.769182 env[1194]: time="2025-10-31T05:30:51.769139223Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\"" Oct 31 05:30:51.780496 env[1194]: time="2025-10-31T05:30:51.780448995Z" level=info msg="StartContainer for \"0e35a752f2b9a44d17a7839284ed6d9ccfe23b2771d7a038265bcc3032a331bf\" returns successfully" Oct 31 05:30:52.066000 audit[2212]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.066000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe56fcb2c0 a2=0 a3=7ffe56fcb2ac items=0 ppid=2153 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 05:30:52.076000 audit[2216]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.076000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeed3f3cb0 a2=0 a3=7ffeed3f3c9c items=0 ppid=2153 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 05:30:52.077000 audit[2211]: NETFILTER_CFG table=mangle:40 family=2 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.077000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc481dca60 a2=0 a3=7ffc481dca4c items=0 ppid=2153 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 05:30:52.082000 audit[2218]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.082000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed20a2a50 a2=0 a3=7ffed20a2a3c items=0 ppid=2153 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 05:30:52.082000 audit[2217]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.082000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffccb362e30 a2=0 a3=7ffccb362e1c items=0 ppid=2153 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 05:30:52.084000 audit[2219]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.084000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc146831c0 a2=0 a3=7ffc146831ac items=0 ppid=2153 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 05:30:52.175000 audit[2220]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.175000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc1b592150 a2=0 a3=7ffc1b59213c items=0 ppid=2153 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 05:30:52.181000 audit[2222]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.181000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe46b77930 a2=0 a3=7ffe46b7791c items=0 ppid=2153 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 31 05:30:52.189000 audit[2225]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.189000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc2c18d0d0 a2=0 a3=7ffc2c18d0bc items=0 ppid=2153 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.189000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 31 05:30:52.191000 audit[2226]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.191000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffee345230 a2=0 a3=7fffee34521c items=0 ppid=2153 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 05:30:52.196000 audit[2228]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.196000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffded3641c0 a2=0 a3=7ffded3641ac items=0 ppid=2153 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 05:30:52.200000 audit[2229]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.200000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcad330cc0 a2=0 a3=7ffcad330cac items=0 ppid=2153 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 05:30:52.204000 audit[2231]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.204000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcde104720 a2=0 a3=7ffcde10470c items=0 ppid=2153 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 05:30:52.208000 audit[2234]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.208000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcd06c50b0 a2=0 a3=7ffcd06c509c items=0 ppid=2153 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 31 05:30:52.210000 audit[2235]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.210000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6087b420 a2=0 a3=7ffd6087b40c items=0 ppid=2153 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 05:30:52.213000 audit[2237]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.213000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdeb0eff20 a2=0 a3=7ffdeb0eff0c items=0 ppid=2153 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 05:30:52.215000 audit[2238]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.215000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc93492f0 a2=0 a3=7fffc93492dc items=0 ppid=2153 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 05:30:52.219000 audit[2240]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.219000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccf9605d0 a2=0 a3=7ffccf9605bc items=0 ppid=2153 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 05:30:52.226000 audit[2243]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.226000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6feb1b00 a2=0 a3=7ffd6feb1aec items=0 ppid=2153 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 05:30:52.232000 audit[2246]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.232000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0d6db9e0 a2=0 a3=7ffe0d6db9cc items=0 ppid=2153 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.232000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 05:30:52.234000 audit[2247]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.234000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe6d34d9a0 a2=0 a3=7ffe6d34d98c items=0 ppid=2153 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 05:30:52.238000 audit[2249]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.238000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc94368dd0 a2=0 a3=7ffc94368dbc items=0 ppid=2153 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:30:52.245000 audit[2252]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.245000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffccc0e6650 a2=0 a3=7ffccc0e663c items=0 ppid=2153 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:30:52.247000 audit[2253]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.247000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff51f43a60 a2=0 a3=7fff51f43a4c items=0 ppid=2153 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 05:30:52.251000 audit[2255]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:30:52.251000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe60e0fb00 a2=0 a3=7ffe60e0faec items=0 ppid=2153 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 05:30:52.289000 audit[2261]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:30:52.289000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffec0c41f90 a2=0 a3=7ffec0c41f7c items=0 ppid=2153 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:30:52.300000 audit[2261]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:30:52.300000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffec0c41f90 a2=0 a3=7ffec0c41f7c items=0 ppid=2153 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:30:52.302000 audit[2266]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.302000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffc44cd550 a2=0 a3=7fffc44cd53c items=0 ppid=2153 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 05:30:52.306000 audit[2268]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.306000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe0d871d30 a2=0 a3=7ffe0d871d1c items=0 ppid=2153 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 31 05:30:52.310000 audit[2271]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.310000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffee3d688a0 a2=0 a3=7ffee3d6888c items=0 ppid=2153 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 31 05:30:52.312000 audit[2272]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.312000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe62ddaf40 a2=0 a3=7ffe62ddaf2c items=0 ppid=2153 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 05:30:52.315000 audit[2274]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.315000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7ec6a8c0 a2=0 a3=7ffd7ec6a8ac items=0 ppid=2153 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 05:30:52.316000 audit[2275]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.316000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf2350640 a2=0 a3=7ffcf235062c items=0 ppid=2153 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 05:30:52.320000 audit[2277]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.320000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff4f53a820 a2=0 a3=7fff4f53a80c items=0 ppid=2153 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 31 05:30:52.325000 audit[2280]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.325000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff7d5c8920 a2=0 a3=7fff7d5c890c items=0 ppid=2153 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 31 05:30:52.327000 audit[2281]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.327000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff744ca770 a2=0 a3=7fff744ca75c items=0 ppid=2153 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 05:30:52.330000 audit[2283]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.330000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffbe271c70 a2=0 a3=7fffbe271c5c items=0 ppid=2153 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 05:30:52.332000 audit[2284]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.332000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd33ff6640 a2=0 a3=7ffd33ff662c items=0 ppid=2153 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 05:30:52.335000 audit[2286]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.335000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdeab0abd0 a2=0 a3=7ffdeab0abbc items=0 ppid=2153 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 31 05:30:52.341000 audit[2289]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.341000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc34fe5410 a2=0 a3=7ffc34fe53fc items=0 ppid=2153 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 31 05:30:52.346000 audit[2292]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.346000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff25a8df50 a2=0 a3=7fff25a8df3c items=0 ppid=2153 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 31 05:30:52.351000 audit[2293]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.351000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd17683ee0 a2=0 a3=7ffd17683ecc items=0 ppid=2153 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.351000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 05:30:52.357000 audit[2295]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.357000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeb4d9acb0 a2=0 a3=7ffeb4d9ac9c items=0 ppid=2153 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.357000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:30:52.363000 audit[2298]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.363000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffece56e850 a2=0 a3=7ffece56e83c items=0 ppid=2153 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:30:52.365000 audit[2299]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.365000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff28da2620 a2=0 a3=7fff28da260c items=0 ppid=2153 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 05:30:52.368000 audit[2301]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.368000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe61d8b0e0 a2=0 a3=7ffe61d8b0cc items=0 ppid=2153 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 05:30:52.370000 audit[2302]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.370000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2217d210 a2=0 a3=7ffc2217d1fc items=0 ppid=2153 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 05:30:52.372000 audit[2304]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.372000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff2dde3a90 a2=0 a3=7fff2dde3a7c items=0 ppid=2153 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 05:30:52.377000 audit[2307]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:30:52.377000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc4b4a5b30 a2=0 a3=7ffc4b4a5b1c items=0 ppid=2153 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 05:30:52.381000 audit[2309]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 05:30:52.381000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff944aa990 a2=0 a3=7fff944aa97c items=0 ppid=2153 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.381000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:30:52.382000 audit[2309]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 05:30:52.382000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff944aa990 a2=0 a3=7fff944aa97c items=0 ppid=2153 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:52.382000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:30:52.470203 systemd[1]: run-containerd-runc-k8s.io-5246b8b052462e64d77d5924c53f346b3ef12d1d7e8c23d0813f37d7c8296cd3-runc.go6xnj.mount: Deactivated successfully. Oct 31 05:30:52.553177 kubelet[2011]: I1031 05:30:52.553101 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-v2mw5" podStartSLOduration=1.55307916 podStartE2EDuration="1.55307916s" podCreationTimestamp="2025-10-31 05:30:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:30:52.19656774 +0000 UTC m=+6.449185999" watchObservedRunningTime="2025-10-31 05:30:52.55307916 +0000 UTC m=+6.805697442" Oct 31 05:30:53.942359 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount463398798.mount: Deactivated successfully. Oct 31 05:30:55.052170 env[1194]: time="2025-10-31T05:30:55.052093049Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:55.054043 env[1194]: time="2025-10-31T05:30:55.054010506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:55.055249 env[1194]: time="2025-10-31T05:30:55.055224285Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:55.055838 env[1194]: time="2025-10-31T05:30:55.055813254Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\" returns image reference \"sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1\"" Oct 31 05:30:55.056381 env[1194]: time="2025-10-31T05:30:55.056344635Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:1b629a1403f5b6d7243f7dd523d04b8a50352a33c1d4d6970b6002a8733acf2e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:30:55.060294 env[1194]: time="2025-10-31T05:30:55.060124022Z" level=info msg="CreateContainer within sandbox \"abefea55818a1f2a7ea2d12bfe7cdd436df31887c35412228aa641fb3d388f50\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 31 05:30:55.074267 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4180382338.mount: Deactivated successfully. Oct 31 05:30:55.090812 env[1194]: time="2025-10-31T05:30:55.090753353Z" level=info msg="CreateContainer within sandbox \"abefea55818a1f2a7ea2d12bfe7cdd436df31887c35412228aa641fb3d388f50\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"fc7444db87ebe61d1f1039a8a71a799b05f34f82a7966a83112e1b1349d1258a\"" Oct 31 05:30:55.093376 env[1194]: time="2025-10-31T05:30:55.093342734Z" level=info msg="StartContainer for \"fc7444db87ebe61d1f1039a8a71a799b05f34f82a7966a83112e1b1349d1258a\"" Oct 31 05:30:55.121070 systemd[1]: Started cri-containerd-fc7444db87ebe61d1f1039a8a71a799b05f34f82a7966a83112e1b1349d1258a.scope. Oct 31 05:30:55.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.150000 audit: BPF prog-id=117 op=LOAD Oct 31 05:30:55.151000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.151000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2107 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:55.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663373434346462383765626536316431663130333961386137316137 Oct 31 05:30:55.152000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.152000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2107 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:55.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663373434346462383765626536316431663130333961386137316137 Oct 31 05:30:55.152000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.152000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.152000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.152000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.152000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.152000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.152000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.152000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.152000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.152000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.152000 audit: BPF prog-id=118 op=LOAD Oct 31 05:30:55.152000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b84b0 items=0 ppid=2107 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:55.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663373434346462383765626536316431663130333961386137316137 Oct 31 05:30:55.155000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.155000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.155000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.155000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.155000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.155000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.155000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.155000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.155000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.155000 audit: BPF prog-id=119 op=LOAD Oct 31 05:30:55.155000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b84f8 items=0 ppid=2107 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:55.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663373434346462383765626536316431663130333961386137316137 Oct 31 05:30:55.156000 audit: BPF prog-id=119 op=UNLOAD Oct 31 05:30:55.156000 audit: BPF prog-id=118 op=UNLOAD Oct 31 05:30:55.156000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.156000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.156000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.156000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.156000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.156000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.156000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.156000 audit[2318]: AVC avc: denied { perfmon } for pid=2318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.156000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.156000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:30:55.156000 audit: BPF prog-id=120 op=LOAD Oct 31 05:30:55.156000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b8908 items=0 ppid=2107 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:30:55.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663373434346462383765626536316431663130333961386137316137 Oct 31 05:30:55.180029 env[1194]: time="2025-10-31T05:30:55.179967558Z" level=info msg="StartContainer for \"fc7444db87ebe61d1f1039a8a71a799b05f34f82a7966a83112e1b1349d1258a\" returns successfully" Oct 31 05:30:55.215069 kubelet[2011]: I1031 05:30:55.214994 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7dcd859c48-7c4bv" podStartSLOduration=0.925121981 podStartE2EDuration="4.214970061s" podCreationTimestamp="2025-10-31 05:30:51 +0000 UTC" firstStartedPulling="2025-10-31 05:30:51.767189297 +0000 UTC m=+6.019807556" lastFinishedPulling="2025-10-31 05:30:55.057037377 +0000 UTC m=+9.309655636" observedRunningTime="2025-10-31 05:30:55.213933278 +0000 UTC m=+9.466551560" watchObservedRunningTime="2025-10-31 05:30:55.214970061 +0000 UTC m=+9.467588367" Oct 31 05:30:56.072504 systemd[1]: run-containerd-runc-k8s.io-fc7444db87ebe61d1f1039a8a71a799b05f34f82a7966a83112e1b1349d1258a-runc.GTLIgi.mount: Deactivated successfully. Oct 31 05:31:00.439077 sudo[1382]: pam_unix(sudo:session): session closed for user root Oct 31 05:31:00.454639 kernel: kauditd_printk_skb: 357 callbacks suppressed Oct 31 05:31:00.454783 kernel: audit: type=1106 audit(1761888660.438:943): pid=1382 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:31:00.438000 audit[1382]: USER_END pid=1382 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:31:00.438000 audit[1382]: CRED_DISP pid=1382 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:31:00.465557 kernel: audit: type=1104 audit(1761888660.438:944): pid=1382 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:31:00.605321 sshd[1379]: pam_unix(sshd:session): session closed for user core Oct 31 05:31:00.610000 audit[1379]: USER_END pid=1379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:31:00.616694 kernel: audit: type=1106 audit(1761888660.610:945): pid=1379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:31:00.610000 audit[1379]: CRED_DISP pid=1379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:31:00.620535 kernel: audit: type=1104 audit(1761888660.610:946): pid=1379 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:31:00.623389 systemd-logind[1187]: Session 9 logged out. Waiting for processes to exit. Oct 31 05:31:00.624156 systemd[1]: sshd@8-10.244.102.214:22-139.178.68.195:47182.service: Deactivated successfully. Oct 31 05:31:00.625371 systemd[1]: session-9.scope: Deactivated successfully. Oct 31 05:31:00.625571 systemd[1]: session-9.scope: Consumed 7.136s CPU time. Oct 31 05:31:00.627436 systemd-logind[1187]: Removed session 9. Oct 31 05:31:00.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.102.214:22-139.178.68.195:47182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:31:00.634540 kernel: audit: type=1131 audit(1761888660.623:947): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.102.214:22-139.178.68.195:47182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:31:01.625000 audit[2396]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:01.633586 kernel: audit: type=1325 audit(1761888661.625:948): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:01.625000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcfbd7ed60 a2=0 a3=7ffcfbd7ed4c items=0 ppid=2153 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:01.639675 kernel: audit: type=1300 audit(1761888661.625:948): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcfbd7ed60 a2=0 a3=7ffcfbd7ed4c items=0 ppid=2153 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:01.625000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:01.645542 kernel: audit: type=1327 audit(1761888661.625:948): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:01.641000 audit[2396]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:01.654456 kernel: audit: type=1325 audit(1761888661.641:949): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:01.654555 kernel: audit: type=1300 audit(1761888661.641:949): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcfbd7ed60 a2=0 a3=0 items=0 ppid=2153 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:01.641000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcfbd7ed60 a2=0 a3=0 items=0 ppid=2153 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:01.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:01.784000 audit[2398]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:01.784000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdca4766e0 a2=0 a3=7ffdca4766cc items=0 ppid=2153 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:01.784000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:01.789000 audit[2398]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:01.789000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdca4766e0 a2=0 a3=0 items=0 ppid=2153 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:01.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:05.053000 audit[2400]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:05.053000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd9bab5b50 a2=0 a3=7ffd9bab5b3c items=0 ppid=2153 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:05.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:05.057000 audit[2400]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:05.057000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd9bab5b50 a2=0 a3=0 items=0 ppid=2153 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:05.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:05.114000 audit[2402]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:05.114000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fffa1a47770 a2=0 a3=7fffa1a4775c items=0 ppid=2153 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:05.114000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:05.119000 audit[2402]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:05.119000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa1a47770 a2=0 a3=0 items=0 ppid=2153 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:05.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:06.236103 kernel: kauditd_printk_skb: 19 callbacks suppressed Oct 31 05:31:06.236335 kernel: audit: type=1325 audit(1761888666.232:956): table=filter:97 family=2 entries=19 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:06.232000 audit[2404]: NETFILTER_CFG table=filter:97 family=2 entries=19 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:06.232000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcbb20d640 a2=0 a3=7ffcbb20d62c items=0 ppid=2153 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:06.241578 kernel: audit: type=1300 audit(1761888666.232:956): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcbb20d640 a2=0 a3=7ffcbb20d62c items=0 ppid=2153 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:06.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:06.247754 kernel: audit: type=1327 audit(1761888666.232:956): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:06.247847 kernel: audit: type=1325 audit(1761888666.242:957): table=nat:98 family=2 entries=12 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:06.242000 audit[2404]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2404 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:06.242000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcbb20d640 a2=0 a3=0 items=0 ppid=2153 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:06.253555 kernel: audit: type=1300 audit(1761888666.242:957): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcbb20d640 a2=0 a3=0 items=0 ppid=2153 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:06.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:06.257566 kernel: audit: type=1327 audit(1761888666.242:957): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:07.090000 audit[2408]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:07.097227 kernel: audit: type=1325 audit(1761888667.090:958): table=filter:99 family=2 entries=21 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:07.099891 kernel: audit: type=1300 audit(1761888667.090:958): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd09db8a50 a2=0 a3=7ffd09db8a3c items=0 ppid=2153 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.090000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd09db8a50 a2=0 a3=7ffd09db8a3c items=0 ppid=2153 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.090000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:07.104325 kernel: audit: type=1327 audit(1761888667.090:958): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:07.105000 audit[2408]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:07.105000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd09db8a50 a2=0 a3=0 items=0 ppid=2153 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.108692 kernel: audit: type=1325 audit(1761888667.105:959): table=nat:100 family=2 entries=12 op=nft_register_rule pid=2408 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:07.105000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:07.151052 systemd[1]: Created slice kubepods-besteffort-podedb1ea6b_4412_41b1_9c5f_171d61c074f4.slice. Oct 31 05:31:07.161015 kubelet[2011]: I1031 05:31:07.160933 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/edb1ea6b-4412-41b1-9c5f-171d61c074f4-typha-certs\") pod \"calico-typha-7b99647bc4-tb5vg\" (UID: \"edb1ea6b-4412-41b1-9c5f-171d61c074f4\") " pod="calico-system/calico-typha-7b99647bc4-tb5vg" Oct 31 05:31:07.161571 kubelet[2011]: I1031 05:31:07.161021 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/edb1ea6b-4412-41b1-9c5f-171d61c074f4-tigera-ca-bundle\") pod \"calico-typha-7b99647bc4-tb5vg\" (UID: \"edb1ea6b-4412-41b1-9c5f-171d61c074f4\") " pod="calico-system/calico-typha-7b99647bc4-tb5vg" Oct 31 05:31:07.161571 kubelet[2011]: I1031 05:31:07.161053 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-frbc4\" (UniqueName: \"kubernetes.io/projected/edb1ea6b-4412-41b1-9c5f-171d61c074f4-kube-api-access-frbc4\") pod \"calico-typha-7b99647bc4-tb5vg\" (UID: \"edb1ea6b-4412-41b1-9c5f-171d61c074f4\") " pod="calico-system/calico-typha-7b99647bc4-tb5vg" Oct 31 05:31:07.360697 systemd[1]: Created slice kubepods-besteffort-pod4fc53c33_e45b_4d5c_811f_65d17229fd35.slice. Oct 31 05:31:07.460337 env[1194]: time="2025-10-31T05:31:07.458911006Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7b99647bc4-tb5vg,Uid:edb1ea6b-4412-41b1-9c5f-171d61c074f4,Namespace:calico-system,Attempt:0,}" Oct 31 05:31:07.463333 kubelet[2011]: I1031 05:31:07.463299 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fz6z2\" (UniqueName: \"kubernetes.io/projected/4fc53c33-e45b-4d5c-811f-65d17229fd35-kube-api-access-fz6z2\") pod \"calico-node-7mggq\" (UID: \"4fc53c33-e45b-4d5c-811f-65d17229fd35\") " pod="calico-system/calico-node-7mggq" Oct 31 05:31:07.463333 kubelet[2011]: I1031 05:31:07.463338 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4fc53c33-e45b-4d5c-811f-65d17229fd35-var-lib-calico\") pod \"calico-node-7mggq\" (UID: \"4fc53c33-e45b-4d5c-811f-65d17229fd35\") " pod="calico-system/calico-node-7mggq" Oct 31 05:31:07.463560 kubelet[2011]: I1031 05:31:07.463359 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4fc53c33-e45b-4d5c-811f-65d17229fd35-cni-bin-dir\") pod \"calico-node-7mggq\" (UID: \"4fc53c33-e45b-4d5c-811f-65d17229fd35\") " pod="calico-system/calico-node-7mggq" Oct 31 05:31:07.463560 kubelet[2011]: I1031 05:31:07.463376 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4fc53c33-e45b-4d5c-811f-65d17229fd35-cni-net-dir\") pod \"calico-node-7mggq\" (UID: \"4fc53c33-e45b-4d5c-811f-65d17229fd35\") " pod="calico-system/calico-node-7mggq" Oct 31 05:31:07.463560 kubelet[2011]: I1031 05:31:07.463469 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4fc53c33-e45b-4d5c-811f-65d17229fd35-var-run-calico\") pod \"calico-node-7mggq\" (UID: \"4fc53c33-e45b-4d5c-811f-65d17229fd35\") " pod="calico-system/calico-node-7mggq" Oct 31 05:31:07.463560 kubelet[2011]: I1031 05:31:07.463496 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4fc53c33-e45b-4d5c-811f-65d17229fd35-policysync\") pod \"calico-node-7mggq\" (UID: \"4fc53c33-e45b-4d5c-811f-65d17229fd35\") " pod="calico-system/calico-node-7mggq" Oct 31 05:31:07.463560 kubelet[2011]: I1031 05:31:07.463530 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4fc53c33-e45b-4d5c-811f-65d17229fd35-xtables-lock\") pod \"calico-node-7mggq\" (UID: \"4fc53c33-e45b-4d5c-811f-65d17229fd35\") " pod="calico-system/calico-node-7mggq" Oct 31 05:31:07.463741 kubelet[2011]: I1031 05:31:07.463548 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4fc53c33-e45b-4d5c-811f-65d17229fd35-flexvol-driver-host\") pod \"calico-node-7mggq\" (UID: \"4fc53c33-e45b-4d5c-811f-65d17229fd35\") " pod="calico-system/calico-node-7mggq" Oct 31 05:31:07.463741 kubelet[2011]: I1031 05:31:07.463565 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4fc53c33-e45b-4d5c-811f-65d17229fd35-node-certs\") pod \"calico-node-7mggq\" (UID: \"4fc53c33-e45b-4d5c-811f-65d17229fd35\") " pod="calico-system/calico-node-7mggq" Oct 31 05:31:07.463741 kubelet[2011]: I1031 05:31:07.463583 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4fc53c33-e45b-4d5c-811f-65d17229fd35-tigera-ca-bundle\") pod \"calico-node-7mggq\" (UID: \"4fc53c33-e45b-4d5c-811f-65d17229fd35\") " pod="calico-system/calico-node-7mggq" Oct 31 05:31:07.463741 kubelet[2011]: I1031 05:31:07.463611 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4fc53c33-e45b-4d5c-811f-65d17229fd35-cni-log-dir\") pod \"calico-node-7mggq\" (UID: \"4fc53c33-e45b-4d5c-811f-65d17229fd35\") " pod="calico-system/calico-node-7mggq" Oct 31 05:31:07.463741 kubelet[2011]: I1031 05:31:07.463627 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4fc53c33-e45b-4d5c-811f-65d17229fd35-lib-modules\") pod \"calico-node-7mggq\" (UID: \"4fc53c33-e45b-4d5c-811f-65d17229fd35\") " pod="calico-system/calico-node-7mggq" Oct 31 05:31:07.480723 env[1194]: time="2025-10-31T05:31:07.480572497Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:31:07.480723 env[1194]: time="2025-10-31T05:31:07.480661226Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:31:07.480723 env[1194]: time="2025-10-31T05:31:07.480676133Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:31:07.481339 env[1194]: time="2025-10-31T05:31:07.481292018Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a92f9e80a0034521251f8370e220e927373c23a973238de4741d114a0c08b776 pid=2418 runtime=io.containerd.runc.v2 Oct 31 05:31:07.517746 systemd[1]: Started cri-containerd-a92f9e80a0034521251f8370e220e927373c23a973238de4741d114a0c08b776.scope. Oct 31 05:31:07.570375 kubelet[2011]: E1031 05:31:07.570321 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.573019 kubelet[2011]: W1031 05:31:07.572979 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.573286 kubelet[2011]: E1031 05:31:07.573270 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.575635 kubelet[2011]: E1031 05:31:07.575601 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.575815 kubelet[2011]: W1031 05:31:07.575798 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.575929 kubelet[2011]: E1031 05:31:07.575917 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.586027 kubelet[2011]: E1031 05:31:07.585992 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.586226 kubelet[2011]: W1031 05:31:07.586207 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.586310 kubelet[2011]: E1031 05:31:07.586297 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.601628 kubelet[2011]: E1031 05:31:07.601495 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:31:07.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.630000 audit: BPF prog-id=121 op=LOAD Oct 31 05:31:07.631000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.631000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2418 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139326639653830613030333435323132353166383337306532323065 Oct 31 05:31:07.631000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.631000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2418 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139326639653830613030333435323132353166383337306532323065 Oct 31 05:31:07.631000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.631000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.631000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.631000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.631000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.631000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.631000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.631000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.631000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.631000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.631000 audit: BPF prog-id=122 op=LOAD Oct 31 05:31:07.631000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ae190 items=0 ppid=2418 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139326639653830613030333435323132353166383337306532323065 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit: BPF prog-id=123 op=LOAD Oct 31 05:31:07.632000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ae1d8 items=0 ppid=2418 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139326639653830613030333435323132353166383337306532323065 Oct 31 05:31:07.632000 audit: BPF prog-id=123 op=UNLOAD Oct 31 05:31:07.632000 audit: BPF prog-id=122 op=UNLOAD Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { perfmon } for pid=2430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit[2430]: AVC avc: denied { bpf } for pid=2430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.632000 audit: BPF prog-id=124 op=LOAD Oct 31 05:31:07.632000 audit[2430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ae5e8 items=0 ppid=2418 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139326639653830613030333435323132353166383337306532323065 Oct 31 05:31:07.652792 kubelet[2011]: E1031 05:31:07.652729 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.652792 kubelet[2011]: W1031 05:31:07.652763 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.652792 kubelet[2011]: E1031 05:31:07.652799 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.653082 kubelet[2011]: E1031 05:31:07.652998 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.653082 kubelet[2011]: W1031 05:31:07.653006 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.653082 kubelet[2011]: E1031 05:31:07.653015 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.653331 kubelet[2011]: E1031 05:31:07.653316 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.653331 kubelet[2011]: W1031 05:31:07.653330 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.653426 kubelet[2011]: E1031 05:31:07.653344 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.653600 kubelet[2011]: E1031 05:31:07.653588 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.653600 kubelet[2011]: W1031 05:31:07.653599 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.653722 kubelet[2011]: E1031 05:31:07.653641 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.653861 kubelet[2011]: E1031 05:31:07.653850 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.653861 kubelet[2011]: W1031 05:31:07.653861 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.654023 kubelet[2011]: E1031 05:31:07.653877 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.654097 kubelet[2011]: E1031 05:31:07.654078 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.654097 kubelet[2011]: W1031 05:31:07.654096 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.654226 kubelet[2011]: E1031 05:31:07.654107 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.654356 kubelet[2011]: E1031 05:31:07.654335 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.654356 kubelet[2011]: W1031 05:31:07.654347 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.654446 kubelet[2011]: E1031 05:31:07.654357 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.654577 kubelet[2011]: E1031 05:31:07.654533 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.654577 kubelet[2011]: W1031 05:31:07.654552 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.654577 kubelet[2011]: E1031 05:31:07.654562 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.654790 kubelet[2011]: E1031 05:31:07.654760 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.654790 kubelet[2011]: W1031 05:31:07.654772 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.654790 kubelet[2011]: E1031 05:31:07.654783 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.655239 kubelet[2011]: E1031 05:31:07.654946 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.655239 kubelet[2011]: W1031 05:31:07.654952 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.655239 kubelet[2011]: E1031 05:31:07.654959 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.656444 kubelet[2011]: E1031 05:31:07.656423 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.656444 kubelet[2011]: W1031 05:31:07.656440 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.656599 kubelet[2011]: E1031 05:31:07.656457 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.656665 kubelet[2011]: E1031 05:31:07.656642 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.656665 kubelet[2011]: W1031 05:31:07.656653 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.656765 kubelet[2011]: E1031 05:31:07.656673 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.656842 kubelet[2011]: E1031 05:31:07.656832 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.656842 kubelet[2011]: W1031 05:31:07.656839 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.656912 kubelet[2011]: E1031 05:31:07.656874 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.657062 kubelet[2011]: E1031 05:31:07.657041 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.657062 kubelet[2011]: W1031 05:31:07.657061 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.657160 kubelet[2011]: E1031 05:31:07.657069 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.657394 kubelet[2011]: E1031 05:31:07.657240 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.657394 kubelet[2011]: W1031 05:31:07.657249 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.657394 kubelet[2011]: E1031 05:31:07.657257 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.657571 kubelet[2011]: E1031 05:31:07.657404 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.657571 kubelet[2011]: W1031 05:31:07.657411 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.657571 kubelet[2011]: E1031 05:31:07.657471 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.658128 kubelet[2011]: E1031 05:31:07.657722 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.658128 kubelet[2011]: W1031 05:31:07.657734 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.658128 kubelet[2011]: E1031 05:31:07.657743 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.658128 kubelet[2011]: E1031 05:31:07.657870 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.658128 kubelet[2011]: W1031 05:31:07.657876 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.658128 kubelet[2011]: E1031 05:31:07.657883 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.658128 kubelet[2011]: E1031 05:31:07.658000 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.658128 kubelet[2011]: W1031 05:31:07.658006 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.658128 kubelet[2011]: E1031 05:31:07.658013 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.658128 kubelet[2011]: E1031 05:31:07.658135 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.658739 kubelet[2011]: W1031 05:31:07.658149 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.658739 kubelet[2011]: E1031 05:31:07.658157 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.664927 env[1194]: time="2025-10-31T05:31:07.664880654Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7mggq,Uid:4fc53c33-e45b-4d5c-811f-65d17229fd35,Namespace:calico-system,Attempt:0,}" Oct 31 05:31:07.665825 kubelet[2011]: E1031 05:31:07.665803 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.665825 kubelet[2011]: W1031 05:31:07.665822 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.665965 kubelet[2011]: E1031 05:31:07.665844 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.665965 kubelet[2011]: I1031 05:31:07.665907 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a36976db-14b7-47fe-acb9-23fcd77c496c-registration-dir\") pod \"csi-node-driver-g8kkv\" (UID: \"a36976db-14b7-47fe-acb9-23fcd77c496c\") " pod="calico-system/csi-node-driver-g8kkv" Oct 31 05:31:07.666878 kubelet[2011]: E1031 05:31:07.666839 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.666878 kubelet[2011]: W1031 05:31:07.666855 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.666878 kubelet[2011]: E1031 05:31:07.666873 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.668685 kubelet[2011]: E1031 05:31:07.668653 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.668769 kubelet[2011]: W1031 05:31:07.668694 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.668769 kubelet[2011]: E1031 05:31:07.668708 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.668876 kubelet[2011]: I1031 05:31:07.667509 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a36976db-14b7-47fe-acb9-23fcd77c496c-kubelet-dir\") pod \"csi-node-driver-g8kkv\" (UID: \"a36976db-14b7-47fe-acb9-23fcd77c496c\") " pod="calico-system/csi-node-driver-g8kkv" Oct 31 05:31:07.670314 kubelet[2011]: E1031 05:31:07.670296 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.670314 kubelet[2011]: W1031 05:31:07.670312 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.670421 kubelet[2011]: E1031 05:31:07.670325 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.670720 kubelet[2011]: E1031 05:31:07.670705 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.670720 kubelet[2011]: W1031 05:31:07.670719 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.670817 kubelet[2011]: E1031 05:31:07.670762 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.675139 kubelet[2011]: E1031 05:31:07.672586 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.675139 kubelet[2011]: W1031 05:31:07.672604 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.675139 kubelet[2011]: E1031 05:31:07.672625 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.675139 kubelet[2011]: E1031 05:31:07.672982 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.675139 kubelet[2011]: W1031 05:31:07.672991 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.675139 kubelet[2011]: E1031 05:31:07.673002 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.675139 kubelet[2011]: I1031 05:31:07.673023 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a36976db-14b7-47fe-acb9-23fcd77c496c-socket-dir\") pod \"csi-node-driver-g8kkv\" (UID: \"a36976db-14b7-47fe-acb9-23fcd77c496c\") " pod="calico-system/csi-node-driver-g8kkv" Oct 31 05:31:07.675139 kubelet[2011]: E1031 05:31:07.673217 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.675139 kubelet[2011]: W1031 05:31:07.673225 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.675815 kubelet[2011]: E1031 05:31:07.673233 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.675815 kubelet[2011]: I1031 05:31:07.673251 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a36976db-14b7-47fe-acb9-23fcd77c496c-varrun\") pod \"csi-node-driver-g8kkv\" (UID: \"a36976db-14b7-47fe-acb9-23fcd77c496c\") " pod="calico-system/csi-node-driver-g8kkv" Oct 31 05:31:07.675815 kubelet[2011]: E1031 05:31:07.673439 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.675815 kubelet[2011]: W1031 05:31:07.673446 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.675815 kubelet[2011]: E1031 05:31:07.673454 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.675815 kubelet[2011]: I1031 05:31:07.673476 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mz8pd\" (UniqueName: \"kubernetes.io/projected/a36976db-14b7-47fe-acb9-23fcd77c496c-kube-api-access-mz8pd\") pod \"csi-node-driver-g8kkv\" (UID: \"a36976db-14b7-47fe-acb9-23fcd77c496c\") " pod="calico-system/csi-node-driver-g8kkv" Oct 31 05:31:07.675815 kubelet[2011]: E1031 05:31:07.673686 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.675815 kubelet[2011]: W1031 05:31:07.673694 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.676080 kubelet[2011]: E1031 05:31:07.673703 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.676080 kubelet[2011]: E1031 05:31:07.673901 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.676080 kubelet[2011]: W1031 05:31:07.673908 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.676080 kubelet[2011]: E1031 05:31:07.673916 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.676080 kubelet[2011]: E1031 05:31:07.674126 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.676080 kubelet[2011]: W1031 05:31:07.674134 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.676080 kubelet[2011]: E1031 05:31:07.674143 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.676080 kubelet[2011]: E1031 05:31:07.674325 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.676080 kubelet[2011]: W1031 05:31:07.674333 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.676080 kubelet[2011]: E1031 05:31:07.674340 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.676391 kubelet[2011]: E1031 05:31:07.674503 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.676391 kubelet[2011]: W1031 05:31:07.674510 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.676391 kubelet[2011]: E1031 05:31:07.674535 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.676391 kubelet[2011]: E1031 05:31:07.674683 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.676391 kubelet[2011]: W1031 05:31:07.674690 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.676391 kubelet[2011]: E1031 05:31:07.674698 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.684557 env[1194]: time="2025-10-31T05:31:07.683880866Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:31:07.684557 env[1194]: time="2025-10-31T05:31:07.683946365Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:31:07.684557 env[1194]: time="2025-10-31T05:31:07.683957737Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:31:07.684557 env[1194]: time="2025-10-31T05:31:07.684157548Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/95ab4fec0ec5fe238a9ebcb6aa1616531f813f8d7e5c2f0fb25aa41b9b4836b5 pid=2493 runtime=io.containerd.runc.v2 Oct 31 05:31:07.707637 env[1194]: time="2025-10-31T05:31:07.707585893Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7b99647bc4-tb5vg,Uid:edb1ea6b-4412-41b1-9c5f-171d61c074f4,Namespace:calico-system,Attempt:0,} returns sandbox id \"a92f9e80a0034521251f8370e220e927373c23a973238de4741d114a0c08b776\"" Oct 31 05:31:07.709753 env[1194]: time="2025-10-31T05:31:07.709708655Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\"" Oct 31 05:31:07.731867 systemd[1]: Started cri-containerd-95ab4fec0ec5fe238a9ebcb6aa1616531f813f8d7e5c2f0fb25aa41b9b4836b5.scope. Oct 31 05:31:07.775150 kubelet[2011]: E1031 05:31:07.775093 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.775150 kubelet[2011]: W1031 05:31:07.775121 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.775150 kubelet[2011]: E1031 05:31:07.775151 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.775586 kubelet[2011]: E1031 05:31:07.775482 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.775586 kubelet[2011]: W1031 05:31:07.775492 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.775586 kubelet[2011]: E1031 05:31:07.775505 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.775748 kubelet[2011]: E1031 05:31:07.775734 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.775748 kubelet[2011]: W1031 05:31:07.775746 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.775835 kubelet[2011]: E1031 05:31:07.775763 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.776013 kubelet[2011]: E1031 05:31:07.775971 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.776013 kubelet[2011]: W1031 05:31:07.775982 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.776013 kubelet[2011]: E1031 05:31:07.775991 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.776223 kubelet[2011]: E1031 05:31:07.776210 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.776223 kubelet[2011]: W1031 05:31:07.776222 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.776312 kubelet[2011]: E1031 05:31:07.776243 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.776500 kubelet[2011]: E1031 05:31:07.776449 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.776500 kubelet[2011]: W1031 05:31:07.776463 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.776500 kubelet[2011]: E1031 05:31:07.776478 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.776845 kubelet[2011]: E1031 05:31:07.776822 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.776845 kubelet[2011]: W1031 05:31:07.776844 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.776975 kubelet[2011]: E1031 05:31:07.776857 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.777067 kubelet[2011]: E1031 05:31:07.777054 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.777067 kubelet[2011]: W1031 05:31:07.777066 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.777145 kubelet[2011]: E1031 05:31:07.777074 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.779655 kubelet[2011]: E1031 05:31:07.779618 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.779655 kubelet[2011]: W1031 05:31:07.779642 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.779655 kubelet[2011]: E1031 05:31:07.779673 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.779934 kubelet[2011]: E1031 05:31:07.779916 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.779934 kubelet[2011]: W1031 05:31:07.779923 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.779934 kubelet[2011]: E1031 05:31:07.779932 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.780153 kubelet[2011]: E1031 05:31:07.780137 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.780153 kubelet[2011]: W1031 05:31:07.780149 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.780238 kubelet[2011]: E1031 05:31:07.780164 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.780356 kubelet[2011]: E1031 05:31:07.780343 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.780356 kubelet[2011]: W1031 05:31:07.780354 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.780437 kubelet[2011]: E1031 05:31:07.780364 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.780589 kubelet[2011]: E1031 05:31:07.780577 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.780589 kubelet[2011]: W1031 05:31:07.780587 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.780722 kubelet[2011]: E1031 05:31:07.780596 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.780783 kubelet[2011]: E1031 05:31:07.780771 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.780783 kubelet[2011]: W1031 05:31:07.780782 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.780865 kubelet[2011]: E1031 05:31:07.780790 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.780960 kubelet[2011]: E1031 05:31:07.780949 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.780960 kubelet[2011]: W1031 05:31:07.780959 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.781043 kubelet[2011]: E1031 05:31:07.780967 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.781228 kubelet[2011]: E1031 05:31:07.781205 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.781228 kubelet[2011]: W1031 05:31:07.781228 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.781342 kubelet[2011]: E1031 05:31:07.781243 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.781566 kubelet[2011]: E1031 05:31:07.781417 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.781566 kubelet[2011]: W1031 05:31:07.781428 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.781566 kubelet[2011]: E1031 05:31:07.781435 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.781743 kubelet[2011]: E1031 05:31:07.781691 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.781743 kubelet[2011]: W1031 05:31:07.781704 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.781743 kubelet[2011]: E1031 05:31:07.781713 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.781969 kubelet[2011]: E1031 05:31:07.781940 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.781969 kubelet[2011]: W1031 05:31:07.781947 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.781969 kubelet[2011]: E1031 05:31:07.781954 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.782165 kubelet[2011]: E1031 05:31:07.782143 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.782165 kubelet[2011]: W1031 05:31:07.782154 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.782165 kubelet[2011]: E1031 05:31:07.782162 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.782550 kubelet[2011]: E1031 05:31:07.782334 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.782550 kubelet[2011]: W1031 05:31:07.782344 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.782550 kubelet[2011]: E1031 05:31:07.782351 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.782550 kubelet[2011]: E1031 05:31:07.782548 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.782550 kubelet[2011]: W1031 05:31:07.782555 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.782770 kubelet[2011]: E1031 05:31:07.782563 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.782770 kubelet[2011]: E1031 05:31:07.782748 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.782770 kubelet[2011]: W1031 05:31:07.782756 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.782770 kubelet[2011]: E1031 05:31:07.782764 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.783604 kubelet[2011]: E1031 05:31:07.782921 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.783604 kubelet[2011]: W1031 05:31:07.782931 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.783604 kubelet[2011]: E1031 05:31:07.782939 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.783604 kubelet[2011]: E1031 05:31:07.783117 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.783604 kubelet[2011]: W1031 05:31:07.783124 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.783604 kubelet[2011]: E1031 05:31:07.783131 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.810553 kubelet[2011]: E1031 05:31:07.809774 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:07.810553 kubelet[2011]: W1031 05:31:07.809804 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:07.810553 kubelet[2011]: E1031 05:31:07.809830 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:07.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.814000 audit: BPF prog-id=125 op=LOAD Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2493 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616234666563306563356665323338613965626362366161313631 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2493 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616234666563306563356665323338613965626362366161313631 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit: BPF prog-id=126 op=LOAD Oct 31 05:31:07.815000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002154b0 items=0 ppid=2493 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616234666563306563356665323338613965626362366161313631 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit: BPF prog-id=127 op=LOAD Oct 31 05:31:07.815000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002154f8 items=0 ppid=2493 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616234666563306563356665323338613965626362366161313631 Oct 31 05:31:07.815000 audit: BPF prog-id=127 op=UNLOAD Oct 31 05:31:07.815000 audit: BPF prog-id=126 op=UNLOAD Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:07.815000 audit: BPF prog-id=128 op=LOAD Oct 31 05:31:07.815000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000215908 items=0 ppid=2493 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:07.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935616234666563306563356665323338613965626362366161313631 Oct 31 05:31:07.845483 env[1194]: time="2025-10-31T05:31:07.845366405Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7mggq,Uid:4fc53c33-e45b-4d5c-811f-65d17229fd35,Namespace:calico-system,Attempt:0,} returns sandbox id \"95ab4fec0ec5fe238a9ebcb6aa1616531f813f8d7e5c2f0fb25aa41b9b4836b5\"" Oct 31 05:31:08.123000 audit[2559]: NETFILTER_CFG table=filter:101 family=2 entries=22 op=nft_register_rule pid=2559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:08.123000 audit[2559]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fffe978d950 a2=0 a3=7fffe978d93c items=0 ppid=2153 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:08.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:08.127000 audit[2559]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=2559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:08.127000 audit[2559]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffe978d950 a2=0 a3=0 items=0 ppid=2153 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:08.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:08.283245 systemd[1]: run-containerd-runc-k8s.io-a92f9e80a0034521251f8370e220e927373c23a973238de4741d114a0c08b776-runc.0rbkXE.mount: Deactivated successfully. Oct 31 05:31:09.123863 kubelet[2011]: E1031 05:31:09.123783 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:31:09.224280 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount846360983.mount: Deactivated successfully. Oct 31 05:31:10.735986 env[1194]: time="2025-10-31T05:31:10.735854311Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:10.738209 env[1194]: time="2025-10-31T05:31:10.738148397Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:10.740364 env[1194]: time="2025-10-31T05:31:10.740323417Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:10.744216 env[1194]: time="2025-10-31T05:31:10.744188029Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:6f437220b5b3c627fb4a0fc8dc323363101f3c22a8f337612c2a1ddfb73b810c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:10.746058 env[1194]: time="2025-10-31T05:31:10.745996423Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\" returns image reference \"sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958\"" Oct 31 05:31:10.751478 env[1194]: time="2025-10-31T05:31:10.751450094Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 31 05:31:10.776292 env[1194]: time="2025-10-31T05:31:10.776186214Z" level=info msg="CreateContainer within sandbox \"a92f9e80a0034521251f8370e220e927373c23a973238de4741d114a0c08b776\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 31 05:31:10.794320 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1105850474.mount: Deactivated successfully. Oct 31 05:31:10.814695 env[1194]: time="2025-10-31T05:31:10.814592025Z" level=info msg="CreateContainer within sandbox \"a92f9e80a0034521251f8370e220e927373c23a973238de4741d114a0c08b776\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"4102c96848eb5aa357b1caad539c8b905a942b7a6306041be3dc6fecfa2de1d0\"" Oct 31 05:31:10.815458 env[1194]: time="2025-10-31T05:31:10.815412917Z" level=info msg="StartContainer for \"4102c96848eb5aa357b1caad539c8b905a942b7a6306041be3dc6fecfa2de1d0\"" Oct 31 05:31:10.858625 systemd[1]: Started cri-containerd-4102c96848eb5aa357b1caad539c8b905a942b7a6306041be3dc6fecfa2de1d0.scope. Oct 31 05:31:10.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.886000 audit: BPF prog-id=129 op=LOAD Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2418 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:10.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431303263393638343865623561613335376231636161643533396338 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2418 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:10.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431303263393638343865623561613335376231636161643533396338 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit: BPF prog-id=130 op=LOAD Oct 31 05:31:10.887000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000242730 items=0 ppid=2418 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:10.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431303263393638343865623561613335376231636161643533396338 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit: BPF prog-id=131 op=LOAD Oct 31 05:31:10.887000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000242778 items=0 ppid=2418 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:10.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431303263393638343865623561613335376231636161643533396338 Oct 31 05:31:10.887000 audit: BPF prog-id=131 op=UNLOAD Oct 31 05:31:10.887000 audit: BPF prog-id=130 op=UNLOAD Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:10.887000 audit: BPF prog-id=132 op=LOAD Oct 31 05:31:10.887000 audit[2569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000242b88 items=0 ppid=2418 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:10.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431303263393638343865623561613335376231636161643533396338 Oct 31 05:31:10.934217 env[1194]: time="2025-10-31T05:31:10.934164156Z" level=info msg="StartContainer for \"4102c96848eb5aa357b1caad539c8b905a942b7a6306041be3dc6fecfa2de1d0\" returns successfully" Oct 31 05:31:11.124451 kubelet[2011]: E1031 05:31:11.124177 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:31:11.285818 kubelet[2011]: E1031 05:31:11.285751 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.285818 kubelet[2011]: W1031 05:31:11.285812 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.286100 kubelet[2011]: E1031 05:31:11.285867 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.286100 kubelet[2011]: E1031 05:31:11.286099 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.286249 kubelet[2011]: W1031 05:31:11.286107 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.286249 kubelet[2011]: E1031 05:31:11.286123 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.286626 kubelet[2011]: E1031 05:31:11.286281 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.286626 kubelet[2011]: W1031 05:31:11.286291 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.286626 kubelet[2011]: E1031 05:31:11.286298 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.286626 kubelet[2011]: E1031 05:31:11.286621 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.286626 kubelet[2011]: W1031 05:31:11.286629 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.286829 kubelet[2011]: E1031 05:31:11.286639 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.286829 kubelet[2011]: E1031 05:31:11.286812 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.286829 kubelet[2011]: W1031 05:31:11.286818 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.286829 kubelet[2011]: E1031 05:31:11.286826 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.287014 kubelet[2011]: E1031 05:31:11.286998 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.287014 kubelet[2011]: W1031 05:31:11.287009 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.287096 kubelet[2011]: E1031 05:31:11.287017 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.287237 kubelet[2011]: E1031 05:31:11.287224 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.287500 kubelet[2011]: W1031 05:31:11.287236 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.287500 kubelet[2011]: E1031 05:31:11.287251 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.287500 kubelet[2011]: E1031 05:31:11.287412 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.287500 kubelet[2011]: W1031 05:31:11.287418 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.287500 kubelet[2011]: E1031 05:31:11.287426 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.287698 kubelet[2011]: E1031 05:31:11.287608 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.287698 kubelet[2011]: W1031 05:31:11.287616 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.287698 kubelet[2011]: E1031 05:31:11.287623 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.287817 kubelet[2011]: E1031 05:31:11.287805 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.287817 kubelet[2011]: W1031 05:31:11.287813 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.287935 kubelet[2011]: E1031 05:31:11.287821 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.288008 kubelet[2011]: E1031 05:31:11.287985 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.288008 kubelet[2011]: W1031 05:31:11.287991 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.288008 kubelet[2011]: E1031 05:31:11.288002 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.288169 kubelet[2011]: E1031 05:31:11.288156 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.288169 kubelet[2011]: W1031 05:31:11.288166 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.288252 kubelet[2011]: E1031 05:31:11.288173 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.288342 kubelet[2011]: E1031 05:31:11.288331 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.288342 kubelet[2011]: W1031 05:31:11.288340 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.288429 kubelet[2011]: E1031 05:31:11.288348 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.288505 kubelet[2011]: E1031 05:31:11.288494 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.288505 kubelet[2011]: W1031 05:31:11.288503 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.288632 kubelet[2011]: E1031 05:31:11.288510 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.288703 kubelet[2011]: E1031 05:31:11.288690 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.288703 kubelet[2011]: W1031 05:31:11.288701 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.288789 kubelet[2011]: E1031 05:31:11.288709 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.304418 kubelet[2011]: E1031 05:31:11.304370 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.304418 kubelet[2011]: W1031 05:31:11.304404 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.304746 kubelet[2011]: E1031 05:31:11.304436 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.304746 kubelet[2011]: E1031 05:31:11.304693 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.304746 kubelet[2011]: W1031 05:31:11.304701 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.304746 kubelet[2011]: E1031 05:31:11.304720 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.304945 kubelet[2011]: E1031 05:31:11.304922 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.304945 kubelet[2011]: W1031 05:31:11.304942 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.305024 kubelet[2011]: E1031 05:31:11.304955 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.305220 kubelet[2011]: E1031 05:31:11.305199 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.305220 kubelet[2011]: W1031 05:31:11.305211 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.305327 kubelet[2011]: E1031 05:31:11.305222 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.305410 kubelet[2011]: E1031 05:31:11.305398 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.305410 kubelet[2011]: W1031 05:31:11.305409 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.305546 kubelet[2011]: E1031 05:31:11.305417 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.305598 kubelet[2011]: E1031 05:31:11.305580 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.305598 kubelet[2011]: W1031 05:31:11.305587 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.305598 kubelet[2011]: E1031 05:31:11.305595 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.306279 kubelet[2011]: E1031 05:31:11.306254 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.306279 kubelet[2011]: W1031 05:31:11.306272 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.306419 kubelet[2011]: E1031 05:31:11.306286 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.306781 kubelet[2011]: E1031 05:31:11.306765 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.306781 kubelet[2011]: W1031 05:31:11.306779 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.306892 kubelet[2011]: E1031 05:31:11.306790 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.307000 kubelet[2011]: E1031 05:31:11.306987 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.307000 kubelet[2011]: W1031 05:31:11.306998 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.307136 kubelet[2011]: E1031 05:31:11.307006 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.307175 kubelet[2011]: E1031 05:31:11.307163 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.307175 kubelet[2011]: W1031 05:31:11.307170 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.307241 kubelet[2011]: E1031 05:31:11.307178 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.307366 kubelet[2011]: E1031 05:31:11.307353 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.307366 kubelet[2011]: W1031 05:31:11.307364 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.307447 kubelet[2011]: E1031 05:31:11.307372 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.307561 kubelet[2011]: E1031 05:31:11.307548 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.307561 kubelet[2011]: W1031 05:31:11.307559 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.307655 kubelet[2011]: E1031 05:31:11.307567 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.309664 kubelet[2011]: E1031 05:31:11.309634 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.309664 kubelet[2011]: W1031 05:31:11.309654 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.309821 kubelet[2011]: E1031 05:31:11.309674 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.310877 kubelet[2011]: E1031 05:31:11.310857 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.310877 kubelet[2011]: W1031 05:31:11.310873 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.311054 kubelet[2011]: E1031 05:31:11.310887 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.311093 kubelet[2011]: E1031 05:31:11.311080 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.311093 kubelet[2011]: W1031 05:31:11.311087 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.311178 kubelet[2011]: E1031 05:31:11.311095 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.311321 kubelet[2011]: E1031 05:31:11.311307 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.311374 kubelet[2011]: W1031 05:31:11.311321 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.311374 kubelet[2011]: E1031 05:31:11.311331 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.311677 kubelet[2011]: E1031 05:31:11.311658 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.311677 kubelet[2011]: W1031 05:31:11.311671 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.311770 kubelet[2011]: E1031 05:31:11.311682 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:11.311857 kubelet[2011]: E1031 05:31:11.311846 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:11.311857 kubelet[2011]: W1031 05:31:11.311857 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:11.311971 kubelet[2011]: E1031 05:31:11.311865 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.234115 kubelet[2011]: I1031 05:31:12.234071 2011 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 31 05:31:12.297445 kubelet[2011]: E1031 05:31:12.297390 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.297445 kubelet[2011]: W1031 05:31:12.297421 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.297785 kubelet[2011]: E1031 05:31:12.297478 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.298192 kubelet[2011]: E1031 05:31:12.298169 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.298192 kubelet[2011]: W1031 05:31:12.298186 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.298653 kubelet[2011]: E1031 05:31:12.298202 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.298653 kubelet[2011]: E1031 05:31:12.298450 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.298653 kubelet[2011]: W1031 05:31:12.298458 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.298653 kubelet[2011]: E1031 05:31:12.298467 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.298992 kubelet[2011]: E1031 05:31:12.298977 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.298992 kubelet[2011]: W1031 05:31:12.298990 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.299094 kubelet[2011]: E1031 05:31:12.299013 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.299322 kubelet[2011]: E1031 05:31:12.299243 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.299322 kubelet[2011]: W1031 05:31:12.299254 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.299322 kubelet[2011]: E1031 05:31:12.299262 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.299773 kubelet[2011]: E1031 05:31:12.299759 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.299854 kubelet[2011]: W1031 05:31:12.299791 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.299854 kubelet[2011]: E1031 05:31:12.299805 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.300512 kubelet[2011]: E1031 05:31:12.300062 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.300512 kubelet[2011]: W1031 05:31:12.300074 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.300512 kubelet[2011]: E1031 05:31:12.300082 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.300678 kubelet[2011]: E1031 05:31:12.300548 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.300678 kubelet[2011]: W1031 05:31:12.300557 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.300678 kubelet[2011]: E1031 05:31:12.300565 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.301662 kubelet[2011]: E1031 05:31:12.300899 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.301662 kubelet[2011]: W1031 05:31:12.300912 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.301662 kubelet[2011]: E1031 05:31:12.300920 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.302192 kubelet[2011]: E1031 05:31:12.301672 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.302192 kubelet[2011]: W1031 05:31:12.301696 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.302192 kubelet[2011]: E1031 05:31:12.301707 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.302192 kubelet[2011]: E1031 05:31:12.302069 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.302192 kubelet[2011]: W1031 05:31:12.302078 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.302192 kubelet[2011]: E1031 05:31:12.302089 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.303544 kubelet[2011]: E1031 05:31:12.302590 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.303544 kubelet[2011]: W1031 05:31:12.302604 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.303544 kubelet[2011]: E1031 05:31:12.302615 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.303697 kubelet[2011]: E1031 05:31:12.303568 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.303697 kubelet[2011]: W1031 05:31:12.303579 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.303697 kubelet[2011]: E1031 05:31:12.303592 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.304703 kubelet[2011]: E1031 05:31:12.303910 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.304703 kubelet[2011]: W1031 05:31:12.303922 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.304703 kubelet[2011]: E1031 05:31:12.303930 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.304853 kubelet[2011]: E1031 05:31:12.304729 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.304853 kubelet[2011]: W1031 05:31:12.304738 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.304853 kubelet[2011]: E1031 05:31:12.304753 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.314571 kubelet[2011]: E1031 05:31:12.314484 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.314571 kubelet[2011]: W1031 05:31:12.314509 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.314571 kubelet[2011]: E1031 05:31:12.314577 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.315602 kubelet[2011]: E1031 05:31:12.315559 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.315602 kubelet[2011]: W1031 05:31:12.315577 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.315602 kubelet[2011]: E1031 05:31:12.315592 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.316376 kubelet[2011]: E1031 05:31:12.316295 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.316376 kubelet[2011]: W1031 05:31:12.316312 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.316376 kubelet[2011]: E1031 05:31:12.316325 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.317081 kubelet[2011]: E1031 05:31:12.316798 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.317081 kubelet[2011]: W1031 05:31:12.316810 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.317081 kubelet[2011]: E1031 05:31:12.316821 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.317685 env[1194]: time="2025-10-31T05:31:12.317513133Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:12.318465 kubelet[2011]: E1031 05:31:12.317685 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.318465 kubelet[2011]: W1031 05:31:12.317696 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.318465 kubelet[2011]: E1031 05:31:12.317709 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.319872 kubelet[2011]: E1031 05:31:12.319470 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.319872 kubelet[2011]: W1031 05:31:12.319482 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.319872 kubelet[2011]: E1031 05:31:12.319494 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.320235 env[1194]: time="2025-10-31T05:31:12.319793375Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:12.321399 kubelet[2011]: E1031 05:31:12.320628 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.321399 kubelet[2011]: W1031 05:31:12.320643 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.321399 kubelet[2011]: E1031 05:31:12.320655 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.322649 kubelet[2011]: E1031 05:31:12.322602 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.322649 kubelet[2011]: W1031 05:31:12.322637 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.322649 kubelet[2011]: E1031 05:31:12.322650 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.324125 kubelet[2011]: E1031 05:31:12.323824 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.324125 kubelet[2011]: W1031 05:31:12.323866 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.324125 kubelet[2011]: E1031 05:31:12.323893 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.324888 kubelet[2011]: E1031 05:31:12.324591 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.324888 kubelet[2011]: W1031 05:31:12.324607 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.324888 kubelet[2011]: E1031 05:31:12.324620 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.325192 kubelet[2011]: E1031 05:31:12.324903 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.325192 kubelet[2011]: W1031 05:31:12.324912 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.325192 kubelet[2011]: E1031 05:31:12.324921 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.325362 env[1194]: time="2025-10-31T05:31:12.325230174Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:12.326053 kubelet[2011]: E1031 05:31:12.325683 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.326053 kubelet[2011]: W1031 05:31:12.325698 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.326053 kubelet[2011]: E1031 05:31:12.325710 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.326264 kubelet[2011]: E1031 05:31:12.326070 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.326264 kubelet[2011]: W1031 05:31:12.326081 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.326264 kubelet[2011]: E1031 05:31:12.326093 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.326976 kubelet[2011]: E1031 05:31:12.326945 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.326976 kubelet[2011]: W1031 05:31:12.326961 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.326976 kubelet[2011]: E1031 05:31:12.326973 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.327374 kubelet[2011]: E1031 05:31:12.327288 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.327374 kubelet[2011]: W1031 05:31:12.327298 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.327374 kubelet[2011]: E1031 05:31:12.327308 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.327787 kubelet[2011]: E1031 05:31:12.327767 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.327787 kubelet[2011]: W1031 05:31:12.327781 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.327923 kubelet[2011]: E1031 05:31:12.327792 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.328158 env[1194]: time="2025-10-31T05:31:12.328130253Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:12.329580 kubelet[2011]: E1031 05:31:12.328707 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.329580 kubelet[2011]: W1031 05:31:12.328741 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.329580 kubelet[2011]: E1031 05:31:12.328777 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.329580 kubelet[2011]: E1031 05:31:12.329387 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:31:12.329580 kubelet[2011]: W1031 05:31:12.329408 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:31:12.329580 kubelet[2011]: E1031 05:31:12.329424 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:31:12.330018 env[1194]: time="2025-10-31T05:31:12.328762517Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 31 05:31:12.334466 env[1194]: time="2025-10-31T05:31:12.334381803Z" level=info msg="CreateContainer within sandbox \"95ab4fec0ec5fe238a9ebcb6aa1616531f813f8d7e5c2f0fb25aa41b9b4836b5\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 31 05:31:12.363968 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3088366824.mount: Deactivated successfully. Oct 31 05:31:12.365835 env[1194]: time="2025-10-31T05:31:12.365126657Z" level=info msg="CreateContainer within sandbox \"95ab4fec0ec5fe238a9ebcb6aa1616531f813f8d7e5c2f0fb25aa41b9b4836b5\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ef8cee6662ffdb07c79708bd3f07448beb26bdc97ed04d55cacb844793cd1a79\"" Oct 31 05:31:12.368351 env[1194]: time="2025-10-31T05:31:12.366408917Z" level=info msg="StartContainer for \"ef8cee6662ffdb07c79708bd3f07448beb26bdc97ed04d55cacb844793cd1a79\"" Oct 31 05:31:12.410097 systemd[1]: Started cri-containerd-ef8cee6662ffdb07c79708bd3f07448beb26bdc97ed04d55cacb844793cd1a79.scope. Oct 31 05:31:12.432000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.436355 kernel: kauditd_printk_skb: 179 callbacks suppressed Oct 31 05:31:12.436503 kernel: audit: type=1400 audit(1761888672.432:1016): avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.432000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3ed29fc6c8 items=0 ppid=2493 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:12.445872 kernel: audit: type=1300 audit(1761888672.432:1016): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3ed29fc6c8 items=0 ppid=2493 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:12.446089 kernel: audit: type=1327 audit(1761888672.432:1016): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386365653636363266666462303763373937303862643366303734 Oct 31 05:31:12.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386365653636363266666462303763373937303862643366303734 Oct 31 05:31:12.452077 kernel: audit: type=1400 audit(1761888672.437:1017): avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.452190 kernel: audit: type=1400 audit(1761888672.437:1017): avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.437000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.437000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.453411 kernel: audit: type=1400 audit(1761888672.437:1017): avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.437000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.458415 kernel: audit: type=1400 audit(1761888672.437:1017): avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.437000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.459947 kernel: audit: type=1400 audit(1761888672.437:1017): avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.437000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.437000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.473643 kernel: audit: type=1400 audit(1761888672.437:1017): avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.437000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.437000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.437000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.437000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.437000 audit: BPF prog-id=133 op=LOAD Oct 31 05:31:12.437000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002cdbc8 items=0 ppid=2493 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:12.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386365653636363266666462303763373937303862643366303734 Oct 31 05:31:12.439000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.484667 kernel: audit: type=1400 audit(1761888672.437:1017): avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.439000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.439000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.439000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.439000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.439000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.439000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.439000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.439000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.439000 audit: BPF prog-id=134 op=LOAD Oct 31 05:31:12.439000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002cdc18 items=0 ppid=2493 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:12.439000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386365653636363266666462303763373937303862643366303734 Oct 31 05:31:12.453000 audit: BPF prog-id=134 op=UNLOAD Oct 31 05:31:12.453000 audit: BPF prog-id=133 op=UNLOAD Oct 31 05:31:12.453000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.453000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.453000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.453000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.453000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.453000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.453000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.453000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.453000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.453000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:12.453000 audit: BPF prog-id=135 op=LOAD Oct 31 05:31:12.453000 audit[2673]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002cdca8 items=0 ppid=2493 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:12.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386365653636363266666462303763373937303862643366303734 Oct 31 05:31:12.506690 env[1194]: time="2025-10-31T05:31:12.506640046Z" level=info msg="StartContainer for \"ef8cee6662ffdb07c79708bd3f07448beb26bdc97ed04d55cacb844793cd1a79\" returns successfully" Oct 31 05:31:12.529150 systemd[1]: cri-containerd-ef8cee6662ffdb07c79708bd3f07448beb26bdc97ed04d55cacb844793cd1a79.scope: Deactivated successfully. Oct 31 05:31:12.533000 audit: BPF prog-id=135 op=UNLOAD Oct 31 05:31:12.589216 env[1194]: time="2025-10-31T05:31:12.589140408Z" level=info msg="shim disconnected" id=ef8cee6662ffdb07c79708bd3f07448beb26bdc97ed04d55cacb844793cd1a79 Oct 31 05:31:12.589216 env[1194]: time="2025-10-31T05:31:12.589214768Z" level=warning msg="cleaning up after shim disconnected" id=ef8cee6662ffdb07c79708bd3f07448beb26bdc97ed04d55cacb844793cd1a79 namespace=k8s.io Oct 31 05:31:12.589216 env[1194]: time="2025-10-31T05:31:12.589225858Z" level=info msg="cleaning up dead shim" Oct 31 05:31:12.604231 env[1194]: time="2025-10-31T05:31:12.604169909Z" level=warning msg="cleanup warnings time=\"2025-10-31T05:31:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2714 runtime=io.containerd.runc.v2\n" Oct 31 05:31:12.764476 systemd[1]: run-containerd-runc-k8s.io-ef8cee6662ffdb07c79708bd3f07448beb26bdc97ed04d55cacb844793cd1a79-runc.3tYpLr.mount: Deactivated successfully. Oct 31 05:31:12.765016 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ef8cee6662ffdb07c79708bd3f07448beb26bdc97ed04d55cacb844793cd1a79-rootfs.mount: Deactivated successfully. Oct 31 05:31:13.125285 kubelet[2011]: E1031 05:31:13.125119 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:31:13.246552 env[1194]: time="2025-10-31T05:31:13.246448972Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 31 05:31:13.272343 kubelet[2011]: I1031 05:31:13.272144 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7b99647bc4-tb5vg" podStartSLOduration=3.230814258 podStartE2EDuration="6.272021452s" podCreationTimestamp="2025-10-31 05:31:07 +0000 UTC" firstStartedPulling="2025-10-31 05:31:07.709091534 +0000 UTC m=+21.961709792" lastFinishedPulling="2025-10-31 05:31:10.750298708 +0000 UTC m=+25.002916986" observedRunningTime="2025-10-31 05:31:11.256939294 +0000 UTC m=+25.509557554" watchObservedRunningTime="2025-10-31 05:31:13.272021452 +0000 UTC m=+27.524639817" Oct 31 05:31:15.125183 kubelet[2011]: E1031 05:31:15.123807 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:31:17.124630 kubelet[2011]: E1031 05:31:17.124024 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:31:17.990087 env[1194]: time="2025-10-31T05:31:17.989947695Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:17.993416 env[1194]: time="2025-10-31T05:31:17.993336386Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:17.996074 env[1194]: time="2025-10-31T05:31:17.996035114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:18.019353 env[1194]: time="2025-10-31T05:31:18.019311185Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:18.020310 env[1194]: time="2025-10-31T05:31:18.020271031Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 31 05:31:18.028896 env[1194]: time="2025-10-31T05:31:18.028850963Z" level=info msg="CreateContainer within sandbox \"95ab4fec0ec5fe238a9ebcb6aa1616531f813f8d7e5c2f0fb25aa41b9b4836b5\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 31 05:31:18.041918 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1853128301.mount: Deactivated successfully. Oct 31 05:31:18.046143 env[1194]: time="2025-10-31T05:31:18.046082461Z" level=info msg="CreateContainer within sandbox \"95ab4fec0ec5fe238a9ebcb6aa1616531f813f8d7e5c2f0fb25aa41b9b4836b5\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ad8d7f2eab061f6164688ab0e35952d00d3e4e9d38bbcd4854caa13493ef646c\"" Oct 31 05:31:18.048327 env[1194]: time="2025-10-31T05:31:18.048295382Z" level=info msg="StartContainer for \"ad8d7f2eab061f6164688ab0e35952d00d3e4e9d38bbcd4854caa13493ef646c\"" Oct 31 05:31:18.099604 systemd[1]: Started cri-containerd-ad8d7f2eab061f6164688ab0e35952d00d3e4e9d38bbcd4854caa13493ef646c.scope. Oct 31 05:31:18.123377 systemd[1]: run-containerd-runc-k8s.io-ad8d7f2eab061f6164688ab0e35952d00d3e4e9d38bbcd4854caa13493ef646c-runc.PPwAM2.mount: Deactivated successfully. Oct 31 05:31:18.171000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.173668 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 31 05:31:18.173787 kernel: audit: type=1400 audit(1761888678.171:1023): avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.171000 audit[2741]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe314157968 items=0 ppid=2493 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:18.181335 kernel: audit: type=1300 audit(1761888678.171:1023): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe314157968 items=0 ppid=2493 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:18.181829 kernel: audit: type=1327 audit(1761888678.171:1023): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164386437663265616230363166363136343638386162306533353935 Oct 31 05:31:18.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164386437663265616230363166363136343638386162306533353935 Oct 31 05:31:18.185048 kernel: audit: type=1400 audit(1761888678.171:1024): avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.171000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.187870 kernel: audit: type=1400 audit(1761888678.171:1024): avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.171000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.171000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.194183 kernel: audit: type=1400 audit(1761888678.171:1024): avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.194475 kernel: audit: type=1400 audit(1761888678.171:1024): avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.171000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.171000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.202655 kernel: audit: type=1400 audit(1761888678.171:1024): avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.171000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.171000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.209162 kernel: audit: type=1400 audit(1761888678.171:1024): avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.209257 kernel: audit: type=1400 audit(1761888678.171:1024): avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.171000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.171000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.171000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.171000 audit: BPF prog-id=136 op=LOAD Oct 31 05:31:18.171000 audit[2741]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000230938 items=0 ppid=2493 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:18.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164386437663265616230363166363136343638386162306533353935 Oct 31 05:31:18.175000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.175000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.175000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.175000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.175000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.175000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.175000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.175000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.175000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.175000 audit: BPF prog-id=137 op=LOAD Oct 31 05:31:18.175000 audit[2741]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000230988 items=0 ppid=2493 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:18.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164386437663265616230363166363136343638386162306533353935 Oct 31 05:31:18.186000 audit: BPF prog-id=137 op=UNLOAD Oct 31 05:31:18.186000 audit: BPF prog-id=136 op=UNLOAD Oct 31 05:31:18.186000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.186000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.186000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.186000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.186000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.186000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.186000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.186000 audit[2741]: AVC avc: denied { perfmon } for pid=2741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.186000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.186000 audit[2741]: AVC avc: denied { bpf } for pid=2741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:18.186000 audit: BPF prog-id=138 op=LOAD Oct 31 05:31:18.186000 audit[2741]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000230a18 items=0 ppid=2493 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:18.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164386437663265616230363166363136343638386162306533353935 Oct 31 05:31:18.221202 env[1194]: time="2025-10-31T05:31:18.221148495Z" level=info msg="StartContainer for \"ad8d7f2eab061f6164688ab0e35952d00d3e4e9d38bbcd4854caa13493ef646c\" returns successfully" Oct 31 05:31:19.023373 env[1194]: time="2025-10-31T05:31:19.023144535Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 05:31:19.030280 systemd[1]: cri-containerd-ad8d7f2eab061f6164688ab0e35952d00d3e4e9d38bbcd4854caa13493ef646c.scope: Deactivated successfully. Oct 31 05:31:19.033000 audit: BPF prog-id=138 op=UNLOAD Oct 31 05:31:19.068995 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ad8d7f2eab061f6164688ab0e35952d00d3e4e9d38bbcd4854caa13493ef646c-rootfs.mount: Deactivated successfully. Oct 31 05:31:19.083794 env[1194]: time="2025-10-31T05:31:19.083727092Z" level=info msg="shim disconnected" id=ad8d7f2eab061f6164688ab0e35952d00d3e4e9d38bbcd4854caa13493ef646c Oct 31 05:31:19.084483 env[1194]: time="2025-10-31T05:31:19.084456851Z" level=warning msg="cleaning up after shim disconnected" id=ad8d7f2eab061f6164688ab0e35952d00d3e4e9d38bbcd4854caa13493ef646c namespace=k8s.io Oct 31 05:31:19.085117 kubelet[2011]: I1031 05:31:19.081651 2011 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Oct 31 05:31:19.085764 env[1194]: time="2025-10-31T05:31:19.085740875Z" level=info msg="cleaning up dead shim" Oct 31 05:31:19.104350 env[1194]: time="2025-10-31T05:31:19.104290117Z" level=warning msg="cleanup warnings time=\"2025-10-31T05:31:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2781 runtime=io.containerd.runc.v2\n" Oct 31 05:31:19.180107 systemd[1]: Created slice kubepods-besteffort-poda36976db_14b7_47fe_acb9_23fcd77c496c.slice. Oct 31 05:31:19.201835 kubelet[2011]: I1031 05:31:19.201718 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xdbnc\" (UniqueName: \"kubernetes.io/projected/66fd0aa1-ee8d-4f3e-828b-4549c47b74e9-kube-api-access-xdbnc\") pod \"calico-kube-controllers-774b8c5f49-wcstd\" (UID: \"66fd0aa1-ee8d-4f3e-828b-4549c47b74e9\") " pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" Oct 31 05:31:19.201835 kubelet[2011]: I1031 05:31:19.201768 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/488d3938-e6f8-42e4-a891-26530154283f-config-volume\") pod \"coredns-674b8bbfcf-gtt8c\" (UID: \"488d3938-e6f8-42e4-a891-26530154283f\") " pod="kube-system/coredns-674b8bbfcf-gtt8c" Oct 31 05:31:19.201835 kubelet[2011]: I1031 05:31:19.201791 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/66fd0aa1-ee8d-4f3e-828b-4549c47b74e9-tigera-ca-bundle\") pod \"calico-kube-controllers-774b8c5f49-wcstd\" (UID: \"66fd0aa1-ee8d-4f3e-828b-4549c47b74e9\") " pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" Oct 31 05:31:19.201835 kubelet[2011]: I1031 05:31:19.201810 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p5fwc\" (UniqueName: \"kubernetes.io/projected/092be9e0-94a3-4b5b-a357-28d27ef577b0-kube-api-access-p5fwc\") pod \"coredns-674b8bbfcf-qktmx\" (UID: \"092be9e0-94a3-4b5b-a357-28d27ef577b0\") " pod="kube-system/coredns-674b8bbfcf-qktmx" Oct 31 05:31:19.201835 kubelet[2011]: I1031 05:31:19.201843 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/092be9e0-94a3-4b5b-a357-28d27ef577b0-config-volume\") pod \"coredns-674b8bbfcf-qktmx\" (UID: \"092be9e0-94a3-4b5b-a357-28d27ef577b0\") " pod="kube-system/coredns-674b8bbfcf-qktmx" Oct 31 05:31:19.202178 kubelet[2011]: I1031 05:31:19.201864 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vgd9p\" (UniqueName: \"kubernetes.io/projected/488d3938-e6f8-42e4-a891-26530154283f-kube-api-access-vgd9p\") pod \"coredns-674b8bbfcf-gtt8c\" (UID: \"488d3938-e6f8-42e4-a891-26530154283f\") " pod="kube-system/coredns-674b8bbfcf-gtt8c" Oct 31 05:31:19.219358 env[1194]: time="2025-10-31T05:31:19.218613608Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-g8kkv,Uid:a36976db-14b7-47fe-acb9-23fcd77c496c,Namespace:calico-system,Attempt:0,}" Oct 31 05:31:19.227636 systemd[1]: Created slice kubepods-burstable-pod488d3938_e6f8_42e4_a891_26530154283f.slice. Oct 31 05:31:19.234436 systemd[1]: Created slice kubepods-burstable-pod092be9e0_94a3_4b5b_a357_28d27ef577b0.slice. Oct 31 05:31:19.255100 systemd[1]: Created slice kubepods-besteffort-pod66fd0aa1_ee8d_4f3e_828b_4549c47b74e9.slice. Oct 31 05:31:19.260864 systemd[1]: Created slice kubepods-besteffort-pod3f5cfb6f_a85d_4a3b_992b_bbe85e888122.slice. Oct 31 05:31:19.278743 systemd[1]: Created slice kubepods-besteffort-podd4b61754_f1af_4f1e_adb6_2e6093fbe9da.slice. Oct 31 05:31:19.284293 env[1194]: time="2025-10-31T05:31:19.284011680Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 31 05:31:19.295357 systemd[1]: Created slice kubepods-besteffort-podefc77054_b6cb_470d_b188_31acbe754356.slice. Oct 31 05:31:19.302495 kubelet[2011]: I1031 05:31:19.302105 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6w4x2\" (UniqueName: \"kubernetes.io/projected/3f5cfb6f-a85d-4a3b-992b-bbe85e888122-kube-api-access-6w4x2\") pod \"whisker-5546b7f78c-lk27p\" (UID: \"3f5cfb6f-a85d-4a3b-992b-bbe85e888122\") " pod="calico-system/whisker-5546b7f78c-lk27p" Oct 31 05:31:19.302495 kubelet[2011]: I1031 05:31:19.302142 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xd6jg\" (UniqueName: \"kubernetes.io/projected/efc77054-b6cb-470d-b188-31acbe754356-kube-api-access-xd6jg\") pod \"calico-apiserver-584f6f7c67-lh668\" (UID: \"efc77054-b6cb-470d-b188-31acbe754356\") " pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" Oct 31 05:31:19.302495 kubelet[2011]: I1031 05:31:19.302170 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/4169be37-9b82-4526-bd73-17cdc3a8253e-config\") pod \"goldmane-666569f655-tpvj9\" (UID: \"4169be37-9b82-4526-bd73-17cdc3a8253e\") " pod="calico-system/goldmane-666569f655-tpvj9" Oct 31 05:31:19.302495 kubelet[2011]: I1031 05:31:19.302191 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/4169be37-9b82-4526-bd73-17cdc3a8253e-goldmane-key-pair\") pod \"goldmane-666569f655-tpvj9\" (UID: \"4169be37-9b82-4526-bd73-17cdc3a8253e\") " pod="calico-system/goldmane-666569f655-tpvj9" Oct 31 05:31:19.302495 kubelet[2011]: I1031 05:31:19.302252 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2cqm5\" (UniqueName: \"kubernetes.io/projected/4169be37-9b82-4526-bd73-17cdc3a8253e-kube-api-access-2cqm5\") pod \"goldmane-666569f655-tpvj9\" (UID: \"4169be37-9b82-4526-bd73-17cdc3a8253e\") " pod="calico-system/goldmane-666569f655-tpvj9" Oct 31 05:31:19.302845 kubelet[2011]: I1031 05:31:19.302274 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g5zkf\" (UniqueName: \"kubernetes.io/projected/d4b61754-f1af-4f1e-adb6-2e6093fbe9da-kube-api-access-g5zkf\") pod \"calico-apiserver-544d56dcbc-g5g87\" (UID: \"d4b61754-f1af-4f1e-adb6-2e6093fbe9da\") " pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" Oct 31 05:31:19.302845 kubelet[2011]: I1031 05:31:19.302292 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/3f5cfb6f-a85d-4a3b-992b-bbe85e888122-whisker-backend-key-pair\") pod \"whisker-5546b7f78c-lk27p\" (UID: \"3f5cfb6f-a85d-4a3b-992b-bbe85e888122\") " pod="calico-system/whisker-5546b7f78c-lk27p" Oct 31 05:31:19.302845 kubelet[2011]: I1031 05:31:19.302332 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fft4d\" (UniqueName: \"kubernetes.io/projected/844e14a9-59ae-4490-8511-4b0d9cac9971-kube-api-access-fft4d\") pod \"calico-apiserver-544d56dcbc-xpjhh\" (UID: \"844e14a9-59ae-4490-8511-4b0d9cac9971\") " pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" Oct 31 05:31:19.302845 kubelet[2011]: I1031 05:31:19.302349 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/efc77054-b6cb-470d-b188-31acbe754356-calico-apiserver-certs\") pod \"calico-apiserver-584f6f7c67-lh668\" (UID: \"efc77054-b6cb-470d-b188-31acbe754356\") " pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" Oct 31 05:31:19.302845 kubelet[2011]: I1031 05:31:19.302440 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4169be37-9b82-4526-bd73-17cdc3a8253e-goldmane-ca-bundle\") pod \"goldmane-666569f655-tpvj9\" (UID: \"4169be37-9b82-4526-bd73-17cdc3a8253e\") " pod="calico-system/goldmane-666569f655-tpvj9" Oct 31 05:31:19.303022 kubelet[2011]: I1031 05:31:19.302460 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3f5cfb6f-a85d-4a3b-992b-bbe85e888122-whisker-ca-bundle\") pod \"whisker-5546b7f78c-lk27p\" (UID: \"3f5cfb6f-a85d-4a3b-992b-bbe85e888122\") " pod="calico-system/whisker-5546b7f78c-lk27p" Oct 31 05:31:19.303022 kubelet[2011]: I1031 05:31:19.302665 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d4b61754-f1af-4f1e-adb6-2e6093fbe9da-calico-apiserver-certs\") pod \"calico-apiserver-544d56dcbc-g5g87\" (UID: \"d4b61754-f1af-4f1e-adb6-2e6093fbe9da\") " pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" Oct 31 05:31:19.303022 kubelet[2011]: I1031 05:31:19.302691 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/844e14a9-59ae-4490-8511-4b0d9cac9971-calico-apiserver-certs\") pod \"calico-apiserver-544d56dcbc-xpjhh\" (UID: \"844e14a9-59ae-4490-8511-4b0d9cac9971\") " pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" Oct 31 05:31:19.304261 systemd[1]: Created slice kubepods-besteffort-pod4169be37_9b82_4526_bd73_17cdc3a8253e.slice. Oct 31 05:31:19.318858 systemd[1]: Created slice kubepods-besteffort-pod844e14a9_59ae_4490_8511_4b0d9cac9971.slice. Oct 31 05:31:19.527442 env[1194]: time="2025-10-31T05:31:19.527335918Z" level=error msg="Failed to destroy network for sandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.528165 env[1194]: time="2025-10-31T05:31:19.528126826Z" level=error msg="encountered an error cleaning up failed sandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.528344 env[1194]: time="2025-10-31T05:31:19.528309501Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-g8kkv,Uid:a36976db-14b7-47fe-acb9-23fcd77c496c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.532543 kubelet[2011]: E1031 05:31:19.532370 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.536895 kubelet[2011]: E1031 05:31:19.536836 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-g8kkv" Oct 31 05:31:19.537122 kubelet[2011]: E1031 05:31:19.537099 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-g8kkv" Oct 31 05:31:19.537354 kubelet[2011]: E1031 05:31:19.537301 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-g8kkv_calico-system(a36976db-14b7-47fe-acb9-23fcd77c496c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-g8kkv_calico-system(a36976db-14b7-47fe-acb9-23fcd77c496c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:31:19.541633 env[1194]: time="2025-10-31T05:31:19.541581557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-qktmx,Uid:092be9e0-94a3-4b5b-a357-28d27ef577b0,Namespace:kube-system,Attempt:0,}" Oct 31 05:31:19.542088 env[1194]: time="2025-10-31T05:31:19.542056266Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-gtt8c,Uid:488d3938-e6f8-42e4-a891-26530154283f,Namespace:kube-system,Attempt:0,}" Oct 31 05:31:19.561016 env[1194]: time="2025-10-31T05:31:19.560968867Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-774b8c5f49-wcstd,Uid:66fd0aa1-ee8d-4f3e-828b-4549c47b74e9,Namespace:calico-system,Attempt:0,}" Oct 31 05:31:19.571938 env[1194]: time="2025-10-31T05:31:19.571882059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5546b7f78c-lk27p,Uid:3f5cfb6f-a85d-4a3b-992b-bbe85e888122,Namespace:calico-system,Attempt:0,}" Oct 31 05:31:19.590774 env[1194]: time="2025-10-31T05:31:19.590709812Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544d56dcbc-g5g87,Uid:d4b61754-f1af-4f1e-adb6-2e6093fbe9da,Namespace:calico-apiserver,Attempt:0,}" Oct 31 05:31:19.602764 env[1194]: time="2025-10-31T05:31:19.602717593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-584f6f7c67-lh668,Uid:efc77054-b6cb-470d-b188-31acbe754356,Namespace:calico-apiserver,Attempt:0,}" Oct 31 05:31:19.612882 env[1194]: time="2025-10-31T05:31:19.612834838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-tpvj9,Uid:4169be37-9b82-4526-bd73-17cdc3a8253e,Namespace:calico-system,Attempt:0,}" Oct 31 05:31:19.623318 env[1194]: time="2025-10-31T05:31:19.623274489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544d56dcbc-xpjhh,Uid:844e14a9-59ae-4490-8511-4b0d9cac9971,Namespace:calico-apiserver,Attempt:0,}" Oct 31 05:31:19.818977 env[1194]: time="2025-10-31T05:31:19.818840976Z" level=error msg="Failed to destroy network for sandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.819558 env[1194]: time="2025-10-31T05:31:19.819500163Z" level=error msg="encountered an error cleaning up failed sandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.819771 env[1194]: time="2025-10-31T05:31:19.819720867Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-gtt8c,Uid:488d3938-e6f8-42e4-a891-26530154283f,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.820949 kubelet[2011]: E1031 05:31:19.820315 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.820949 kubelet[2011]: E1031 05:31:19.820405 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-gtt8c" Oct 31 05:31:19.820949 kubelet[2011]: E1031 05:31:19.820435 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-gtt8c" Oct 31 05:31:19.821302 kubelet[2011]: E1031 05:31:19.820500 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-gtt8c_kube-system(488d3938-e6f8-42e4-a891-26530154283f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-gtt8c_kube-system(488d3938-e6f8-42e4-a891-26530154283f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-gtt8c" podUID="488d3938-e6f8-42e4-a891-26530154283f" Oct 31 05:31:19.879055 env[1194]: time="2025-10-31T05:31:19.878979996Z" level=error msg="Failed to destroy network for sandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.879700 env[1194]: time="2025-10-31T05:31:19.879662404Z" level=error msg="encountered an error cleaning up failed sandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.879877 env[1194]: time="2025-10-31T05:31:19.879844949Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-qktmx,Uid:092be9e0-94a3-4b5b-a357-28d27ef577b0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.881381 kubelet[2011]: E1031 05:31:19.880216 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.881381 kubelet[2011]: E1031 05:31:19.880283 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-qktmx" Oct 31 05:31:19.881381 kubelet[2011]: E1031 05:31:19.880310 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-qktmx" Oct 31 05:31:19.881630 kubelet[2011]: E1031 05:31:19.880389 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-qktmx_kube-system(092be9e0-94a3-4b5b-a357-28d27ef577b0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-qktmx_kube-system(092be9e0-94a3-4b5b-a357-28d27ef577b0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-qktmx" podUID="092be9e0-94a3-4b5b-a357-28d27ef577b0" Oct 31 05:31:19.915936 env[1194]: time="2025-10-31T05:31:19.915870891Z" level=error msg="Failed to destroy network for sandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.916578 env[1194]: time="2025-10-31T05:31:19.916542658Z" level=error msg="encountered an error cleaning up failed sandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.916744 env[1194]: time="2025-10-31T05:31:19.916717020Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-774b8c5f49-wcstd,Uid:66fd0aa1-ee8d-4f3e-828b-4549c47b74e9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.918665 kubelet[2011]: E1031 05:31:19.917126 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.918665 kubelet[2011]: E1031 05:31:19.917224 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" Oct 31 05:31:19.918665 kubelet[2011]: E1031 05:31:19.917253 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" Oct 31 05:31:19.919040 kubelet[2011]: E1031 05:31:19.917324 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-774b8c5f49-wcstd_calico-system(66fd0aa1-ee8d-4f3e-828b-4549c47b74e9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-774b8c5f49-wcstd_calico-system(66fd0aa1-ee8d-4f3e-828b-4549c47b74e9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" podUID="66fd0aa1-ee8d-4f3e-828b-4549c47b74e9" Oct 31 05:31:19.920393 env[1194]: time="2025-10-31T05:31:19.920342461Z" level=error msg="Failed to destroy network for sandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.920981 env[1194]: time="2025-10-31T05:31:19.920947307Z" level=error msg="encountered an error cleaning up failed sandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.921151 env[1194]: time="2025-10-31T05:31:19.921110156Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544d56dcbc-g5g87,Uid:d4b61754-f1af-4f1e-adb6-2e6093fbe9da,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.921741 kubelet[2011]: E1031 05:31:19.921483 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.921741 kubelet[2011]: E1031 05:31:19.921564 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" Oct 31 05:31:19.921741 kubelet[2011]: E1031 05:31:19.921599 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" Oct 31 05:31:19.921892 kubelet[2011]: E1031 05:31:19.921674 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-544d56dcbc-g5g87_calico-apiserver(d4b61754-f1af-4f1e-adb6-2e6093fbe9da)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-544d56dcbc-g5g87_calico-apiserver(d4b61754-f1af-4f1e-adb6-2e6093fbe9da)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" podUID="d4b61754-f1af-4f1e-adb6-2e6093fbe9da" Oct 31 05:31:19.943171 env[1194]: time="2025-10-31T05:31:19.943104294Z" level=error msg="Failed to destroy network for sandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.943783 env[1194]: time="2025-10-31T05:31:19.943747438Z" level=error msg="encountered an error cleaning up failed sandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.943955 env[1194]: time="2025-10-31T05:31:19.943920566Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5546b7f78c-lk27p,Uid:3f5cfb6f-a85d-4a3b-992b-bbe85e888122,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.946565 kubelet[2011]: E1031 05:31:19.944325 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.946565 kubelet[2011]: E1031 05:31:19.944426 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-5546b7f78c-lk27p" Oct 31 05:31:19.946565 kubelet[2011]: E1031 05:31:19.944453 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-5546b7f78c-lk27p" Oct 31 05:31:19.946782 kubelet[2011]: E1031 05:31:19.944544 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-5546b7f78c-lk27p_calico-system(3f5cfb6f-a85d-4a3b-992b-bbe85e888122)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-5546b7f78c-lk27p_calico-system(3f5cfb6f-a85d-4a3b-992b-bbe85e888122)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-5546b7f78c-lk27p" podUID="3f5cfb6f-a85d-4a3b-992b-bbe85e888122" Oct 31 05:31:19.960151 env[1194]: time="2025-10-31T05:31:19.960073360Z" level=error msg="Failed to destroy network for sandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.961013 env[1194]: time="2025-10-31T05:31:19.960967953Z" level=error msg="encountered an error cleaning up failed sandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.961254 env[1194]: time="2025-10-31T05:31:19.961221251Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-584f6f7c67-lh668,Uid:efc77054-b6cb-470d-b188-31acbe754356,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.964302 kubelet[2011]: E1031 05:31:19.961723 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.964302 kubelet[2011]: E1031 05:31:19.961958 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" Oct 31 05:31:19.964302 kubelet[2011]: E1031 05:31:19.962003 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" Oct 31 05:31:19.964589 kubelet[2011]: E1031 05:31:19.962089 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-584f6f7c67-lh668_calico-apiserver(efc77054-b6cb-470d-b188-31acbe754356)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-584f6f7c67-lh668_calico-apiserver(efc77054-b6cb-470d-b188-31acbe754356)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356" Oct 31 05:31:19.970299 env[1194]: time="2025-10-31T05:31:19.970244176Z" level=error msg="Failed to destroy network for sandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.970812 env[1194]: time="2025-10-31T05:31:19.970775830Z" level=error msg="encountered an error cleaning up failed sandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.970977 env[1194]: time="2025-10-31T05:31:19.970946053Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-tpvj9,Uid:4169be37-9b82-4526-bd73-17cdc3a8253e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.973555 kubelet[2011]: E1031 05:31:19.971359 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.973555 kubelet[2011]: E1031 05:31:19.971474 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-tpvj9" Oct 31 05:31:19.973555 kubelet[2011]: E1031 05:31:19.971513 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-tpvj9" Oct 31 05:31:19.973781 kubelet[2011]: E1031 05:31:19.971644 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-666569f655-tpvj9_calico-system(4169be37-9b82-4526-bd73-17cdc3a8253e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-666569f655-tpvj9_calico-system(4169be37-9b82-4526-bd73-17cdc3a8253e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-tpvj9" podUID="4169be37-9b82-4526-bd73-17cdc3a8253e" Oct 31 05:31:19.983784 env[1194]: time="2025-10-31T05:31:19.983673942Z" level=error msg="Failed to destroy network for sandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.984186 env[1194]: time="2025-10-31T05:31:19.984137726Z" level=error msg="encountered an error cleaning up failed sandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.984286 env[1194]: time="2025-10-31T05:31:19.984205372Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544d56dcbc-xpjhh,Uid:844e14a9-59ae-4490-8511-4b0d9cac9971,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.987468 kubelet[2011]: E1031 05:31:19.984678 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:19.987468 kubelet[2011]: E1031 05:31:19.984782 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" Oct 31 05:31:19.987468 kubelet[2011]: E1031 05:31:19.984864 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" Oct 31 05:31:19.988379 kubelet[2011]: E1031 05:31:19.984965 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-544d56dcbc-xpjhh_calico-apiserver(844e14a9-59ae-4490-8511-4b0d9cac9971)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-544d56dcbc-xpjhh_calico-apiserver(844e14a9-59ae-4490-8511-4b0d9cac9971)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:31:20.063510 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca-shm.mount: Deactivated successfully. Oct 31 05:31:20.288665 kubelet[2011]: I1031 05:31:20.288586 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:20.297936 kubelet[2011]: I1031 05:31:20.296968 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:20.298504 kubelet[2011]: I1031 05:31:20.298479 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:20.304124 kubelet[2011]: I1031 05:31:20.304080 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:20.308068 kubelet[2011]: I1031 05:31:20.308032 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:20.308795 env[1194]: time="2025-10-31T05:31:20.308756742Z" level=info msg="StopPodSandbox for \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\"" Oct 31 05:31:20.309240 env[1194]: time="2025-10-31T05:31:20.308837841Z" level=info msg="StopPodSandbox for \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\"" Oct 31 05:31:20.309722 env[1194]: time="2025-10-31T05:31:20.308874507Z" level=info msg="StopPodSandbox for \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\"" Oct 31 05:31:20.310032 env[1194]: time="2025-10-31T05:31:20.308898819Z" level=info msg="StopPodSandbox for \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\"" Oct 31 05:31:20.310301 env[1194]: time="2025-10-31T05:31:20.308938816Z" level=info msg="StopPodSandbox for \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\"" Oct 31 05:31:20.311821 kubelet[2011]: I1031 05:31:20.311802 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:20.313294 env[1194]: time="2025-10-31T05:31:20.313041987Z" level=info msg="StopPodSandbox for \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\"" Oct 31 05:31:20.320289 kubelet[2011]: I1031 05:31:20.319876 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:20.320531 env[1194]: time="2025-10-31T05:31:20.320476909Z" level=info msg="StopPodSandbox for \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\"" Oct 31 05:31:20.333544 kubelet[2011]: I1031 05:31:20.328199 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:20.333744 env[1194]: time="2025-10-31T05:31:20.329738279Z" level=info msg="StopPodSandbox for \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\"" Oct 31 05:31:20.335256 kubelet[2011]: I1031 05:31:20.334735 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:20.337177 env[1194]: time="2025-10-31T05:31:20.337128700Z" level=info msg="StopPodSandbox for \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\"" Oct 31 05:31:20.406746 env[1194]: time="2025-10-31T05:31:20.406670162Z" level=error msg="StopPodSandbox for \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\" failed" error="failed to destroy network for sandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:20.408664 kubelet[2011]: E1031 05:31:20.408477 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:20.411014 kubelet[2011]: E1031 05:31:20.408614 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca"} Oct 31 05:31:20.411014 kubelet[2011]: E1031 05:31:20.410927 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a36976db-14b7-47fe-acb9-23fcd77c496c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:31:20.411014 kubelet[2011]: E1031 05:31:20.410957 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a36976db-14b7-47fe-acb9-23fcd77c496c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:31:20.526127 env[1194]: time="2025-10-31T05:31:20.525924708Z" level=error msg="StopPodSandbox for \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\" failed" error="failed to destroy network for sandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:20.527725 env[1194]: time="2025-10-31T05:31:20.527667568Z" level=error msg="StopPodSandbox for \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\" failed" error="failed to destroy network for sandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:20.527971 env[1194]: time="2025-10-31T05:31:20.527945781Z" level=error msg="StopPodSandbox for \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\" failed" error="failed to destroy network for sandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:20.528500 kubelet[2011]: E1031 05:31:20.528365 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:20.528736 kubelet[2011]: E1031 05:31:20.528428 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:20.528736 kubelet[2011]: E1031 05:31:20.528656 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c"} Oct 31 05:31:20.528736 kubelet[2011]: E1031 05:31:20.528707 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"488d3938-e6f8-42e4-a891-26530154283f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:31:20.529213 kubelet[2011]: E1031 05:31:20.528738 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"488d3938-e6f8-42e4-a891-26530154283f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-gtt8c" podUID="488d3938-e6f8-42e4-a891-26530154283f" Oct 31 05:31:20.529213 kubelet[2011]: E1031 05:31:20.528365 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:20.529213 kubelet[2011]: E1031 05:31:20.528774 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd"} Oct 31 05:31:20.529213 kubelet[2011]: E1031 05:31:20.528794 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"844e14a9-59ae-4490-8511-4b0d9cac9971\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:31:20.529414 kubelet[2011]: E1031 05:31:20.528837 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"844e14a9-59ae-4490-8511-4b0d9cac9971\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:31:20.529414 kubelet[2011]: E1031 05:31:20.528439 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34"} Oct 31 05:31:20.529414 kubelet[2011]: E1031 05:31:20.528873 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4169be37-9b82-4526-bd73-17cdc3a8253e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:31:20.529414 kubelet[2011]: E1031 05:31:20.528892 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4169be37-9b82-4526-bd73-17cdc3a8253e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-tpvj9" podUID="4169be37-9b82-4526-bd73-17cdc3a8253e" Oct 31 05:31:20.533592 env[1194]: time="2025-10-31T05:31:20.533409588Z" level=error msg="StopPodSandbox for \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\" failed" error="failed to destroy network for sandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:20.533961 kubelet[2011]: E1031 05:31:20.533878 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:20.534365 kubelet[2011]: E1031 05:31:20.533976 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77"} Oct 31 05:31:20.534365 kubelet[2011]: E1031 05:31:20.534017 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"092be9e0-94a3-4b5b-a357-28d27ef577b0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:31:20.534365 kubelet[2011]: E1031 05:31:20.534046 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"092be9e0-94a3-4b5b-a357-28d27ef577b0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-qktmx" podUID="092be9e0-94a3-4b5b-a357-28d27ef577b0" Oct 31 05:31:20.535719 env[1194]: time="2025-10-31T05:31:20.535680353Z" level=error msg="StopPodSandbox for \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\" failed" error="failed to destroy network for sandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:20.536039 kubelet[2011]: E1031 05:31:20.535990 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:20.536472 kubelet[2011]: E1031 05:31:20.536045 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610"} Oct 31 05:31:20.536472 kubelet[2011]: E1031 05:31:20.536074 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"66fd0aa1-ee8d-4f3e-828b-4549c47b74e9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:31:20.536472 kubelet[2011]: E1031 05:31:20.536095 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"66fd0aa1-ee8d-4f3e-828b-4549c47b74e9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" podUID="66fd0aa1-ee8d-4f3e-828b-4549c47b74e9" Oct 31 05:31:20.559727 env[1194]: time="2025-10-31T05:31:20.559552940Z" level=error msg="StopPodSandbox for \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\" failed" error="failed to destroy network for sandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:20.560597 kubelet[2011]: E1031 05:31:20.560223 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:20.560597 kubelet[2011]: E1031 05:31:20.560348 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e"} Oct 31 05:31:20.560597 kubelet[2011]: E1031 05:31:20.560400 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d4b61754-f1af-4f1e-adb6-2e6093fbe9da\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:31:20.560597 kubelet[2011]: E1031 05:31:20.560427 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d4b61754-f1af-4f1e-adb6-2e6093fbe9da\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" podUID="d4b61754-f1af-4f1e-adb6-2e6093fbe9da" Oct 31 05:31:20.574209 env[1194]: time="2025-10-31T05:31:20.574140253Z" level=error msg="StopPodSandbox for \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\" failed" error="failed to destroy network for sandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:20.574850 kubelet[2011]: E1031 05:31:20.574790 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:20.574990 kubelet[2011]: E1031 05:31:20.574863 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5"} Oct 31 05:31:20.574990 kubelet[2011]: E1031 05:31:20.574902 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3f5cfb6f-a85d-4a3b-992b-bbe85e888122\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:31:20.574990 kubelet[2011]: E1031 05:31:20.574933 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3f5cfb6f-a85d-4a3b-992b-bbe85e888122\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-5546b7f78c-lk27p" podUID="3f5cfb6f-a85d-4a3b-992b-bbe85e888122" Oct 31 05:31:20.577412 env[1194]: time="2025-10-31T05:31:20.577358813Z" level=error msg="StopPodSandbox for \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\" failed" error="failed to destroy network for sandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:31:20.577926 kubelet[2011]: E1031 05:31:20.577727 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:20.577926 kubelet[2011]: E1031 05:31:20.577804 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e"} Oct 31 05:31:20.577926 kubelet[2011]: E1031 05:31:20.577859 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"efc77054-b6cb-470d-b188-31acbe754356\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:31:20.577926 kubelet[2011]: E1031 05:31:20.577887 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"efc77054-b6cb-470d-b188-31acbe754356\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356" Oct 31 05:31:29.181578 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2229290615.mount: Deactivated successfully. Oct 31 05:31:29.210396 env[1194]: time="2025-10-31T05:31:29.210309215Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:29.213190 env[1194]: time="2025-10-31T05:31:29.213148089Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:29.215298 env[1194]: time="2025-10-31T05:31:29.215262248Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:29.216306 env[1194]: time="2025-10-31T05:31:29.216273145Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 31 05:31:29.217192 env[1194]: time="2025-10-31T05:31:29.217041600Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:31:29.259732 env[1194]: time="2025-10-31T05:31:29.259679299Z" level=info msg="CreateContainer within sandbox \"95ab4fec0ec5fe238a9ebcb6aa1616531f813f8d7e5c2f0fb25aa41b9b4836b5\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 31 05:31:29.274700 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1790461397.mount: Deactivated successfully. Oct 31 05:31:29.282133 env[1194]: time="2025-10-31T05:31:29.277408969Z" level=info msg="CreateContainer within sandbox \"95ab4fec0ec5fe238a9ebcb6aa1616531f813f8d7e5c2f0fb25aa41b9b4836b5\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"393da8d258afdec75bb60daee1f0e6becfd2b3131c5f7091522c421b1c573dcd\"" Oct 31 05:31:29.284692 env[1194]: time="2025-10-31T05:31:29.284637780Z" level=info msg="StartContainer for \"393da8d258afdec75bb60daee1f0e6becfd2b3131c5f7091522c421b1c573dcd\"" Oct 31 05:31:29.315488 systemd[1]: Started cri-containerd-393da8d258afdec75bb60daee1f0e6becfd2b3131c5f7091522c421b1c573dcd.scope. Oct 31 05:31:29.358052 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 31 05:31:29.363790 kernel: audit: type=1400 audit(1761888689.350:1030): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.364404 kernel: audit: type=1300 audit(1761888689.350:1030): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f00fc5dcba8 items=0 ppid=2493 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:29.350000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.350000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f00fc5dcba8 items=0 ppid=2493 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:29.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339336461386432353861666465633735626236306461656531663065 Oct 31 05:31:29.370591 kernel: audit: type=1327 audit(1761888689.350:1030): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339336461386432353861666465633735626236306461656531663065 Oct 31 05:31:29.350000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.350000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.377682 kernel: audit: type=1400 audit(1761888689.350:1031): avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.377954 kernel: audit: type=1400 audit(1761888689.350:1031): avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.350000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.383554 kernel: audit: type=1400 audit(1761888689.350:1031): avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.350000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.350000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.389616 kernel: audit: type=1400 audit(1761888689.350:1031): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.389694 kernel: audit: type=1400 audit(1761888689.350:1031): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.350000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.394551 kernel: audit: type=1400 audit(1761888689.350:1031): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.394629 kernel: audit: type=1400 audit(1761888689.350:1031): avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.350000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.350000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.350000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.350000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.350000 audit: BPF prog-id=139 op=LOAD Oct 31 05:31:29.350000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00030e108 items=0 ppid=2493 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:29.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339336461386432353861666465633735626236306461656531663065 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit: BPF prog-id=140 op=LOAD Oct 31 05:31:29.363000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00030e158 items=0 ppid=2493 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:29.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339336461386432353861666465633735626236306461656531663065 Oct 31 05:31:29.363000 audit: BPF prog-id=140 op=UNLOAD Oct 31 05:31:29.363000 audit: BPF prog-id=139 op=UNLOAD Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { perfmon } for pid=3199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit[3199]: AVC avc: denied { bpf } for pid=3199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:29.363000 audit: BPF prog-id=141 op=LOAD Oct 31 05:31:29.363000 audit[3199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00030e1e8 items=0 ppid=2493 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:29.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339336461386432353861666465633735626236306461656531663065 Oct 31 05:31:29.404290 env[1194]: time="2025-10-31T05:31:29.404245087Z" level=info msg="StartContainer for \"393da8d258afdec75bb60daee1f0e6becfd2b3131c5f7091522c421b1c573dcd\" returns successfully" Oct 31 05:31:29.676981 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 31 05:31:29.677202 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 31 05:31:29.926971 env[1194]: time="2025-10-31T05:31:29.925864292Z" level=info msg="StopPodSandbox for \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\"" Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.040 [INFO][3255] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.042 [INFO][3255] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" iface="eth0" netns="/var/run/netns/cni-a2fa3e2e-8ab5-bc90-54ff-e54b17f6d550" Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.042 [INFO][3255] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" iface="eth0" netns="/var/run/netns/cni-a2fa3e2e-8ab5-bc90-54ff-e54b17f6d550" Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.042 [INFO][3255] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" iface="eth0" netns="/var/run/netns/cni-a2fa3e2e-8ab5-bc90-54ff-e54b17f6d550" Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.043 [INFO][3255] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.043 [INFO][3255] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.162 [INFO][3263] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" HandleID="k8s-pod-network.3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Workload="srv--29uxp.gb1.brightbox.com-k8s-whisker--5546b7f78c--lk27p-eth0" Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.163 [INFO][3263] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.164 [INFO][3263] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.182 [WARNING][3263] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" HandleID="k8s-pod-network.3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Workload="srv--29uxp.gb1.brightbox.com-k8s-whisker--5546b7f78c--lk27p-eth0" Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.185 [INFO][3263] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" HandleID="k8s-pod-network.3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Workload="srv--29uxp.gb1.brightbox.com-k8s-whisker--5546b7f78c--lk27p-eth0" Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.187 [INFO][3263] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:30.193703 env[1194]: 2025-10-31 05:31:30.190 [INFO][3255] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:30.197289 systemd[1]: run-netns-cni\x2da2fa3e2e\x2d8ab5\x2dbc90\x2d54ff\x2de54b17f6d550.mount: Deactivated successfully. Oct 31 05:31:30.198638 env[1194]: time="2025-10-31T05:31:30.198580248Z" level=info msg="TearDown network for sandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\" successfully" Oct 31 05:31:30.198747 env[1194]: time="2025-10-31T05:31:30.198728719Z" level=info msg="StopPodSandbox for \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\" returns successfully" Oct 31 05:31:30.336728 kubelet[2011]: I1031 05:31:30.336684 2011 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-6w4x2\" (UniqueName: \"kubernetes.io/projected/3f5cfb6f-a85d-4a3b-992b-bbe85e888122-kube-api-access-6w4x2\") pod \"3f5cfb6f-a85d-4a3b-992b-bbe85e888122\" (UID: \"3f5cfb6f-a85d-4a3b-992b-bbe85e888122\") " Oct 31 05:31:30.338052 kubelet[2011]: I1031 05:31:30.337624 2011 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/3f5cfb6f-a85d-4a3b-992b-bbe85e888122-whisker-backend-key-pair\") pod \"3f5cfb6f-a85d-4a3b-992b-bbe85e888122\" (UID: \"3f5cfb6f-a85d-4a3b-992b-bbe85e888122\") " Oct 31 05:31:30.338052 kubelet[2011]: I1031 05:31:30.337911 2011 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3f5cfb6f-a85d-4a3b-992b-bbe85e888122-whisker-ca-bundle\") pod \"3f5cfb6f-a85d-4a3b-992b-bbe85e888122\" (UID: \"3f5cfb6f-a85d-4a3b-992b-bbe85e888122\") " Oct 31 05:31:30.342706 systemd[1]: var-lib-kubelet-pods-3f5cfb6f\x2da85d\x2d4a3b\x2d992b\x2dbbe85e888122-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d6w4x2.mount: Deactivated successfully. Oct 31 05:31:30.343090 kubelet[2011]: I1031 05:31:30.339246 2011 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/3f5cfb6f-a85d-4a3b-992b-bbe85e888122-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "3f5cfb6f-a85d-4a3b-992b-bbe85e888122" (UID: "3f5cfb6f-a85d-4a3b-992b-bbe85e888122"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Oct 31 05:31:30.347034 kubelet[2011]: I1031 05:31:30.346997 2011 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/3f5cfb6f-a85d-4a3b-992b-bbe85e888122-kube-api-access-6w4x2" (OuterVolumeSpecName: "kube-api-access-6w4x2") pod "3f5cfb6f-a85d-4a3b-992b-bbe85e888122" (UID: "3f5cfb6f-a85d-4a3b-992b-bbe85e888122"). InnerVolumeSpecName "kube-api-access-6w4x2". PluginName "kubernetes.io/projected", VolumeGIDValue "" Oct 31 05:31:30.351220 systemd[1]: var-lib-kubelet-pods-3f5cfb6f\x2da85d\x2d4a3b\x2d992b\x2dbbe85e888122-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Oct 31 05:31:30.352007 kubelet[2011]: I1031 05:31:30.351979 2011 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/3f5cfb6f-a85d-4a3b-992b-bbe85e888122-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "3f5cfb6f-a85d-4a3b-992b-bbe85e888122" (UID: "3f5cfb6f-a85d-4a3b-992b-bbe85e888122"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Oct 31 05:31:30.424391 systemd[1]: Removed slice kubepods-besteffort-pod3f5cfb6f_a85d_4a3b_992b_bbe85e888122.slice. Oct 31 05:31:30.439329 kubelet[2011]: I1031 05:31:30.439255 2011 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3f5cfb6f-a85d-4a3b-992b-bbe85e888122-whisker-ca-bundle\") on node \"srv-29uxp.gb1.brightbox.com\" DevicePath \"\"" Oct 31 05:31:30.439329 kubelet[2011]: I1031 05:31:30.439293 2011 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-6w4x2\" (UniqueName: \"kubernetes.io/projected/3f5cfb6f-a85d-4a3b-992b-bbe85e888122-kube-api-access-6w4x2\") on node \"srv-29uxp.gb1.brightbox.com\" DevicePath \"\"" Oct 31 05:31:30.439329 kubelet[2011]: I1031 05:31:30.439306 2011 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/3f5cfb6f-a85d-4a3b-992b-bbe85e888122-whisker-backend-key-pair\") on node \"srv-29uxp.gb1.brightbox.com\" DevicePath \"\"" Oct 31 05:31:30.486371 kubelet[2011]: I1031 05:31:30.486186 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-7mggq" podStartSLOduration=2.114185791 podStartE2EDuration="23.485319116s" podCreationTimestamp="2025-10-31 05:31:07 +0000 UTC" firstStartedPulling="2025-10-31 05:31:07.846852324 +0000 UTC m=+22.099470582" lastFinishedPulling="2025-10-31 05:31:29.21798565 +0000 UTC m=+43.470603907" observedRunningTime="2025-10-31 05:31:30.472104575 +0000 UTC m=+44.724722838" watchObservedRunningTime="2025-10-31 05:31:30.485319116 +0000 UTC m=+44.737937479" Oct 31 05:31:30.567858 systemd[1]: Created slice kubepods-besteffort-podf8918c31_0985_4c54_9c84_3f7bcbddeb56.slice. Oct 31 05:31:30.641497 kubelet[2011]: I1031 05:31:30.641419 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f8918c31-0985-4c54-9c84-3f7bcbddeb56-whisker-ca-bundle\") pod \"whisker-d487dbcdc-xbgtz\" (UID: \"f8918c31-0985-4c54-9c84-3f7bcbddeb56\") " pod="calico-system/whisker-d487dbcdc-xbgtz" Oct 31 05:31:30.641497 kubelet[2011]: I1031 05:31:30.641490 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-drf8m\" (UniqueName: \"kubernetes.io/projected/f8918c31-0985-4c54-9c84-3f7bcbddeb56-kube-api-access-drf8m\") pod \"whisker-d487dbcdc-xbgtz\" (UID: \"f8918c31-0985-4c54-9c84-3f7bcbddeb56\") " pod="calico-system/whisker-d487dbcdc-xbgtz" Oct 31 05:31:30.641856 kubelet[2011]: I1031 05:31:30.641536 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/f8918c31-0985-4c54-9c84-3f7bcbddeb56-whisker-backend-key-pair\") pod \"whisker-d487dbcdc-xbgtz\" (UID: \"f8918c31-0985-4c54-9c84-3f7bcbddeb56\") " pod="calico-system/whisker-d487dbcdc-xbgtz" Oct 31 05:31:30.878076 env[1194]: time="2025-10-31T05:31:30.878009164Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-d487dbcdc-xbgtz,Uid:f8918c31-0985-4c54-9c84-3f7bcbddeb56,Namespace:calico-system,Attempt:0,}" Oct 31 05:31:31.100681 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 05:31:31.100922 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9746464bff5: link becomes ready Oct 31 05:31:31.108779 systemd-networkd[1031]: cali9746464bff5: Link UP Oct 31 05:31:31.109009 systemd-networkd[1031]: cali9746464bff5: Gained carrier Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:30.914 [INFO][3284] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:30.927 [INFO][3284] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0 whisker-d487dbcdc- calico-system f8918c31-0985-4c54-9c84-3f7bcbddeb56 926 0 2025-10-31 05:31:30 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:d487dbcdc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s srv-29uxp.gb1.brightbox.com whisker-d487dbcdc-xbgtz eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali9746464bff5 [] [] }} ContainerID="97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" Namespace="calico-system" Pod="whisker-d487dbcdc-xbgtz" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-" Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:30.927 [INFO][3284] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" Namespace="calico-system" Pod="whisker-d487dbcdc-xbgtz" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0" Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:30.998 [INFO][3298] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" HandleID="k8s-pod-network.97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" Workload="srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0" Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:30.999 [INFO][3298] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" HandleID="k8s-pod-network.97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" Workload="srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000250fe0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-29uxp.gb1.brightbox.com", "pod":"whisker-d487dbcdc-xbgtz", "timestamp":"2025-10-31 05:31:30.998608056 +0000 UTC"}, Hostname:"srv-29uxp.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:30.999 [INFO][3298] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:30.999 [INFO][3298] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:30.999 [INFO][3298] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-29uxp.gb1.brightbox.com' Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:31.014 [INFO][3298] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:31.023 [INFO][3298] ipam/ipam.go 394: Looking up existing affinities for host host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:31.029 [INFO][3298] ipam/ipam.go 511: Trying affinity for 192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:31.040 [INFO][3298] ipam/ipam.go 158: Attempting to load block cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:31.042 [INFO][3298] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:31.043 [INFO][3298] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.48.192/26 handle="k8s-pod-network.97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:31.045 [INFO][3298] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0 Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:31.058 [INFO][3298] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.48.192/26 handle="k8s-pod-network.97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:31.077 [INFO][3298] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.48.193/26] block=192.168.48.192/26 handle="k8s-pod-network.97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:31.078 [INFO][3298] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.48.193/26] handle="k8s-pod-network.97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:31.078 [INFO][3298] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:31.132674 env[1194]: 2025-10-31 05:31:31.078 [INFO][3298] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.48.193/26] IPv6=[] ContainerID="97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" HandleID="k8s-pod-network.97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" Workload="srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0" Oct 31 05:31:31.134080 env[1194]: 2025-10-31 05:31:31.082 [INFO][3284] cni-plugin/k8s.go 418: Populated endpoint ContainerID="97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" Namespace="calico-system" Pod="whisker-d487dbcdc-xbgtz" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0", GenerateName:"whisker-d487dbcdc-", Namespace:"calico-system", SelfLink:"", UID:"f8918c31-0985-4c54-9c84-3f7bcbddeb56", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"d487dbcdc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"", Pod:"whisker-d487dbcdc-xbgtz", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.48.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali9746464bff5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:31.134080 env[1194]: 2025-10-31 05:31:31.083 [INFO][3284] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.48.193/32] ContainerID="97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" Namespace="calico-system" Pod="whisker-d487dbcdc-xbgtz" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0" Oct 31 05:31:31.134080 env[1194]: 2025-10-31 05:31:31.083 [INFO][3284] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9746464bff5 ContainerID="97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" Namespace="calico-system" Pod="whisker-d487dbcdc-xbgtz" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0" Oct 31 05:31:31.134080 env[1194]: 2025-10-31 05:31:31.103 [INFO][3284] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" Namespace="calico-system" Pod="whisker-d487dbcdc-xbgtz" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0" Oct 31 05:31:31.134080 env[1194]: 2025-10-31 05:31:31.103 [INFO][3284] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" Namespace="calico-system" Pod="whisker-d487dbcdc-xbgtz" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0", GenerateName:"whisker-d487dbcdc-", Namespace:"calico-system", SelfLink:"", UID:"f8918c31-0985-4c54-9c84-3f7bcbddeb56", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"d487dbcdc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0", Pod:"whisker-d487dbcdc-xbgtz", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.48.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali9746464bff5", MAC:"16:25:51:5f:d3:8c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:31.134080 env[1194]: 2025-10-31 05:31:31.129 [INFO][3284] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0" Namespace="calico-system" Pod="whisker-d487dbcdc-xbgtz" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-whisker--d487dbcdc--xbgtz-eth0" Oct 31 05:31:31.163501 env[1194]: time="2025-10-31T05:31:31.163383872Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:31:31.163501 env[1194]: time="2025-10-31T05:31:31.163456373Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:31:31.163501 env[1194]: time="2025-10-31T05:31:31.163468757Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:31:31.165338 env[1194]: time="2025-10-31T05:31:31.164231656Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0 pid=3317 runtime=io.containerd.runc.v2 Oct 31 05:31:31.193308 systemd[1]: run-containerd-runc-k8s.io-97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0-runc.IrvXZJ.mount: Deactivated successfully. Oct 31 05:31:31.198922 systemd[1]: Started cri-containerd-97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0.scope. Oct 31 05:31:31.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.219000 audit: BPF prog-id=142 op=LOAD Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3317 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:31.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937663066313266613261343030373330306638373763383866373761 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3317 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:31.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937663066313266613261343030373330306638373763383866373761 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit: BPF prog-id=143 op=LOAD Oct 31 05:31:31.221000 audit[3327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e0b90 items=0 ppid=3317 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:31.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937663066313266613261343030373330306638373763383866373761 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.221000 audit: BPF prog-id=144 op=LOAD Oct 31 05:31:31.221000 audit[3327]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e0bd8 items=0 ppid=3317 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:31.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937663066313266613261343030373330306638373763383866373761 Oct 31 05:31:31.221000 audit: BPF prog-id=144 op=UNLOAD Oct 31 05:31:31.221000 audit: BPF prog-id=143 op=UNLOAD Oct 31 05:31:31.222000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.222000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.222000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.222000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.222000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.222000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.222000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.222000 audit[3327]: AVC avc: denied { perfmon } for pid=3327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.222000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.222000 audit[3327]: AVC avc: denied { bpf } for pid=3327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:31.222000 audit: BPF prog-id=145 op=LOAD Oct 31 05:31:31.222000 audit[3327]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e0fe8 items=0 ppid=3317 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:31.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937663066313266613261343030373330306638373763383866373761 Oct 31 05:31:31.259589 env[1194]: time="2025-10-31T05:31:31.259542183Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-d487dbcdc-xbgtz,Uid:f8918c31-0985-4c54-9c84-3f7bcbddeb56,Namespace:calico-system,Attempt:0,} returns sandbox id \"97f0f12fa2a4007300f877c88f77a8968c9116cd684a048df11cd364b59377a0\"" Oct 31 05:31:31.262119 env[1194]: time="2025-10-31T05:31:31.261975686Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 05:31:31.380000 audit[3411]: AVC avc: denied { write } for pid=3411 comm="tee" name="fd" dev="proc" ino=29216 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:31:31.380000 audit[3411]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe856657bd a2=241 a3=1b6 items=1 ppid=3359 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:31.380000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 31 05:31:31.380000 audit: PATH item=0 name="/dev/fd/63" inode=29213 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:31:31.380000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:31:31.383000 audit[3402]: AVC avc: denied { write } for pid=3402 comm="tee" name="fd" dev="proc" ino=29785 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:31:31.383000 audit[3402]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff512697ce a2=241 a3=1b6 items=1 ppid=3370 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:31.383000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 31 05:31:31.383000 audit: PATH item=0 name="/dev/fd/63" inode=29779 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:31:31.383000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:31:31.390000 audit[3391]: AVC avc: denied { write } for pid=3391 comm="tee" name="fd" dev="proc" ino=29789 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:31:31.390000 audit[3391]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffaa4dd7cd a2=241 a3=1b6 items=1 ppid=3361 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:31.390000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 31 05:31:31.390000 audit: PATH item=0 name="/dev/fd/63" inode=29198 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:31:31.390000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:31:31.393000 audit[3406]: AVC avc: denied { write } for pid=3406 comm="tee" name="fd" dev="proc" ino=29793 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:31:31.393000 audit[3406]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdcf6687cd a2=241 a3=1b6 items=1 ppid=3368 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:31.393000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 31 05:31:31.393000 audit: PATH item=0 name="/dev/fd/63" inode=29782 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:31:31.393000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:31:31.400845 kubelet[2011]: I1031 05:31:31.400373 2011 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 31 05:31:31.400000 audit[3404]: AVC avc: denied { write } for pid=3404 comm="tee" name="fd" dev="proc" ino=29797 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:31:31.400000 audit[3404]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd61b577be a2=241 a3=1b6 items=1 ppid=3367 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:31.400000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 31 05:31:31.400000 audit: PATH item=0 name="/dev/fd/63" inode=29207 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:31:31.400000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:31:31.411000 audit[3394]: AVC avc: denied { write } for pid=3394 comm="tee" name="fd" dev="proc" ino=29222 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:31:31.411000 audit[3394]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0690f7cd a2=241 a3=1b6 items=1 ppid=3362 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:31.411000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 31 05:31:31.411000 audit: PATH item=0 name="/dev/fd/63" inode=29772 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:31:31.411000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:31:31.413000 audit[3408]: AVC avc: denied { write } for pid=3408 comm="tee" name="fd" dev="proc" ino=29804 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:31:31.413000 audit[3408]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5b07c7cf a2=241 a3=1b6 items=1 ppid=3378 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:31.413000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 31 05:31:31.413000 audit: PATH item=0 name="/dev/fd/63" inode=29210 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:31:31.413000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:31:31.587576 env[1194]: time="2025-10-31T05:31:31.587497970Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:31.588672 env[1194]: time="2025-10-31T05:31:31.588570751Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 05:31:31.589928 kubelet[2011]: E1031 05:31:31.589877 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:31:31.590151 kubelet[2011]: E1031 05:31:31.590122 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:31:31.604981 kubelet[2011]: E1031 05:31:31.604893 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:c724eceb2e944e5f951eec5826565ec8,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-drf8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d487dbcdc-xbgtz_calico-system(f8918c31-0985-4c54-9c84-3f7bcbddeb56): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:31.607758 env[1194]: time="2025-10-31T05:31:31.607387534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 05:31:31.921597 env[1194]: time="2025-10-31T05:31:31.921492683Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:31.923285 env[1194]: time="2025-10-31T05:31:31.923210029Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 05:31:31.925337 kubelet[2011]: E1031 05:31:31.923944 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:31:31.925337 kubelet[2011]: E1031 05:31:31.924046 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:31:31.927452 kubelet[2011]: E1031 05:31:31.924296 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-drf8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d487dbcdc-xbgtz_calico-system(f8918c31-0985-4c54-9c84-3f7bcbddeb56): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:31.927969 kubelet[2011]: E1031 05:31:31.927780 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-d487dbcdc-xbgtz" podUID="f8918c31-0985-4c54-9c84-3f7bcbddeb56" Oct 31 05:31:32.117244 systemd[1]: run-containerd-runc-k8s.io-393da8d258afdec75bb60daee1f0e6becfd2b3131c5f7091522c421b1c573dcd-runc.WOMZJ5.mount: Deactivated successfully. Oct 31 05:31:32.130626 kubelet[2011]: I1031 05:31:32.129713 2011 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="3f5cfb6f-a85d-4a3b-992b-bbe85e888122" path="/var/lib/kubelet/pods/3f5cfb6f-a85d-4a3b-992b-bbe85e888122/volumes" Oct 31 05:31:32.133002 env[1194]: time="2025-10-31T05:31:32.132948739Z" level=info msg="StopPodSandbox for \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\"" Oct 31 05:31:32.294484 systemd[1]: run-containerd-runc-k8s.io-393da8d258afdec75bb60daee1f0e6becfd2b3131c5f7091522c421b1c573dcd-runc.BhtpoN.mount: Deactivated successfully. Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.267 [INFO][3469] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.267 [INFO][3469] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" iface="eth0" netns="/var/run/netns/cni-34dc49fc-f3ff-727d-8dec-28e4e0ed5b99" Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.267 [INFO][3469] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" iface="eth0" netns="/var/run/netns/cni-34dc49fc-f3ff-727d-8dec-28e4e0ed5b99" Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.268 [INFO][3469] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" iface="eth0" netns="/var/run/netns/cni-34dc49fc-f3ff-727d-8dec-28e4e0ed5b99" Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.268 [INFO][3469] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.268 [INFO][3469] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.365 [INFO][3488] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" HandleID="k8s-pod-network.e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.366 [INFO][3488] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.366 [INFO][3488] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.374 [WARNING][3488] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" HandleID="k8s-pod-network.e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.375 [INFO][3488] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" HandleID="k8s-pod-network.e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.377 [INFO][3488] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:32.382246 env[1194]: 2025-10-31 05:31:32.380 [INFO][3469] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:32.385423 systemd[1]: run-netns-cni\x2d34dc49fc\x2df3ff\x2d727d\x2d8dec\x2d28e4e0ed5b99.mount: Deactivated successfully. Oct 31 05:31:32.387868 env[1194]: time="2025-10-31T05:31:32.387772291Z" level=info msg="TearDown network for sandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\" successfully" Oct 31 05:31:32.388014 env[1194]: time="2025-10-31T05:31:32.387872714Z" level=info msg="StopPodSandbox for \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\" returns successfully" Oct 31 05:31:32.389794 env[1194]: time="2025-10-31T05:31:32.389742701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544d56dcbc-xpjhh,Uid:844e14a9-59ae-4490-8511-4b0d9cac9971,Namespace:calico-apiserver,Attempt:1,}" Oct 31 05:31:32.407739 kubelet[2011]: E1031 05:31:32.407679 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-d487dbcdc-xbgtz" podUID="f8918c31-0985-4c54-9c84-3f7bcbddeb56" Oct 31 05:31:32.497000 audit[3523]: NETFILTER_CFG table=filter:103 family=2 entries=22 op=nft_register_rule pid=3523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:32.497000 audit[3523]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffc71050d50 a2=0 a3=7ffc71050d3c items=0 ppid=2153 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:32.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:32.503000 audit[3523]: NETFILTER_CFG table=nat:104 family=2 entries=12 op=nft_register_rule pid=3523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:32.503000 audit[3523]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc71050d50 a2=0 a3=0 items=0 ppid=2153 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:32.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:32.640957 systemd-networkd[1031]: cali6b3a9d85b44: Link UP Oct 31 05:31:32.645304 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 05:31:32.645430 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6b3a9d85b44: link becomes ready Oct 31 05:31:32.645413 systemd-networkd[1031]: cali6b3a9d85b44: Gained carrier Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.483 [INFO][3511] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.513 [INFO][3511] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0 calico-apiserver-544d56dcbc- calico-apiserver 844e14a9-59ae-4490-8511-4b0d9cac9971 941 0 2025-10-31 05:31:01 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:544d56dcbc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-29uxp.gb1.brightbox.com calico-apiserver-544d56dcbc-xpjhh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6b3a9d85b44 [] [] }} ContainerID="0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-xpjhh" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-" Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.513 [INFO][3511] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-xpjhh" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.567 [INFO][3532] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" HandleID="k8s-pod-network.0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.567 [INFO][3532] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" HandleID="k8s-pod-network.0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b73a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-29uxp.gb1.brightbox.com", "pod":"calico-apiserver-544d56dcbc-xpjhh", "timestamp":"2025-10-31 05:31:32.567121244 +0000 UTC"}, Hostname:"srv-29uxp.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.567 [INFO][3532] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.567 [INFO][3532] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.567 [INFO][3532] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-29uxp.gb1.brightbox.com' Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.579 [INFO][3532] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.593 [INFO][3532] ipam/ipam.go 394: Looking up existing affinities for host host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.602 [INFO][3532] ipam/ipam.go 511: Trying affinity for 192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.605 [INFO][3532] ipam/ipam.go 158: Attempting to load block cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.611 [INFO][3532] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.611 [INFO][3532] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.48.192/26 handle="k8s-pod-network.0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.615 [INFO][3532] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.621 [INFO][3532] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.48.192/26 handle="k8s-pod-network.0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.630 [INFO][3532] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.48.194/26] block=192.168.48.192/26 handle="k8s-pod-network.0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.630 [INFO][3532] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.48.194/26] handle="k8s-pod-network.0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.630 [INFO][3532] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:32.678965 env[1194]: 2025-10-31 05:31:32.630 [INFO][3532] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.48.194/26] IPv6=[] ContainerID="0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" HandleID="k8s-pod-network.0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:32.680364 env[1194]: 2025-10-31 05:31:32.633 [INFO][3511] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-xpjhh" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0", GenerateName:"calico-apiserver-544d56dcbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"844e14a9-59ae-4490-8511-4b0d9cac9971", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544d56dcbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-544d56dcbc-xpjhh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6b3a9d85b44", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:32.680364 env[1194]: 2025-10-31 05:31:32.633 [INFO][3511] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.48.194/32] ContainerID="0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-xpjhh" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:32.680364 env[1194]: 2025-10-31 05:31:32.633 [INFO][3511] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6b3a9d85b44 ContainerID="0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-xpjhh" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:32.680364 env[1194]: 2025-10-31 05:31:32.646 [INFO][3511] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-xpjhh" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:32.680364 env[1194]: 2025-10-31 05:31:32.649 [INFO][3511] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-xpjhh" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0", GenerateName:"calico-apiserver-544d56dcbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"844e14a9-59ae-4490-8511-4b0d9cac9971", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544d56dcbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e", Pod:"calico-apiserver-544d56dcbc-xpjhh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6b3a9d85b44", MAC:"02:54:f4:3d:d8:68", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:32.680364 env[1194]: 2025-10-31 05:31:32.675 [INFO][3511] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-xpjhh" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:32.704807 systemd-networkd[1031]: cali9746464bff5: Gained IPv6LL Oct 31 05:31:32.734591 env[1194]: time="2025-10-31T05:31:32.730600612Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:31:32.734591 env[1194]: time="2025-10-31T05:31:32.730664014Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:31:32.734591 env[1194]: time="2025-10-31T05:31:32.730676297Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:31:32.736866 env[1194]: time="2025-10-31T05:31:32.735031604Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e pid=3576 runtime=io.containerd.runc.v2 Oct 31 05:31:32.755425 systemd[1]: Started cri-containerd-0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e.scope. Oct 31 05:31:32.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.827000 audit: BPF prog-id=146 op=LOAD Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3576 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:32.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034313162386561313732303063653738306532393031633237373264 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3576 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:32.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034313162386561313732303063653738306532393031633237373264 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit: BPF prog-id=147 op=LOAD Oct 31 05:31:32.829000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001f2430 items=0 ppid=3576 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:32.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034313162386561313732303063653738306532393031633237373264 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.829000 audit: BPF prog-id=148 op=LOAD Oct 31 05:31:32.829000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001f2478 items=0 ppid=3576 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:32.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034313162386561313732303063653738306532393031633237373264 Oct 31 05:31:32.829000 audit: BPF prog-id=148 op=UNLOAD Oct 31 05:31:32.830000 audit: BPF prog-id=147 op=UNLOAD Oct 31 05:31:32.830000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.830000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.830000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.830000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.830000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.830000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.830000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.830000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.830000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.830000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:32.830000 audit: BPF prog-id=149 op=LOAD Oct 31 05:31:32.830000 audit[3587]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001f2888 items=0 ppid=3576 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:32.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034313162386561313732303063653738306532393031633237373264 Oct 31 05:31:32.899441 env[1194]: time="2025-10-31T05:31:32.899297898Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544d56dcbc-xpjhh,Uid:844e14a9-59ae-4490-8511-4b0d9cac9971,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e\"" Oct 31 05:31:32.904826 env[1194]: time="2025-10-31T05:31:32.904781642Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:31:33.128687 env[1194]: time="2025-10-31T05:31:33.128640229Z" level=info msg="StopPodSandbox for \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\"" Oct 31 05:31:33.129346 env[1194]: time="2025-10-31T05:31:33.128642201Z" level=info msg="StopPodSandbox for \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\"" Oct 31 05:31:33.129909 env[1194]: time="2025-10-31T05:31:33.128717693Z" level=info msg="StopPodSandbox for \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\"" Oct 31 05:31:33.130239 env[1194]: time="2025-10-31T05:31:33.128806788Z" level=info msg="StopPodSandbox for \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\"" Oct 31 05:31:33.210280 env[1194]: time="2025-10-31T05:31:33.209736813Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:33.211615 env[1194]: time="2025-10-31T05:31:33.211551613Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:31:33.212172 kubelet[2011]: E1031 05:31:33.212114 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:31:33.212288 kubelet[2011]: E1031 05:31:33.212196 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:31:33.212453 kubelet[2011]: E1031 05:31:33.212410 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fft4d,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-544d56dcbc-xpjhh_calico-apiserver(844e14a9-59ae-4490-8511-4b0d9cac9971): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:33.215395 kubelet[2011]: E1031 05:31:33.215334 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:31:33.363968 kubelet[2011]: I1031 05:31:33.363921 2011 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 31 05:31:33.461485 kubelet[2011]: E1031 05:31:33.456576 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:31:33.508000 audit[3703]: NETFILTER_CFG table=filter:105 family=2 entries=21 op=nft_register_rule pid=3703 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:33.508000 audit[3703]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe71d4c840 a2=0 a3=7ffe71d4c82c items=0 ppid=2153 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:33.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:33.514000 audit[3703]: NETFILTER_CFG table=nat:106 family=2 entries=19 op=nft_register_chain pid=3703 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:33.514000 audit[3703]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe71d4c840 a2=0 a3=7ffe71d4c82c items=0 ppid=2153 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:33.514000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.315 [INFO][3651] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.316 [INFO][3651] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" iface="eth0" netns="/var/run/netns/cni-22bd8258-8619-b57a-f0f2-0eb24057ba0e" Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.316 [INFO][3651] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" iface="eth0" netns="/var/run/netns/cni-22bd8258-8619-b57a-f0f2-0eb24057ba0e" Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.317 [INFO][3651] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" iface="eth0" netns="/var/run/netns/cni-22bd8258-8619-b57a-f0f2-0eb24057ba0e" Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.317 [INFO][3651] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.317 [INFO][3651] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.495 [INFO][3685] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" HandleID="k8s-pod-network.add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.495 [INFO][3685] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.496 [INFO][3685] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.519 [WARNING][3685] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" HandleID="k8s-pod-network.add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.519 [INFO][3685] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" HandleID="k8s-pod-network.add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.525 [INFO][3685] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:33.536168 env[1194]: 2025-10-31 05:31:33.534 [INFO][3651] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:33.541308 env[1194]: time="2025-10-31T05:31:33.541249718Z" level=info msg="TearDown network for sandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\" successfully" Oct 31 05:31:33.541346 systemd[1]: run-netns-cni\x2d22bd8258\x2d8619\x2db57a\x2df0f2\x2d0eb24057ba0e.mount: Deactivated successfully. Oct 31 05:31:33.541902 env[1194]: time="2025-10-31T05:31:33.541868490Z" level=info msg="StopPodSandbox for \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\" returns successfully" Oct 31 05:31:33.546955 env[1194]: time="2025-10-31T05:31:33.546876182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-gtt8c,Uid:488d3938-e6f8-42e4-a891-26530154283f,Namespace:kube-system,Attempt:1,}" Oct 31 05:31:33.550000 audit[3710]: NETFILTER_CFG table=filter:107 family=2 entries=20 op=nft_register_rule pid=3710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:33.550000 audit[3710]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd4db15820 a2=0 a3=7ffd4db1580c items=0 ppid=2153 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:33.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:33.557000 audit[3710]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=3710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:33.557000 audit[3710]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd4db15820 a2=0 a3=0 items=0 ppid=2153 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:33.557000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.311 [INFO][3647] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.312 [INFO][3647] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" iface="eth0" netns="/var/run/netns/cni-19fd7ffb-21f5-eaa6-b3c1-06bdd678b715" Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.312 [INFO][3647] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" iface="eth0" netns="/var/run/netns/cni-19fd7ffb-21f5-eaa6-b3c1-06bdd678b715" Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.312 [INFO][3647] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" iface="eth0" netns="/var/run/netns/cni-19fd7ffb-21f5-eaa6-b3c1-06bdd678b715" Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.312 [INFO][3647] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.312 [INFO][3647] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.513 [INFO][3679] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" HandleID="k8s-pod-network.e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.513 [INFO][3679] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.526 [INFO][3679] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.553 [WARNING][3679] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" HandleID="k8s-pod-network.e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.553 [INFO][3679] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" HandleID="k8s-pod-network.e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.558 [INFO][3679] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:33.581734 env[1194]: 2025-10-31 05:31:33.562 [INFO][3647] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:33.586354 systemd[1]: run-netns-cni\x2d19fd7ffb\x2d21f5\x2deaa6\x2db3c1\x2d06bdd678b715.mount: Deactivated successfully. Oct 31 05:31:33.587568 env[1194]: time="2025-10-31T05:31:33.587507114Z" level=info msg="TearDown network for sandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\" successfully" Oct 31 05:31:33.587719 env[1194]: time="2025-10-31T05:31:33.587699232Z" level=info msg="StopPodSandbox for \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\" returns successfully" Oct 31 05:31:33.590039 env[1194]: time="2025-10-31T05:31:33.589985320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-584f6f7c67-lh668,Uid:efc77054-b6cb-470d-b188-31acbe754356,Namespace:calico-apiserver,Attempt:1,}" Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.333 [INFO][3658] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.333 [INFO][3658] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" iface="eth0" netns="/var/run/netns/cni-52a13a22-8488-e1cd-efc4-b5db25a96ccd" Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.333 [INFO][3658] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" iface="eth0" netns="/var/run/netns/cni-52a13a22-8488-e1cd-efc4-b5db25a96ccd" Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.334 [INFO][3658] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" iface="eth0" netns="/var/run/netns/cni-52a13a22-8488-e1cd-efc4-b5db25a96ccd" Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.334 [INFO][3658] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.334 [INFO][3658] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.544 [INFO][3694] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" HandleID="k8s-pod-network.38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.544 [INFO][3694] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.559 [INFO][3694] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.589 [WARNING][3694] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" HandleID="k8s-pod-network.38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.589 [INFO][3694] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" HandleID="k8s-pod-network.38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.593 [INFO][3694] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:33.601813 env[1194]: 2025-10-31 05:31:33.596 [INFO][3658] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:33.603501 env[1194]: time="2025-10-31T05:31:33.603441018Z" level=info msg="TearDown network for sandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\" successfully" Oct 31 05:31:33.603837 env[1194]: time="2025-10-31T05:31:33.603791682Z" level=info msg="StopPodSandbox for \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\" returns successfully" Oct 31 05:31:33.605413 env[1194]: time="2025-10-31T05:31:33.605370017Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-774b8c5f49-wcstd,Uid:66fd0aa1-ee8d-4f3e-828b-4549c47b74e9,Namespace:calico-system,Attempt:1,}" Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.316 [INFO][3662] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.316 [INFO][3662] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" iface="eth0" netns="/var/run/netns/cni-967935cc-bd36-f4d8-7128-b2be393bba19" Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.317 [INFO][3662] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" iface="eth0" netns="/var/run/netns/cni-967935cc-bd36-f4d8-7128-b2be393bba19" Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.317 [INFO][3662] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" iface="eth0" netns="/var/run/netns/cni-967935cc-bd36-f4d8-7128-b2be393bba19" Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.317 [INFO][3662] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.317 [INFO][3662] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.547 [INFO][3686] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" HandleID="k8s-pod-network.2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.551 [INFO][3686] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.593 [INFO][3686] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.611 [WARNING][3686] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" HandleID="k8s-pod-network.2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.611 [INFO][3686] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" HandleID="k8s-pod-network.2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.614 [INFO][3686] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:33.630572 env[1194]: 2025-10-31 05:31:33.626 [INFO][3662] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:33.631579 env[1194]: time="2025-10-31T05:31:33.631485990Z" level=info msg="TearDown network for sandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\" successfully" Oct 31 05:31:33.631671 env[1194]: time="2025-10-31T05:31:33.631653132Z" level=info msg="StopPodSandbox for \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\" returns successfully" Oct 31 05:31:33.634381 env[1194]: time="2025-10-31T05:31:33.634345935Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-qktmx,Uid:092be9e0-94a3-4b5b-a357-28d27ef577b0,Namespace:kube-system,Attempt:1,}" Oct 31 05:31:34.077098 systemd-networkd[1031]: cali79cec2f36a8: Link UP Oct 31 05:31:34.081544 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 05:31:34.081669 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali79cec2f36a8: link becomes ready Oct 31 05:31:34.082701 systemd-networkd[1031]: cali79cec2f36a8: Gained carrier Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:33.772 [INFO][3721] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:33.796 [INFO][3721] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0 calico-apiserver-584f6f7c67- calico-apiserver efc77054-b6cb-470d-b188-31acbe754356 964 0 2025-10-31 05:31:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:584f6f7c67 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-29uxp.gb1.brightbox.com calico-apiserver-584f6f7c67-lh668 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali79cec2f36a8 [] [] }} ContainerID="bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" Namespace="calico-apiserver" Pod="calico-apiserver-584f6f7c67-lh668" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-" Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:33.796 [INFO][3721] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" Namespace="calico-apiserver" Pod="calico-apiserver-584f6f7c67-lh668" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:33.953 [INFO][3759] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" HandleID="k8s-pod-network.bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:33.957 [INFO][3759] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" HandleID="k8s-pod-network.bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000363860), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-29uxp.gb1.brightbox.com", "pod":"calico-apiserver-584f6f7c67-lh668", "timestamp":"2025-10-31 05:31:33.953924392 +0000 UTC"}, Hostname:"srv-29uxp.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:33.958 [INFO][3759] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:33.958 [INFO][3759] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:33.959 [INFO][3759] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-29uxp.gb1.brightbox.com' Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:33.981 [INFO][3759] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:33.991 [INFO][3759] ipam/ipam.go 394: Looking up existing affinities for host host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:34.012 [INFO][3759] ipam/ipam.go 511: Trying affinity for 192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:34.015 [INFO][3759] ipam/ipam.go 158: Attempting to load block cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:34.019 [INFO][3759] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:34.019 [INFO][3759] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.48.192/26 handle="k8s-pod-network.bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:34.027 [INFO][3759] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4 Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:34.040 [INFO][3759] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.48.192/26 handle="k8s-pod-network.bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:34.059 [INFO][3759] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.48.195/26] block=192.168.48.192/26 handle="k8s-pod-network.bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:34.059 [INFO][3759] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.48.195/26] handle="k8s-pod-network.bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:34.059 [INFO][3759] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:34.120195 env[1194]: 2025-10-31 05:31:34.059 [INFO][3759] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.48.195/26] IPv6=[] ContainerID="bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" HandleID="k8s-pod-network.bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:34.122208 env[1194]: 2025-10-31 05:31:34.066 [INFO][3721] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" Namespace="calico-apiserver" Pod="calico-apiserver-584f6f7c67-lh668" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0", GenerateName:"calico-apiserver-584f6f7c67-", Namespace:"calico-apiserver", SelfLink:"", UID:"efc77054-b6cb-470d-b188-31acbe754356", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"584f6f7c67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-584f6f7c67-lh668", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali79cec2f36a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:34.122208 env[1194]: 2025-10-31 05:31:34.072 [INFO][3721] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.48.195/32] ContainerID="bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" Namespace="calico-apiserver" Pod="calico-apiserver-584f6f7c67-lh668" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:34.122208 env[1194]: 2025-10-31 05:31:34.072 [INFO][3721] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali79cec2f36a8 ContainerID="bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" Namespace="calico-apiserver" Pod="calico-apiserver-584f6f7c67-lh668" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:34.122208 env[1194]: 2025-10-31 05:31:34.101 [INFO][3721] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" Namespace="calico-apiserver" Pod="calico-apiserver-584f6f7c67-lh668" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:34.122208 env[1194]: 2025-10-31 05:31:34.102 [INFO][3721] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" Namespace="calico-apiserver" Pod="calico-apiserver-584f6f7c67-lh668" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0", GenerateName:"calico-apiserver-584f6f7c67-", Namespace:"calico-apiserver", SelfLink:"", UID:"efc77054-b6cb-470d-b188-31acbe754356", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"584f6f7c67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4", Pod:"calico-apiserver-584f6f7c67-lh668", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali79cec2f36a8", MAC:"e6:4d:99:0e:8b:54", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:34.122208 env[1194]: 2025-10-31 05:31:34.117 [INFO][3721] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4" Namespace="calico-apiserver" Pod="calico-apiserver-584f6f7c67-lh668" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:34.129516 env[1194]: time="2025-10-31T05:31:34.129468855Z" level=info msg="StopPodSandbox for \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\"" Oct 31 05:31:34.133160 env[1194]: time="2025-10-31T05:31:34.133121973Z" level=info msg="StopPodSandbox for \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\"" Oct 31 05:31:34.156779 systemd-networkd[1031]: cali6b3a9d85b44: Gained IPv6LL Oct 31 05:31:34.184409 systemd[1]: run-netns-cni\x2d52a13a22\x2d8488\x2de1cd\x2defc4\x2db5db25a96ccd.mount: Deactivated successfully. Oct 31 05:31:34.184509 systemd[1]: run-netns-cni\x2d967935cc\x2dbd36\x2df4d8\x2d7128\x2db2be393bba19.mount: Deactivated successfully. Oct 31 05:31:34.226861 env[1194]: time="2025-10-31T05:31:34.224222866Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:31:34.226861 env[1194]: time="2025-10-31T05:31:34.224304610Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:31:34.226861 env[1194]: time="2025-10-31T05:31:34.224317762Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:31:34.226861 env[1194]: time="2025-10-31T05:31:34.225304859Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4 pid=3833 runtime=io.containerd.runc.v2 Oct 31 05:31:34.228346 systemd-networkd[1031]: cali020d6d03832: Link UP Oct 31 05:31:34.232553 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali020d6d03832: link becomes ready Oct 31 05:31:34.232373 systemd-networkd[1031]: cali020d6d03832: Gained carrier Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:33.720 [INFO][3711] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:33.768 [INFO][3711] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0 coredns-674b8bbfcf- kube-system 488d3938-e6f8-42e4-a891-26530154283f 966 0 2025-10-31 05:30:51 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-29uxp.gb1.brightbox.com coredns-674b8bbfcf-gtt8c eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali020d6d03832 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" Namespace="kube-system" Pod="coredns-674b8bbfcf-gtt8c" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-" Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:33.768 [INFO][3711] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" Namespace="kube-system" Pod="coredns-674b8bbfcf-gtt8c" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:33.971 [INFO][3760] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" HandleID="k8s-pod-network.ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:33.971 [INFO][3760] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" HandleID="k8s-pod-network.ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000374150), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-29uxp.gb1.brightbox.com", "pod":"coredns-674b8bbfcf-gtt8c", "timestamp":"2025-10-31 05:31:33.971020307 +0000 UTC"}, Hostname:"srv-29uxp.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:33.971 [INFO][3760] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.059 [INFO][3760] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.059 [INFO][3760] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-29uxp.gb1.brightbox.com' Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.092 [INFO][3760] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.112 [INFO][3760] ipam/ipam.go 394: Looking up existing affinities for host host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.123 [INFO][3760] ipam/ipam.go 511: Trying affinity for 192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.133 [INFO][3760] ipam/ipam.go 158: Attempting to load block cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.138 [INFO][3760] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.138 [INFO][3760] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.48.192/26 handle="k8s-pod-network.ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.142 [INFO][3760] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.149 [INFO][3760] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.48.192/26 handle="k8s-pod-network.ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.177 [INFO][3760] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.48.196/26] block=192.168.48.192/26 handle="k8s-pod-network.ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.177 [INFO][3760] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.48.196/26] handle="k8s-pod-network.ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.177 [INFO][3760] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:34.274551 env[1194]: 2025-10-31 05:31:34.177 [INFO][3760] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.48.196/26] IPv6=[] ContainerID="ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" HandleID="k8s-pod-network.ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:34.275590 env[1194]: 2025-10-31 05:31:34.194 [INFO][3711] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" Namespace="kube-system" Pod="coredns-674b8bbfcf-gtt8c" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"488d3938-e6f8-42e4-a891-26530154283f", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 30, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"", Pod:"coredns-674b8bbfcf-gtt8c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali020d6d03832", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:34.275590 env[1194]: 2025-10-31 05:31:34.194 [INFO][3711] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.48.196/32] ContainerID="ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" Namespace="kube-system" Pod="coredns-674b8bbfcf-gtt8c" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:34.275590 env[1194]: 2025-10-31 05:31:34.194 [INFO][3711] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali020d6d03832 ContainerID="ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" Namespace="kube-system" Pod="coredns-674b8bbfcf-gtt8c" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:34.275590 env[1194]: 2025-10-31 05:31:34.233 [INFO][3711] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" Namespace="kube-system" Pod="coredns-674b8bbfcf-gtt8c" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:34.275590 env[1194]: 2025-10-31 05:31:34.233 [INFO][3711] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" Namespace="kube-system" Pod="coredns-674b8bbfcf-gtt8c" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"488d3938-e6f8-42e4-a891-26530154283f", ResourceVersion:"966", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 30, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db", Pod:"coredns-674b8bbfcf-gtt8c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali020d6d03832", MAC:"26:ef:2f:82:6e:02", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:34.275590 env[1194]: 2025-10-31 05:31:34.268 [INFO][3711] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db" Namespace="kube-system" Pod="coredns-674b8bbfcf-gtt8c" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:34.289645 systemd[1]: Started cri-containerd-bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4.scope. Oct 31 05:31:34.296182 systemd[1]: run-containerd-runc-k8s.io-bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4-runc.y80tIr.mount: Deactivated successfully. Oct 31 05:31:34.354659 systemd-networkd[1031]: cali4d416fac5f4: Link UP Oct 31 05:31:34.360835 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4d416fac5f4: link becomes ready Oct 31 05:31:34.359006 systemd-networkd[1031]: cali4d416fac5f4: Gained carrier Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:33.890 [INFO][3737] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:33.921 [INFO][3737] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0 coredns-674b8bbfcf- kube-system 092be9e0-94a3-4b5b-a357-28d27ef577b0 965 0 2025-10-31 05:30:51 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-29uxp.gb1.brightbox.com coredns-674b8bbfcf-qktmx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4d416fac5f4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" Namespace="kube-system" Pod="coredns-674b8bbfcf-qktmx" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-" Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:33.921 [INFO][3737] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" Namespace="kube-system" Pod="coredns-674b8bbfcf-qktmx" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.066 [INFO][3779] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" HandleID="k8s-pod-network.f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.070 [INFO][3779] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" HandleID="k8s-pod-network.f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002515d0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-29uxp.gb1.brightbox.com", "pod":"coredns-674b8bbfcf-qktmx", "timestamp":"2025-10-31 05:31:34.066464338 +0000 UTC"}, Hostname:"srv-29uxp.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.070 [INFO][3779] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.188 [INFO][3779] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.188 [INFO][3779] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-29uxp.gb1.brightbox.com' Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.219 [INFO][3779] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.242 [INFO][3779] ipam/ipam.go 394: Looking up existing affinities for host host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.265 [INFO][3779] ipam/ipam.go 511: Trying affinity for 192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.273 [INFO][3779] ipam/ipam.go 158: Attempting to load block cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.280 [INFO][3779] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.280 [INFO][3779] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.48.192/26 handle="k8s-pod-network.f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.298 [INFO][3779] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708 Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.305 [INFO][3779] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.48.192/26 handle="k8s-pod-network.f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.323 [INFO][3779] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.48.197/26] block=192.168.48.192/26 handle="k8s-pod-network.f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.323 [INFO][3779] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.48.197/26] handle="k8s-pod-network.f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.323 [INFO][3779] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:34.395451 env[1194]: 2025-10-31 05:31:34.323 [INFO][3779] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.48.197/26] IPv6=[] ContainerID="f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" HandleID="k8s-pod-network.f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:34.397257 env[1194]: 2025-10-31 05:31:34.328 [INFO][3737] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" Namespace="kube-system" Pod="coredns-674b8bbfcf-qktmx" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"092be9e0-94a3-4b5b-a357-28d27ef577b0", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 30, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"", Pod:"coredns-674b8bbfcf-qktmx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4d416fac5f4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:34.397257 env[1194]: 2025-10-31 05:31:34.329 [INFO][3737] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.48.197/32] ContainerID="f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" Namespace="kube-system" Pod="coredns-674b8bbfcf-qktmx" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:34.397257 env[1194]: 2025-10-31 05:31:34.329 [INFO][3737] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4d416fac5f4 ContainerID="f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" Namespace="kube-system" Pod="coredns-674b8bbfcf-qktmx" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:34.397257 env[1194]: 2025-10-31 05:31:34.361 [INFO][3737] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" Namespace="kube-system" Pod="coredns-674b8bbfcf-qktmx" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:34.397257 env[1194]: 2025-10-31 05:31:34.362 [INFO][3737] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" Namespace="kube-system" Pod="coredns-674b8bbfcf-qktmx" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"092be9e0-94a3-4b5b-a357-28d27ef577b0", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 30, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708", Pod:"coredns-674b8bbfcf-qktmx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4d416fac5f4", MAC:"86:0d:cd:e4:b2:9e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:34.397257 env[1194]: 2025-10-31 05:31:34.392 [INFO][3737] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708" Namespace="kube-system" Pod="coredns-674b8bbfcf-qktmx" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:34.406297 env[1194]: time="2025-10-31T05:31:34.406186706Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:31:34.408629 env[1194]: time="2025-10-31T05:31:34.408572897Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:31:34.408873 env[1194]: time="2025-10-31T05:31:34.408847876Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:31:34.409200 env[1194]: time="2025-10-31T05:31:34.409171142Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db pid=3896 runtime=io.containerd.runc.v2 Oct 31 05:31:34.437797 systemd-networkd[1031]: cali14ca1da4661: Link UP Oct 31 05:31:34.446681 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali14ca1da4661: link becomes ready Oct 31 05:31:34.444160 systemd-networkd[1031]: cali14ca1da4661: Gained carrier Oct 31 05:31:34.459550 kubelet[2011]: E1031 05:31:34.458716 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:31:34.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.465905 kernel: kauditd_printk_skb: 200 callbacks suppressed Oct 31 05:31:34.466213 kernel: audit: type=1400 audit(1761888694.463:1085): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.471092 kernel: audit: type=1400 audit(1761888694.463:1086): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.475540 kernel: audit: type=1400 audit(1761888694.463:1087): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.478131 systemd[1]: Started cri-containerd-ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db.scope. Oct 31 05:31:34.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.485389 kernel: audit: type=1400 audit(1761888694.463:1088): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.485826 kernel: audit: type=1400 audit(1761888694.463:1089): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.486084 kernel: audit: type=1400 audit(1761888694.463:1090): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.498958 kernel: audit: type=1400 audit(1761888694.463:1091): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.499089 kernel: audit: type=1400 audit(1761888694.463:1092): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.513633 kernel: audit: type=1400 audit(1761888694.463:1093): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.513749 kernel: audit: type=1400 audit(1761888694.464:1094): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.464000 audit: BPF prog-id=150 op=LOAD Oct 31 05:31:34.471000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.471000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3833 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333936656331653731646535386636663034663132623734376165 Oct 31 05:31:34.478000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.478000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3833 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333936656331653731646535386636663034663132623734376165 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit: BPF prog-id=151 op=LOAD Oct 31 05:31:34.488000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e6830 items=0 ppid=3833 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333936656331653731646535386636663034663132623734376165 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit: BPF prog-id=152 op=LOAD Oct 31 05:31:34.488000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e6878 items=0 ppid=3833 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333936656331653731646535386636663034663132623734376165 Oct 31 05:31:34.488000 audit: BPF prog-id=152 op=UNLOAD Oct 31 05:31:34.488000 audit: BPF prog-id=151 op=UNLOAD Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.488000 audit: BPF prog-id=153 op=LOAD Oct 31 05:31:34.488000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e6c88 items=0 ppid=3833 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333936656331653731646535386636663034663132623734376165 Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:33.822 [INFO][3723] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:33.901 [INFO][3723] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0 calico-kube-controllers-774b8c5f49- calico-system 66fd0aa1-ee8d-4f3e-828b-4549c47b74e9 967 0 2025-10-31 05:31:07 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:774b8c5f49 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-29uxp.gb1.brightbox.com calico-kube-controllers-774b8c5f49-wcstd eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali14ca1da4661 [] [] }} ContainerID="46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" Namespace="calico-system" Pod="calico-kube-controllers-774b8c5f49-wcstd" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-" Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:33.901 [INFO][3723] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" Namespace="calico-system" Pod="calico-kube-controllers-774b8c5f49-wcstd" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.140 [INFO][3777] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" HandleID="k8s-pod-network.46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.140 [INFO][3777] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" HandleID="k8s-pod-network.46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000372d90), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-29uxp.gb1.brightbox.com", "pod":"calico-kube-controllers-774b8c5f49-wcstd", "timestamp":"2025-10-31 05:31:34.140213918 +0000 UTC"}, Hostname:"srv-29uxp.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.140 [INFO][3777] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.324 [INFO][3777] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.324 [INFO][3777] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-29uxp.gb1.brightbox.com' Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.340 [INFO][3777] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.356 [INFO][3777] ipam/ipam.go 394: Looking up existing affinities for host host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.383 [INFO][3777] ipam/ipam.go 511: Trying affinity for 192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.386 [INFO][3777] ipam/ipam.go 158: Attempting to load block cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.391 [INFO][3777] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.392 [INFO][3777] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.48.192/26 handle="k8s-pod-network.46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.400 [INFO][3777] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904 Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.410 [INFO][3777] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.48.192/26 handle="k8s-pod-network.46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.427 [INFO][3777] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.48.198/26] block=192.168.48.192/26 handle="k8s-pod-network.46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.427 [INFO][3777] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.48.198/26] handle="k8s-pod-network.46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.427 [INFO][3777] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:34.543410 env[1194]: 2025-10-31 05:31:34.427 [INFO][3777] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.48.198/26] IPv6=[] ContainerID="46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" HandleID="k8s-pod-network.46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:34.544573 env[1194]: 2025-10-31 05:31:34.430 [INFO][3723] cni-plugin/k8s.go 418: Populated endpoint ContainerID="46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" Namespace="calico-system" Pod="calico-kube-controllers-774b8c5f49-wcstd" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0", GenerateName:"calico-kube-controllers-774b8c5f49-", Namespace:"calico-system", SelfLink:"", UID:"66fd0aa1-ee8d-4f3e-828b-4549c47b74e9", ResourceVersion:"967", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"774b8c5f49", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-774b8c5f49-wcstd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.48.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali14ca1da4661", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:34.544573 env[1194]: 2025-10-31 05:31:34.430 [INFO][3723] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.48.198/32] ContainerID="46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" Namespace="calico-system" Pod="calico-kube-controllers-774b8c5f49-wcstd" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:34.544573 env[1194]: 2025-10-31 05:31:34.430 [INFO][3723] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali14ca1da4661 ContainerID="46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" Namespace="calico-system" Pod="calico-kube-controllers-774b8c5f49-wcstd" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:34.544573 env[1194]: 2025-10-31 05:31:34.450 [INFO][3723] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" Namespace="calico-system" Pod="calico-kube-controllers-774b8c5f49-wcstd" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:34.544573 env[1194]: 2025-10-31 05:31:34.450 [INFO][3723] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" Namespace="calico-system" Pod="calico-kube-controllers-774b8c5f49-wcstd" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0", GenerateName:"calico-kube-controllers-774b8c5f49-", Namespace:"calico-system", SelfLink:"", UID:"66fd0aa1-ee8d-4f3e-828b-4549c47b74e9", ResourceVersion:"967", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"774b8c5f49", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904", Pod:"calico-kube-controllers-774b8c5f49-wcstd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.48.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali14ca1da4661", MAC:"a2:05:5a:ed:7c:87", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:34.544573 env[1194]: 2025-10-31 05:31:34.535 [INFO][3723] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904" Namespace="calico-system" Pod="calico-kube-controllers-774b8c5f49-wcstd" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:34.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.550000 audit: BPF prog-id=154 op=LOAD Oct 31 05:31:34.551000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.551000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3896 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363966313030336366386464653332376534363236633464643733 Oct 31 05:31:34.556000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.556000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3896 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363966313030336366386464653332376534363236633464643733 Oct 31 05:31:34.557000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.557000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.557000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.557000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.557000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.557000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.557000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.557000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.557000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.557000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.557000 audit: BPF prog-id=155 op=LOAD Oct 31 05:31:34.557000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002eca40 items=0 ppid=3896 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363966313030336366386464653332376534363236633464643733 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit: BPF prog-id=156 op=LOAD Oct 31 05:31:34.558000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002eca88 items=0 ppid=3896 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363966313030336366386464653332376534363236633464643733 Oct 31 05:31:34.558000 audit: BPF prog-id=156 op=UNLOAD Oct 31 05:31:34.558000 audit: BPF prog-id=155 op=UNLOAD Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { perfmon } for pid=3909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit[3909]: AVC avc: denied { bpf } for pid=3909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.558000 audit: BPF prog-id=157 op=LOAD Oct 31 05:31:34.558000 audit[3909]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002ece98 items=0 ppid=3896 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363966313030336366386464653332376534363236633464643733 Oct 31 05:31:34.611771 env[1194]: time="2025-10-31T05:31:34.608125603Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:31:34.611771 env[1194]: time="2025-10-31T05:31:34.608186874Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:31:34.611771 env[1194]: time="2025-10-31T05:31:34.608198583Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:31:34.611771 env[1194]: time="2025-10-31T05:31:34.608413793Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708 pid=3928 runtime=io.containerd.runc.v2 Oct 31 05:31:34.629942 env[1194]: time="2025-10-31T05:31:34.629879590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-gtt8c,Uid:488d3938-e6f8-42e4-a891-26530154283f,Namespace:kube-system,Attempt:1,} returns sandbox id \"ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db\"" Oct 31 05:31:34.641140 env[1194]: time="2025-10-31T05:31:34.640503880Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:31:34.641140 env[1194]: time="2025-10-31T05:31:34.640616196Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:31:34.641140 env[1194]: time="2025-10-31T05:31:34.640640335Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:31:34.641140 env[1194]: time="2025-10-31T05:31:34.640853909Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904 pid=3963 runtime=io.containerd.runc.v2 Oct 31 05:31:34.648949 env[1194]: time="2025-10-31T05:31:34.648893159Z" level=info msg="CreateContainer within sandbox \"ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 31 05:31:34.681113 env[1194]: time="2025-10-31T05:31:34.681038550Z" level=info msg="CreateContainer within sandbox \"ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"61ce957021d427a10e3bf435c0fe8128b5378517b1d4286f8201e1d2cdf8b579\"" Oct 31 05:31:34.685444 env[1194]: time="2025-10-31T05:31:34.685391453Z" level=info msg="StartContainer for \"61ce957021d427a10e3bf435c0fe8128b5378517b1d4286f8201e1d2cdf8b579\"" Oct 31 05:31:34.715980 systemd[1]: Started cri-containerd-46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904.scope. Oct 31 05:31:34.801533 systemd[1]: Started cri-containerd-f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708.scope. Oct 31 05:31:34.836754 systemd[1]: Started cri-containerd-61ce957021d427a10e3bf435c0fe8128b5378517b1d4286f8201e1d2cdf8b579.scope. Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.676 [INFO][3855] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.676 [INFO][3855] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" iface="eth0" netns="/var/run/netns/cni-1ea118ba-745a-f0bf-9b8d-0a08a1a41995" Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.676 [INFO][3855] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" iface="eth0" netns="/var/run/netns/cni-1ea118ba-745a-f0bf-9b8d-0a08a1a41995" Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.676 [INFO][3855] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" iface="eth0" netns="/var/run/netns/cni-1ea118ba-745a-f0bf-9b8d-0a08a1a41995" Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.676 [INFO][3855] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.676 [INFO][3855] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.817 [INFO][3984] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" HandleID="k8s-pod-network.fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.819 [INFO][3984] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.819 [INFO][3984] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.835 [WARNING][3984] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" HandleID="k8s-pod-network.fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.836 [INFO][3984] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" HandleID="k8s-pod-network.fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.841 [INFO][3984] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:34.848693 env[1194]: 2025-10-31 05:31:34.843 [INFO][3855] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:34.850240 env[1194]: time="2025-10-31T05:31:34.850183065Z" level=info msg="TearDown network for sandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\" successfully" Oct 31 05:31:34.850240 env[1194]: time="2025-10-31T05:31:34.850233115Z" level=info msg="StopPodSandbox for \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\" returns successfully" Oct 31 05:31:34.851453 env[1194]: time="2025-10-31T05:31:34.851417327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544d56dcbc-g5g87,Uid:d4b61754-f1af-4f1e-adb6-2e6093fbe9da,Namespace:calico-apiserver,Attempt:1,}" Oct 31 05:31:34.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.868000 audit: BPF prog-id=158 op=LOAD Oct 31 05:31:34.869000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.869000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3928 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376463326137663235363061336436666338343736663934326266 Oct 31 05:31:34.869000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.869000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3928 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376463326137663235363061336436666338343736663934326266 Oct 31 05:31:34.869000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.869000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.869000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.869000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.869000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.869000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.869000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.869000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.869000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.869000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.869000 audit: BPF prog-id=159 op=LOAD Oct 31 05:31:34.869000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025770 items=0 ppid=3928 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376463326137663235363061336436666338343736663934326266 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit: BPF prog-id=160 op=LOAD Oct 31 05:31:34.870000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000257b8 items=0 ppid=3928 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376463326137663235363061336436666338343736663934326266 Oct 31 05:31:34.870000 audit: BPF prog-id=160 op=UNLOAD Oct 31 05:31:34.870000 audit: BPF prog-id=159 op=UNLOAD Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { perfmon } for pid=3982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit[3982]: AVC avc: denied { bpf } for pid=3982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.870000 audit: BPF prog-id=161 op=LOAD Oct 31 05:31:34.870000 audit[3982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025bc8 items=0 ppid=3928 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633376463326137663235363061336436666338343736663934326266 Oct 31 05:31:34.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.926000 audit: BPF prog-id=162 op=LOAD Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3896 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636539353730323164343237613130653362663433356330666538 Oct 31 05:31:34.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3896 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636539353730323164343237613130653362663433356330666538 Oct 31 05:31:34.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit: BPF prog-id=163 op=LOAD Oct 31 05:31:34.929000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001e9dd0 items=0 ppid=3896 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636539353730323164343237613130653362663433356330666538 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit: BPF prog-id=164 op=LOAD Oct 31 05:31:34.929000 audit: BPF prog-id=165 op=LOAD Oct 31 05:31:34.929000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001e9e18 items=0 ppid=3896 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636539353730323164343237613130653362663433356330666538 Oct 31 05:31:34.929000 audit: BPF prog-id=165 op=UNLOAD Oct 31 05:31:34.929000 audit: BPF prog-id=163 op=UNLOAD Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3963 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436636133613964336538386333323936383633363238616466323164 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3963 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436636133613964336538386333323936383633363238616466323164 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit: BPF prog-id=166 op=LOAD Oct 31 05:31:34.930000 audit[3973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000293050 items=0 ppid=3963 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436636133613964336538386333323936383633363238616466323164 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit: BPF prog-id=167 op=LOAD Oct 31 05:31:34.930000 audit[3973]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000293098 items=0 ppid=3963 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436636133613964336538386333323936383633363238616466323164 Oct 31 05:31:34.930000 audit: BPF prog-id=167 op=UNLOAD Oct 31 05:31:34.930000 audit: BPF prog-id=166 op=UNLOAD Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { perfmon } for pid=3973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit[3973]: AVC avc: denied { bpf } for pid=3973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.930000 audit: BPF prog-id=168 op=LOAD Oct 31 05:31:34.930000 audit[3973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002934a8 items=0 ppid=3963 pid=3973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436636133613964336538386333323936383633363238616466323164 Oct 31 05:31:34.929000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:34.929000 audit: BPF prog-id=169 op=LOAD Oct 31 05:31:34.929000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00032a228 items=0 ppid=3896 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:34.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631636539353730323164343237613130653362663433356330666538 Oct 31 05:31:34.959925 env[1194]: time="2025-10-31T05:31:34.959876167Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-584f6f7c67-lh668,Uid:efc77054-b6cb-470d-b188-31acbe754356,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4\"" Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.677 [INFO][3853] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.677 [INFO][3853] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" iface="eth0" netns="/var/run/netns/cni-e5d48f71-17b7-bd21-0906-da1f556995f5" Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.678 [INFO][3853] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" iface="eth0" netns="/var/run/netns/cni-e5d48f71-17b7-bd21-0906-da1f556995f5" Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.678 [INFO][3853] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" iface="eth0" netns="/var/run/netns/cni-e5d48f71-17b7-bd21-0906-da1f556995f5" Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.678 [INFO][3853] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.678 [INFO][3853] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.918 [INFO][3992] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" HandleID="k8s-pod-network.e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Workload="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.919 [INFO][3992] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.920 [INFO][3992] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.954 [WARNING][3992] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" HandleID="k8s-pod-network.e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Workload="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.954 [INFO][3992] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" HandleID="k8s-pod-network.e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Workload="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.960 [INFO][3992] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:34.968432 env[1194]: 2025-10-31 05:31:34.964 [INFO][3853] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:34.971186 env[1194]: time="2025-10-31T05:31:34.968603696Z" level=info msg="TearDown network for sandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\" successfully" Oct 31 05:31:34.971186 env[1194]: time="2025-10-31T05:31:34.968638601Z" level=info msg="StopPodSandbox for \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\" returns successfully" Oct 31 05:31:34.972270 env[1194]: time="2025-10-31T05:31:34.971972679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-g8kkv,Uid:a36976db-14b7-47fe-acb9-23fcd77c496c,Namespace:calico-system,Attempt:1,}" Oct 31 05:31:34.975743 env[1194]: time="2025-10-31T05:31:34.975703329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:31:35.026509 env[1194]: time="2025-10-31T05:31:35.024750862Z" level=info msg="StartContainer for \"61ce957021d427a10e3bf435c0fe8128b5378517b1d4286f8201e1d2cdf8b579\" returns successfully" Oct 31 05:31:35.080628 env[1194]: time="2025-10-31T05:31:35.080579225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-qktmx,Uid:092be9e0-94a3-4b5b-a357-28d27ef577b0,Namespace:kube-system,Attempt:1,} returns sandbox id \"f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708\"" Oct 31 05:31:35.095006 env[1194]: time="2025-10-31T05:31:35.094958733Z" level=info msg="CreateContainer within sandbox \"f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 31 05:31:35.128693 env[1194]: time="2025-10-31T05:31:35.128565810Z" level=info msg="StopPodSandbox for \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\"" Oct 31 05:31:35.145368 env[1194]: time="2025-10-31T05:31:35.145309444Z" level=info msg="CreateContainer within sandbox \"f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"353448bb290cdabdc57aea8ca98cdb283a65b7b1c380853e478e1cb8cebf305c\"" Oct 31 05:31:35.148687 env[1194]: time="2025-10-31T05:31:35.146788023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-774b8c5f49-wcstd,Uid:66fd0aa1-ee8d-4f3e-828b-4549c47b74e9,Namespace:calico-system,Attempt:1,} returns sandbox id \"46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904\"" Oct 31 05:31:35.148687 env[1194]: time="2025-10-31T05:31:35.146827051Z" level=info msg="StartContainer for \"353448bb290cdabdc57aea8ca98cdb283a65b7b1c380853e478e1cb8cebf305c\"" Oct 31 05:31:35.186488 systemd[1]: run-netns-cni\x2d1ea118ba\x2d745a\x2df0bf\x2d9b8d\x2d0a08a1a41995.mount: Deactivated successfully. Oct 31 05:31:35.186835 systemd[1]: run-netns-cni\x2de5d48f71\x2d17b7\x2dbd21\x2d0906\x2dda1f556995f5.mount: Deactivated successfully. Oct 31 05:31:35.292972 env[1194]: time="2025-10-31T05:31:35.292906894Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:35.297833 env[1194]: time="2025-10-31T05:31:35.297738137Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:31:35.298335 kubelet[2011]: E1031 05:31:35.298267 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:31:35.298797 kubelet[2011]: E1031 05:31:35.298376 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:31:35.298924 kubelet[2011]: E1031 05:31:35.298854 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xd6jg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-584f6f7c67-lh668_calico-apiserver(efc77054-b6cb-470d-b188-31acbe754356): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:35.299440 env[1194]: time="2025-10-31T05:31:35.299408620Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 05:31:35.300441 kubelet[2011]: E1031 05:31:35.300394 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356" Oct 31 05:31:35.321077 systemd[1]: Started cri-containerd-353448bb290cdabdc57aea8ca98cdb283a65b7b1c380853e478e1cb8cebf305c.scope. Oct 31 05:31:35.324380 systemd[1]: run-containerd-runc-k8s.io-353448bb290cdabdc57aea8ca98cdb283a65b7b1c380853e478e1cb8cebf305c-runc.yIsDHe.mount: Deactivated successfully. Oct 31 05:31:35.387894 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 05:31:35.388066 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6e136835282: link becomes ready Oct 31 05:31:35.388000 audit[4043]: AVC avc: denied { getattr } for pid=4043 comm="coredns" path="cgroup:[4026532676]" dev="nsfs" ino=4026532676 scontext=system_u:system_r:svirt_lxc_net_t:s0:c800,c1021 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 31 05:31:35.388000 audit[4043]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014c918 a2=c0002629f8 a3=0 items=0 ppid=3896 pid=4043 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c800,c1021 key=(null) Oct 31 05:31:35.388000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 31 05:31:35.390896 systemd-networkd[1031]: cali6e136835282: Link UP Oct 31 05:31:35.391158 systemd-networkd[1031]: cali6e136835282: Gained carrier Oct 31 05:31:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.396000 audit: BPF prog-id=170 op=LOAD Oct 31 05:31:35.399000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.399000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3928 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335333434386262323930636461626463353761656138636139386364 Oct 31 05:31:35.399000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.399000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3928 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335333434386262323930636461626463353761656138636139386364 Oct 31 05:31:35.399000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.399000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.399000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.399000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.399000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.399000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.399000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.399000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.399000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.399000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.399000 audit: BPF prog-id=171 op=LOAD Oct 31 05:31:35.399000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00017bde0 items=0 ppid=3928 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335333434386262323930636461626463353761656138636139386364 Oct 31 05:31:35.401000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.401000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.401000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.401000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.401000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.401000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.401000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.401000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.401000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.401000 audit: BPF prog-id=172 op=LOAD Oct 31 05:31:35.401000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00017be28 items=0 ppid=3928 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335333434386262323930636461626463353761656138636139386364 Oct 31 05:31:35.402000 audit: BPF prog-id=172 op=UNLOAD Oct 31 05:31:35.402000 audit: BPF prog-id=171 op=UNLOAD Oct 31 05:31:35.402000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.402000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.402000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.402000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.402000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.402000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.402000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.402000 audit[4119]: AVC avc: denied { perfmon } for pid=4119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.402000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.402000 audit[4119]: AVC avc: denied { bpf } for pid=4119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.402000 audit: BPF prog-id=173 op=LOAD Oct 31 05:31:35.402000 audit[4119]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003bc238 items=0 ppid=3928 pid=4119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335333434386262323930636461626463353761656138636139386364 Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.060 [INFO][4038] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.102 [INFO][4038] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0 calico-apiserver-544d56dcbc- calico-apiserver d4b61754-f1af-4f1e-adb6-2e6093fbe9da 1002 0 2025-10-31 05:31:01 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:544d56dcbc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-29uxp.gb1.brightbox.com calico-apiserver-544d56dcbc-g5g87 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali6e136835282 [] [] }} ContainerID="2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-g5g87" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-" Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.102 [INFO][4038] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-g5g87" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.232 [INFO][4097] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" HandleID="k8s-pod-network.2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.235 [INFO][4097] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" HandleID="k8s-pod-network.2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00032a850), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-29uxp.gb1.brightbox.com", "pod":"calico-apiserver-544d56dcbc-g5g87", "timestamp":"2025-10-31 05:31:35.232404383 +0000 UTC"}, Hostname:"srv-29uxp.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.235 [INFO][4097] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.235 [INFO][4097] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.235 [INFO][4097] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-29uxp.gb1.brightbox.com' Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.254 [INFO][4097] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.273 [INFO][4097] ipam/ipam.go 394: Looking up existing affinities for host host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.294 [INFO][4097] ipam/ipam.go 511: Trying affinity for 192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.306 [INFO][4097] ipam/ipam.go 158: Attempting to load block cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.335 [INFO][4097] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.335 [INFO][4097] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.48.192/26 handle="k8s-pod-network.2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.345 [INFO][4097] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.352 [INFO][4097] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.48.192/26 handle="k8s-pod-network.2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.363 [INFO][4097] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.48.199/26] block=192.168.48.192/26 handle="k8s-pod-network.2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.363 [INFO][4097] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.48.199/26] handle="k8s-pod-network.2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.363 [INFO][4097] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:35.422583 env[1194]: 2025-10-31 05:31:35.363 [INFO][4097] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.48.199/26] IPv6=[] ContainerID="2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" HandleID="k8s-pod-network.2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:35.423438 env[1194]: 2025-10-31 05:31:35.375 [INFO][4038] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-g5g87" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0", GenerateName:"calico-apiserver-544d56dcbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"d4b61754-f1af-4f1e-adb6-2e6093fbe9da", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544d56dcbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-544d56dcbc-g5g87", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6e136835282", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:35.423438 env[1194]: 2025-10-31 05:31:35.375 [INFO][4038] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.48.199/32] ContainerID="2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-g5g87" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:35.423438 env[1194]: 2025-10-31 05:31:35.376 [INFO][4038] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6e136835282 ContainerID="2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-g5g87" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:35.423438 env[1194]: 2025-10-31 05:31:35.388 [INFO][4038] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-g5g87" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:35.423438 env[1194]: 2025-10-31 05:31:35.389 [INFO][4038] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-g5g87" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0", GenerateName:"calico-apiserver-544d56dcbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"d4b61754-f1af-4f1e-adb6-2e6093fbe9da", ResourceVersion:"1002", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544d56dcbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a", Pod:"calico-apiserver-544d56dcbc-g5g87", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6e136835282", MAC:"f6:08:8d:7c:b3:67", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:35.423438 env[1194]: 2025-10-31 05:31:35.410 [INFO][4038] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a" Namespace="calico-apiserver" Pod="calico-apiserver-544d56dcbc-g5g87" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:35.485432 kubelet[2011]: E1031 05:31:35.485373 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356" Oct 31 05:31:35.528985 env[1194]: time="2025-10-31T05:31:35.528928993Z" level=info msg="StartContainer for \"353448bb290cdabdc57aea8ca98cdb283a65b7b1c380853e478e1cb8cebf305c\" returns successfully" Oct 31 05:31:35.539031 env[1194]: time="2025-10-31T05:31:35.538921592Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:31:35.539031 env[1194]: time="2025-10-31T05:31:35.538987475Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:31:35.539031 env[1194]: time="2025-10-31T05:31:35.538999550Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:31:35.539597 env[1194]: time="2025-10-31T05:31:35.539561704Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a pid=4171 runtime=io.containerd.runc.v2 Oct 31 05:31:35.552151 kubelet[2011]: I1031 05:31:35.551422 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-gtt8c" podStartSLOduration=44.551373501 podStartE2EDuration="44.551373501s" podCreationTimestamp="2025-10-31 05:30:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:31:35.513007209 +0000 UTC m=+49.765625492" watchObservedRunningTime="2025-10-31 05:31:35.551373501 +0000 UTC m=+49.803992051" Oct 31 05:31:35.607961 systemd[1]: Started cri-containerd-2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a.scope. Oct 31 05:31:35.616799 env[1194]: time="2025-10-31T05:31:35.616744042Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:35.617888 env[1194]: time="2025-10-31T05:31:35.617815489Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 05:31:35.621634 kubelet[2011]: E1031 05:31:35.621471 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:31:35.621634 kubelet[2011]: E1031 05:31:35.621613 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:31:35.621890 kubelet[2011]: E1031 05:31:35.621835 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xdbnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-774b8c5f49-wcstd_calico-system(66fd0aa1-ee8d-4f3e-828b-4549c47b74e9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:35.623271 kubelet[2011]: E1031 05:31:35.623209 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" podUID="66fd0aa1-ee8d-4f3e-828b-4549c47b74e9" Oct 31 05:31:35.640000 audit[4142]: AVC avc: denied { getattr } for pid=4142 comm="coredns" path="cgroup:[4026532439]" dev="nsfs" ino=4026532439 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c833 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 31 05:31:35.640000 audit[4142]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014c930 a2=c000397a38 a3=0 items=0 ppid=3928 pid=4142 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c833 key=(null) Oct 31 05:31:35.640000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 31 05:31:35.631163 systemd-networkd[1031]: cali020d6d03832: Gained IPv6LL Oct 31 05:31:35.733131 systemd-networkd[1031]: cali9ab87a11fdc: Link UP Oct 31 05:31:35.741286 systemd-networkd[1031]: cali9ab87a11fdc: Gained carrier Oct 31 05:31:35.742445 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9ab87a11fdc: link becomes ready Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.471 [INFO][4121] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.471 [INFO][4121] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" iface="eth0" netns="/var/run/netns/cni-5a94a752-bb39-e2ed-9963-1f46b84c1598" Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.471 [INFO][4121] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" iface="eth0" netns="/var/run/netns/cni-5a94a752-bb39-e2ed-9963-1f46b84c1598" Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.472 [INFO][4121] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" iface="eth0" netns="/var/run/netns/cni-5a94a752-bb39-e2ed-9963-1f46b84c1598" Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.472 [INFO][4121] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.472 [INFO][4121] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.607 [INFO][4167] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" HandleID="k8s-pod-network.6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Workload="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.607 [INFO][4167] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.707 [INFO][4167] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.715 [WARNING][4167] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" HandleID="k8s-pod-network.6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Workload="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.715 [INFO][4167] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" HandleID="k8s-pod-network.6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Workload="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.718 [INFO][4167] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:35.749092 env[1194]: 2025-10-31 05:31:35.742 [INFO][4121] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:35.749720 env[1194]: time="2025-10-31T05:31:35.749331270Z" level=info msg="TearDown network for sandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\" successfully" Oct 31 05:31:35.749720 env[1194]: time="2025-10-31T05:31:35.749366670Z" level=info msg="StopPodSandbox for \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\" returns successfully" Oct 31 05:31:35.750721 env[1194]: time="2025-10-31T05:31:35.750675149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-tpvj9,Uid:4169be37-9b82-4526-bd73-17cdc3a8253e,Namespace:calico-system,Attempt:1,}" Oct 31 05:31:35.756724 systemd-networkd[1031]: cali79cec2f36a8: Gained IPv6LL Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.254 [INFO][4067] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.298 [INFO][4067] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0 csi-node-driver- calico-system a36976db-14b7-47fe-acb9-23fcd77c496c 1001 0 2025-10-31 05:31:07 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-29uxp.gb1.brightbox.com csi-node-driver-g8kkv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali9ab87a11fdc [] [] }} ContainerID="f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" Namespace="calico-system" Pod="csi-node-driver-g8kkv" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-" Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.299 [INFO][4067] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" Namespace="calico-system" Pod="csi-node-driver-g8kkv" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.563 [INFO][4137] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" HandleID="k8s-pod-network.f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" Workload="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.564 [INFO][4137] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" HandleID="k8s-pod-network.f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" Workload="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004fbe0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-29uxp.gb1.brightbox.com", "pod":"csi-node-driver-g8kkv", "timestamp":"2025-10-31 05:31:35.563107348 +0000 UTC"}, Hostname:"srv-29uxp.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.564 [INFO][4137] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.564 [INFO][4137] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.564 [INFO][4137] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-29uxp.gb1.brightbox.com' Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.580 [INFO][4137] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.640 [INFO][4137] ipam/ipam.go 394: Looking up existing affinities for host host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.658 [INFO][4137] ipam/ipam.go 511: Trying affinity for 192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.661 [INFO][4137] ipam/ipam.go 158: Attempting to load block cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.666 [INFO][4137] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.666 [INFO][4137] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.48.192/26 handle="k8s-pod-network.f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.670 [INFO][4137] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03 Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.686 [INFO][4137] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.48.192/26 handle="k8s-pod-network.f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.707 [INFO][4137] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.48.200/26] block=192.168.48.192/26 handle="k8s-pod-network.f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.707 [INFO][4137] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.48.200/26] handle="k8s-pod-network.f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.707 [INFO][4137] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:35.803331 env[1194]: 2025-10-31 05:31:35.707 [INFO][4137] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.48.200/26] IPv6=[] ContainerID="f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" HandleID="k8s-pod-network.f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" Workload="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:35.804310 env[1194]: 2025-10-31 05:31:35.717 [INFO][4067] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" Namespace="calico-system" Pod="csi-node-driver-g8kkv" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a36976db-14b7-47fe-acb9-23fcd77c496c", ResourceVersion:"1001", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-g8kkv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.48.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9ab87a11fdc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:35.804310 env[1194]: 2025-10-31 05:31:35.718 [INFO][4067] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.48.200/32] ContainerID="f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" Namespace="calico-system" Pod="csi-node-driver-g8kkv" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:35.804310 env[1194]: 2025-10-31 05:31:35.719 [INFO][4067] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9ab87a11fdc ContainerID="f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" Namespace="calico-system" Pod="csi-node-driver-g8kkv" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:35.804310 env[1194]: 2025-10-31 05:31:35.749 [INFO][4067] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" Namespace="calico-system" Pod="csi-node-driver-g8kkv" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:35.804310 env[1194]: 2025-10-31 05:31:35.751 [INFO][4067] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" Namespace="calico-system" Pod="csi-node-driver-g8kkv" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a36976db-14b7-47fe-acb9-23fcd77c496c", ResourceVersion:"1001", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03", Pod:"csi-node-driver-g8kkv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.48.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9ab87a11fdc", MAC:"92:f9:35:a5:b6:a5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:35.804310 env[1194]: 2025-10-31 05:31:35.800 [INFO][4067] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03" Namespace="calico-system" Pod="csi-node-driver-g8kkv" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:35.831000 audit[4205]: NETFILTER_CFG table=filter:109 family=2 entries=20 op=nft_register_rule pid=4205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:35.831000 audit[4205]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc7c7b3fd0 a2=0 a3=7ffc7c7b3fbc items=0 ppid=2153 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.831000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:35.844000 audit[4205]: NETFILTER_CFG table=nat:110 family=2 entries=14 op=nft_register_rule pid=4205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:35.844000 audit[4205]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc7c7b3fd0 a2=0 a3=0 items=0 ppid=2153 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.844000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:35.848821 env[1194]: time="2025-10-31T05:31:35.848732181Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:31:35.848951 env[1194]: time="2025-10-31T05:31:35.848832151Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:31:35.848951 env[1194]: time="2025-10-31T05:31:35.848858695Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:31:35.849105 env[1194]: time="2025-10-31T05:31:35.849072902Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03 pid=4242 runtime=io.containerd.runc.v2 Oct 31 05:31:35.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.861000 audit: BPF prog-id=174 op=LOAD Oct 31 05:31:35.867000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.867000 audit[4188]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4171 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306234633732333130386662356662336335643030323261646564 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4171 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306234633732333130386662356662336335643030323261646564 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit: BPF prog-id=175 op=LOAD Oct 31 05:31:35.868000 audit[4188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ddd30 items=0 ppid=4171 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306234633732333130386662356662336335643030323261646564 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit: BPF prog-id=176 op=LOAD Oct 31 05:31:35.868000 audit[4188]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ddd78 items=0 ppid=4171 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306234633732333130386662356662336335643030323261646564 Oct 31 05:31:35.868000 audit: BPF prog-id=176 op=UNLOAD Oct 31 05:31:35.868000 audit: BPF prog-id=175 op=UNLOAD Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.868000 audit: BPF prog-id=177 op=LOAD Oct 31 05:31:35.868000 audit[4188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c6188 items=0 ppid=4171 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263306234633732333130386662356662336335643030323261646564 Oct 31 05:31:35.893884 systemd[1]: Started cri-containerd-f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03.scope. Oct 31 05:31:35.948783 systemd-networkd[1031]: cali4d416fac5f4: Gained IPv6LL Oct 31 05:31:35.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.984000 audit: BPF prog-id=178 op=LOAD Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4242 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631626433646339666462653737623333663865623131616330616439 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4242 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631626433646339666462653737623333663865623131616330616439 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit: BPF prog-id=179 op=LOAD Oct 31 05:31:35.985000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003be4a0 items=0 ppid=4242 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631626433646339666462653737623333663865623131616330616439 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit: BPF prog-id=180 op=LOAD Oct 31 05:31:35.985000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003be4e8 items=0 ppid=4242 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631626433646339666462653737623333663865623131616330616439 Oct 31 05:31:35.985000 audit: BPF prog-id=180 op=UNLOAD Oct 31 05:31:35.985000 audit: BPF prog-id=179 op=UNLOAD Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { perfmon } for pid=4252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit[4252]: AVC avc: denied { bpf } for pid=4252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:35.985000 audit: BPF prog-id=181 op=LOAD Oct 31 05:31:35.985000 audit[4252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003be8f8 items=0 ppid=4242 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:35.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631626433646339666462653737623333663865623131616330616439 Oct 31 05:31:36.022442 env[1194]: time="2025-10-31T05:31:36.022387132Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-g8kkv,Uid:a36976db-14b7-47fe-acb9-23fcd77c496c,Namespace:calico-system,Attempt:1,} returns sandbox id \"f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03\"" Oct 31 05:31:36.024913 env[1194]: time="2025-10-31T05:31:36.024837547Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 05:31:36.029000 audit[4281]: NETFILTER_CFG table=filter:111 family=2 entries=20 op=nft_register_rule pid=4281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:36.029000 audit[4281]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffcca1c03c0 a2=0 a3=7ffcca1c03ac items=0 ppid=2153 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:36.041000 audit[4281]: NETFILTER_CFG table=nat:112 family=2 entries=14 op=nft_register_rule pid=4281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:36.041000 audit[4281]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcca1c03c0 a2=0 a3=0 items=0 ppid=2153 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:36.056765 systemd-networkd[1031]: cali1f271b261ce: Link UP Oct 31 05:31:36.063664 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1f271b261ce: link becomes ready Oct 31 05:31:36.059582 systemd-networkd[1031]: cali1f271b261ce: Gained carrier Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:35.849 [INFO][4220] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:35.879 [INFO][4220] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0 goldmane-666569f655- calico-system 4169be37-9b82-4526-bd73-17cdc3a8253e 1020 0 2025-10-31 05:31:05 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:666569f655 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s srv-29uxp.gb1.brightbox.com goldmane-666569f655-tpvj9 eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali1f271b261ce [] [] }} ContainerID="a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" Namespace="calico-system" Pod="goldmane-666569f655-tpvj9" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-" Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:35.882 [INFO][4220] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" Namespace="calico-system" Pod="goldmane-666569f655-tpvj9" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:35.953 [INFO][4264] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" HandleID="k8s-pod-network.a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" Workload="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:35.954 [INFO][4264] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" HandleID="k8s-pod-network.a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" Workload="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4fe0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-29uxp.gb1.brightbox.com", "pod":"goldmane-666569f655-tpvj9", "timestamp":"2025-10-31 05:31:35.953671771 +0000 UTC"}, Hostname:"srv-29uxp.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:35.954 [INFO][4264] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:35.954 [INFO][4264] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:35.954 [INFO][4264] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-29uxp.gb1.brightbox.com' Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:35.965 [INFO][4264] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:35.978 [INFO][4264] ipam/ipam.go 394: Looking up existing affinities for host host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:35.989 [INFO][4264] ipam/ipam.go 511: Trying affinity for 192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:35.993 [INFO][4264] ipam/ipam.go 158: Attempting to load block cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:36.009 [INFO][4264] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.48.192/26 host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:36.009 [INFO][4264] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.48.192/26 handle="k8s-pod-network.a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:36.015 [INFO][4264] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0 Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:36.030 [INFO][4264] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.48.192/26 handle="k8s-pod-network.a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:36.049 [INFO][4264] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.48.201/26] block=192.168.48.192/26 handle="k8s-pod-network.a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:36.049 [INFO][4264] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.48.201/26] handle="k8s-pod-network.a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" host="srv-29uxp.gb1.brightbox.com" Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:36.049 [INFO][4264] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:36.084671 env[1194]: 2025-10-31 05:31:36.050 [INFO][4264] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.48.201/26] IPv6=[] ContainerID="a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" HandleID="k8s-pod-network.a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" Workload="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:36.085590 env[1194]: 2025-10-31 05:31:36.052 [INFO][4220] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" Namespace="calico-system" Pod="goldmane-666569f655-tpvj9" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"4169be37-9b82-4526-bd73-17cdc3a8253e", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"", Pod:"goldmane-666569f655-tpvj9", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.48.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali1f271b261ce", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:36.085590 env[1194]: 2025-10-31 05:31:36.052 [INFO][4220] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.48.201/32] ContainerID="a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" Namespace="calico-system" Pod="goldmane-666569f655-tpvj9" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:36.085590 env[1194]: 2025-10-31 05:31:36.052 [INFO][4220] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1f271b261ce ContainerID="a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" Namespace="calico-system" Pod="goldmane-666569f655-tpvj9" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:36.085590 env[1194]: 2025-10-31 05:31:36.060 [INFO][4220] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" Namespace="calico-system" Pod="goldmane-666569f655-tpvj9" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:36.085590 env[1194]: 2025-10-31 05:31:36.060 [INFO][4220] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" Namespace="calico-system" Pod="goldmane-666569f655-tpvj9" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"4169be37-9b82-4526-bd73-17cdc3a8253e", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0", Pod:"goldmane-666569f655-tpvj9", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.48.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali1f271b261ce", MAC:"d2:2a:15:5d:14:5a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:36.085590 env[1194]: 2025-10-31 05:31:36.079 [INFO][4220] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0" Namespace="calico-system" Pod="goldmane-666569f655-tpvj9" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:36.108375 env[1194]: time="2025-10-31T05:31:36.105438892Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:31:36.108375 env[1194]: time="2025-10-31T05:31:36.105503829Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:31:36.108375 env[1194]: time="2025-10-31T05:31:36.105516257Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:31:36.108671 env[1194]: time="2025-10-31T05:31:36.108543546Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0 pid=4302 runtime=io.containerd.runc.v2 Oct 31 05:31:36.142060 systemd-networkd[1031]: cali14ca1da4661: Gained IPv6LL Oct 31 05:31:36.171121 systemd[1]: Started cri-containerd-a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0.scope. Oct 31 05:31:36.184777 systemd[1]: run-netns-cni\x2d5a94a752\x2dbb39\x2de2ed\x2d9963\x2d1f46b84c1598.mount: Deactivated successfully. Oct 31 05:31:36.322205 env[1194]: time="2025-10-31T05:31:36.322149317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-544d56dcbc-g5g87,Uid:d4b61754-f1af-4f1e-adb6-2e6093fbe9da,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a\"" Oct 31 05:31:36.339688 env[1194]: time="2025-10-31T05:31:36.339546593Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:36.340101 env[1194]: time="2025-10-31T05:31:36.340048577Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 05:31:36.340511 kubelet[2011]: E1031 05:31:36.340446 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:31:36.341028 kubelet[2011]: E1031 05:31:36.340988 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:31:36.341737 env[1194]: time="2025-10-31T05:31:36.341703929Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:31:36.343724 kubelet[2011]: E1031 05:31:36.343618 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mz8pd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-g8kkv_calico-system(a36976db-14b7-47fe-acb9-23fcd77c496c): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:36.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit: BPF prog-id=182 op=LOAD Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4302 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132333833366161386236396231356566303162316235393436346539 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4302 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132333833366161386236396231356566303162316235393436346539 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit: BPF prog-id=183 op=LOAD Oct 31 05:31:36.352000 audit[4312]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001efef0 items=0 ppid=4302 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132333833366161386236396231356566303162316235393436346539 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit: BPF prog-id=184 op=LOAD Oct 31 05:31:36.352000 audit[4312]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001eff38 items=0 ppid=4302 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132333833366161386236396231356566303162316235393436346539 Oct 31 05:31:36.352000 audit: BPF prog-id=184 op=UNLOAD Oct 31 05:31:36.352000 audit: BPF prog-id=183 op=UNLOAD Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { perfmon } for pid=4312 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit[4312]: AVC avc: denied { bpf } for pid=4312 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.352000 audit: BPF prog-id=185 op=LOAD Oct 31 05:31:36.352000 audit[4312]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d4348 items=0 ppid=4302 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132333833366161386236396231356566303162316235393436346539 Oct 31 05:31:36.423429 env[1194]: time="2025-10-31T05:31:36.423280953Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-tpvj9,Uid:4169be37-9b82-4526-bd73-17cdc3a8253e,Namespace:calico-system,Attempt:1,} returns sandbox id \"a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0\"" Oct 31 05:31:36.430000 audit[4369]: AVC avc: denied { bpf } for pid=4369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.430000 audit[4369]: AVC avc: denied { bpf } for pid=4369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.430000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.430000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.430000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.430000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.430000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.430000 audit[4369]: AVC avc: denied { bpf } for pid=4369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.430000 audit[4369]: AVC avc: denied { bpf } for pid=4369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.430000 audit: BPF prog-id=186 op=LOAD Oct 31 05:31:36.430000 audit[4369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc20331000 a2=98 a3=1fffffffffffffff items=0 ppid=3768 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.430000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 05:31:36.433000 audit: BPF prog-id=186 op=UNLOAD Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { bpf } for pid=4369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { bpf } for pid=4369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { bpf } for pid=4369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { bpf } for pid=4369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit: BPF prog-id=187 op=LOAD Oct 31 05:31:36.434000 audit[4369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc20330ee0 a2=94 a3=3 items=0 ppid=3768 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.434000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 05:31:36.434000 audit: BPF prog-id=187 op=UNLOAD Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { bpf } for pid=4369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { bpf } for pid=4369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { bpf } for pid=4369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { bpf } for pid=4369 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit: BPF prog-id=188 op=LOAD Oct 31 05:31:36.434000 audit[4369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc20330f20 a2=94 a3=7ffc20331100 items=0 ppid=3768 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.434000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 05:31:36.434000 audit: BPF prog-id=188 op=UNLOAD Oct 31 05:31:36.434000 audit[4369]: AVC avc: denied { perfmon } for pid=4369 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.434000 audit[4369]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc20330ff0 a2=50 a3=a000000085 items=0 ppid=3768 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.434000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 05:31:36.437000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.437000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.437000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.437000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.437000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.437000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.437000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.437000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.437000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.437000 audit: BPF prog-id=189 op=LOAD Oct 31 05:31:36.437000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffecdb9a360 a2=98 a3=3 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.437000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.438000 audit: BPF prog-id=189 op=UNLOAD Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit: BPF prog-id=190 op=LOAD Oct 31 05:31:36.439000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffecdb9a150 a2=94 a3=54428f items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.439000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.439000 audit: BPF prog-id=190 op=UNLOAD Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.439000 audit: BPF prog-id=191 op=LOAD Oct 31 05:31:36.439000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffecdb9a180 a2=94 a3=2 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.439000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.440000 audit: BPF prog-id=191 op=UNLOAD Oct 31 05:31:36.460810 systemd-networkd[1031]: cali6e136835282: Gained IPv6LL Oct 31 05:31:36.517788 kubelet[2011]: E1031 05:31:36.517735 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" podUID="66fd0aa1-ee8d-4f3e-828b-4549c47b74e9" Oct 31 05:31:36.520067 kubelet[2011]: E1031 05:31:36.518363 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356" Oct 31 05:31:36.541604 kubelet[2011]: I1031 05:31:36.541536 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-qktmx" podStartSLOduration=45.541500706 podStartE2EDuration="45.541500706s" podCreationTimestamp="2025-10-31 05:30:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:31:36.518501328 +0000 UTC m=+50.771119610" watchObservedRunningTime="2025-10-31 05:31:36.541500706 +0000 UTC m=+50.794118989" Oct 31 05:31:36.620000 audit[4372]: NETFILTER_CFG table=filter:113 family=2 entries=17 op=nft_register_rule pid=4372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:36.620000 audit[4372]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc6b45ce20 a2=0 a3=7ffc6b45ce0c items=0 ppid=2153 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.620000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:36.625000 audit[4372]: NETFILTER_CFG table=nat:114 family=2 entries=35 op=nft_register_chain pid=4372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:36.625000 audit[4372]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc6b45ce20 a2=0 a3=7ffc6b45ce0c items=0 ppid=2153 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.625000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:36.651655 env[1194]: time="2025-10-31T05:31:36.651589072Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:36.652318 env[1194]: time="2025-10-31T05:31:36.652237513Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:31:36.652591 kubelet[2011]: E1031 05:31:36.652547 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:31:36.652753 kubelet[2011]: E1031 05:31:36.652731 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:31:36.653139 kubelet[2011]: E1031 05:31:36.653094 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-g5zkf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-544d56dcbc-g5g87_calico-apiserver(d4b61754-f1af-4f1e-adb6-2e6093fbe9da): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:36.653846 env[1194]: time="2025-10-31T05:31:36.653792889Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 05:31:36.655148 kubelet[2011]: E1031 05:31:36.655114 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" podUID="d4b61754-f1af-4f1e-adb6-2e6093fbe9da" Oct 31 05:31:36.681000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.681000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.681000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.681000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.681000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.681000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.681000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.681000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.681000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.681000 audit: BPF prog-id=192 op=LOAD Oct 31 05:31:36.681000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffecdb9a040 a2=94 a3=1 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.681000 audit: BPF prog-id=192 op=UNLOAD Oct 31 05:31:36.681000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.681000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffecdb9a110 a2=50 a3=7ffecdb9a1f0 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.695000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.695000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecdb9a050 a2=28 a3=0 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.696000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.696000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecdb9a080 a2=28 a3=0 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.696000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.696000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecdb99f90 a2=28 a3=0 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.696000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.696000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecdb9a0a0 a2=28 a3=0 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.696000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.696000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecdb9a080 a2=28 a3=0 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.696000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.696000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecdb9a070 a2=28 a3=0 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.697000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.697000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecdb9a0a0 a2=28 a3=0 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.697000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.697000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecdb9a080 a2=28 a3=0 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.697000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.697000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecdb9a0a0 a2=28 a3=0 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.697000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.697000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffecdb9a070 a2=28 a3=0 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.697000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.697000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffecdb9a0e0 a2=28 a3=0 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.698000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.698000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffecdb99e90 a2=50 a3=1 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.698000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.698000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.698000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.698000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.698000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.698000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.698000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.698000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.698000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.698000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.698000 audit: BPF prog-id=193 op=LOAD Oct 31 05:31:36.698000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffecdb99e90 a2=94 a3=5 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.698000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.698000 audit: BPF prog-id=193 op=UNLOAD Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.699000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffecdb99f40 a2=50 a3=1 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.699000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.699000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffecdb9a060 a2=4 a3=38 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.699000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.699000 audit[4370]: AVC avc: denied { confidentiality } for pid=4370 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:31:36.699000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffecdb9a0b0 a2=94 a3=6 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.699000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.700000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.700000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.700000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.700000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.700000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.700000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.700000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.700000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.700000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.700000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.700000 audit[4370]: AVC avc: denied { confidentiality } for pid=4370 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:31:36.700000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffecdb99860 a2=94 a3=88 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.700000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.701000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.701000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.701000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.701000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.701000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.701000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.701000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.701000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.701000 audit[4370]: AVC avc: denied { perfmon } for pid=4370 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.701000 audit[4370]: AVC avc: denied { bpf } for pid=4370 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.701000 audit[4370]: AVC avc: denied { confidentiality } for pid=4370 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:31:36.701000 audit[4370]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffecdb99860 a2=94 a3=88 items=0 ppid=3768 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.701000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit: BPF prog-id=194 op=LOAD Oct 31 05:31:36.723000 audit[4375]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1de86a80 a2=98 a3=1999999999999999 items=0 ppid=3768 pid=4375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.723000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 05:31:36.723000 audit: BPF prog-id=194 op=UNLOAD Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit: BPF prog-id=195 op=LOAD Oct 31 05:31:36.723000 audit[4375]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1de86960 a2=94 a3=ffff items=0 ppid=3768 pid=4375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.723000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 05:31:36.723000 audit: BPF prog-id=195 op=UNLOAD Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { perfmon } for pid=4375 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit[4375]: AVC avc: denied { bpf } for pid=4375 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.723000 audit: BPF prog-id=196 op=LOAD Oct 31 05:31:36.723000 audit[4375]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd1de869a0 a2=94 a3=7ffd1de86b80 items=0 ppid=3768 pid=4375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.723000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 05:31:36.723000 audit: BPF prog-id=196 op=UNLOAD Oct 31 05:31:36.859126 systemd-networkd[1031]: vxlan.calico: Link UP Oct 31 05:31:36.859140 systemd-networkd[1031]: vxlan.calico: Gained carrier Oct 31 05:31:36.893000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.893000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.893000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.893000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.893000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.893000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.893000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.893000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.893000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.893000 audit: BPF prog-id=197 op=LOAD Oct 31 05:31:36.893000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd24227fe0 a2=98 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.893000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.893000 audit: BPF prog-id=197 op=UNLOAD Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit: BPF prog-id=198 op=LOAD Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd24227df0 a2=94 a3=54428f items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit: BPF prog-id=198 op=UNLOAD Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit: BPF prog-id=199 op=LOAD Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd24227e20 a2=94 a3=2 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit: BPF prog-id=199 op=UNLOAD Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd24227cf0 a2=28 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd24227d20 a2=28 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd24227c30 a2=28 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd24227d40 a2=28 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd24227d20 a2=28 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd24227d10 a2=28 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd24227d40 a2=28 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd24227d20 a2=28 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd24227d40 a2=28 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd24227d10 a2=28 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd24227d80 a2=28 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.894000 audit: BPF prog-id=200 op=LOAD Oct 31 05:31:36.894000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd24227bf0 a2=94 a3=0 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.894000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.894000 audit: BPF prog-id=200 op=UNLOAD Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd24227be0 a2=50 a3=2800 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.895000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd24227be0 a2=50 a3=2800 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.895000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit: BPF prog-id=201 op=LOAD Oct 31 05:31:36.895000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd24227400 a2=94 a3=2 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.895000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.895000 audit: BPF prog-id=201 op=UNLOAD Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { perfmon } for pid=4403 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit[4403]: AVC avc: denied { bpf } for pid=4403 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.895000 audit: BPF prog-id=202 op=LOAD Oct 31 05:31:36.895000 audit[4403]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd24227500 a2=94 a3=30 items=0 ppid=3768 pid=4403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.895000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit: BPF prog-id=203 op=LOAD Oct 31 05:31:36.899000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2d157a70 a2=98 a3=0 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.899000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:36.899000 audit: BPF prog-id=203 op=UNLOAD Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit: BPF prog-id=204 op=LOAD Oct 31 05:31:36.899000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe2d157860 a2=94 a3=54428f items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.899000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:36.899000 audit: BPF prog-id=204 op=UNLOAD Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:36.899000 audit: BPF prog-id=205 op=LOAD Oct 31 05:31:36.899000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe2d157890 a2=94 a3=2 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:36.899000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:36.899000 audit: BPF prog-id=205 op=UNLOAD Oct 31 05:31:36.961954 env[1194]: time="2025-10-31T05:31:36.961694084Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:36.963271 env[1194]: time="2025-10-31T05:31:36.963126265Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 05:31:36.967831 kubelet[2011]: E1031 05:31:36.966672 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:31:36.967831 kubelet[2011]: E1031 05:31:36.966734 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:31:36.967831 kubelet[2011]: E1031 05:31:36.967016 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mz8pd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-g8kkv_calico-system(a36976db-14b7-47fe-acb9-23fcd77c496c): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:36.971938 env[1194]: time="2025-10-31T05:31:36.967507837Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 05:31:36.972001 kubelet[2011]: E1031 05:31:36.968891 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:31:37.094000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.094000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.094000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.094000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.094000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.094000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.094000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.094000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.094000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.094000 audit: BPF prog-id=206 op=LOAD Oct 31 05:31:37.094000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe2d157750 a2=94 a3=1 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.094000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.095000 audit: BPF prog-id=206 op=UNLOAD Oct 31 05:31:37.095000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.095000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe2d157820 a2=50 a3=7ffe2d157900 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.095000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2d157760 a2=28 a3=0 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2d157790 a2=28 a3=0 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2d1576a0 a2=28 a3=0 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2d1577b0 a2=28 a3=0 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2d157790 a2=28 a3=0 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2d157780 a2=28 a3=0 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2d1577b0 a2=28 a3=0 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2d157790 a2=28 a3=0 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2d1577b0 a2=28 a3=0 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2d157780 a2=28 a3=0 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe2d1577f0 a2=28 a3=0 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe2d1575a0 a2=50 a3=1 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit: BPF prog-id=207 op=LOAD Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2d1575a0 a2=94 a3=5 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit: BPF prog-id=207 op=UNLOAD Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe2d157650 a2=50 a3=1 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe2d157770 a2=4 a3=38 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.107000 audit[4405]: AVC avc: denied { confidentiality } for pid=4405 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:31:37.107000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe2d1577c0 a2=94 a3=6 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { confidentiality } for pid=4405 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:31:37.108000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe2d156f70 a2=94 a3=88 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.108000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: AVC avc: denied { perfmon } for pid=4405 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.108000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe2d156f70 a2=94 a3=88 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.108000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.111000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.111000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe2d1589a0 a2=10 a3=f8f00800 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.111000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.111000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.111000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe2d158840 a2=10 a3=3 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.111000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.111000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.111000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe2d1587e0 a2=10 a3=3 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.111000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.111000 audit[4405]: AVC avc: denied { bpf } for pid=4405 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:31:37.111000 audit[4405]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe2d1587e0 a2=10 a3=7 items=0 ppid=3768 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.111000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:31:37.121000 audit: BPF prog-id=202 op=UNLOAD Oct 31 05:31:37.251000 audit[4448]: NETFILTER_CFG table=mangle:115 family=2 entries=16 op=nft_register_chain pid=4448 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:31:37.251000 audit[4448]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff31cfd760 a2=0 a3=7fff31cfd74c items=0 ppid=3768 pid=4448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.251000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:31:37.268000 audit[4447]: NETFILTER_CFG table=raw:116 family=2 entries=21 op=nft_register_chain pid=4447 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:31:37.268000 audit[4447]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe7bd2c7b0 a2=0 a3=7ffe7bd2c79c items=0 ppid=3768 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.268000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:31:37.272000 audit[4449]: NETFILTER_CFG table=nat:117 family=2 entries=15 op=nft_register_chain pid=4449 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:31:37.272000 audit[4449]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc10ce6300 a2=0 a3=7ffc10ce62ec items=0 ppid=3768 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.272000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:31:37.279446 env[1194]: time="2025-10-31T05:31:37.279378151Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:37.280037 env[1194]: time="2025-10-31T05:31:37.279971495Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 05:31:37.280356 kubelet[2011]: E1031 05:31:37.280304 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:31:37.280430 kubelet[2011]: E1031 05:31:37.280374 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:31:37.280816 kubelet[2011]: E1031 05:31:37.280614 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2cqm5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-tpvj9_calico-system(4169be37-9b82-4526-bd73-17cdc3a8253e): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:37.281963 kubelet[2011]: E1031 05:31:37.281886 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-tpvj9" podUID="4169be37-9b82-4526-bd73-17cdc3a8253e" Oct 31 05:31:37.292810 systemd-networkd[1031]: cali9ab87a11fdc: Gained IPv6LL Oct 31 05:31:37.276000 audit[4452]: NETFILTER_CFG table=filter:118 family=2 entries=362 op=nft_register_chain pid=4452 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:31:37.276000 audit[4452]: SYSCALL arch=c000003e syscall=46 success=yes exit=215308 a0=3 a1=7ffdeee551d0 a2=0 a3=7ffdeee551bc items=0 ppid=3768 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.276000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:31:37.357041 systemd-networkd[1031]: cali1f271b261ce: Gained IPv6LL Oct 31 05:31:37.528608 kubelet[2011]: E1031 05:31:37.527474 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" podUID="d4b61754-f1af-4f1e-adb6-2e6093fbe9da" Oct 31 05:31:37.528608 kubelet[2011]: E1031 05:31:37.527938 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-tpvj9" podUID="4169be37-9b82-4526-bd73-17cdc3a8253e" Oct 31 05:31:37.531747 kubelet[2011]: E1031 05:31:37.529971 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:31:37.605000 audit[4464]: NETFILTER_CFG table=filter:119 family=2 entries=14 op=nft_register_rule pid=4464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:37.605000 audit[4464]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc03e262f0 a2=0 a3=7ffc03e262dc items=0 ppid=2153 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.605000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:37.624000 audit[4464]: NETFILTER_CFG table=nat:120 family=2 entries=56 op=nft_register_chain pid=4464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:37.624000 audit[4464]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc03e262f0 a2=0 a3=7ffc03e262dc items=0 ppid=2153 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:37.624000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:37.996844 systemd-networkd[1031]: vxlan.calico: Gained IPv6LL Oct 31 05:31:38.649000 audit[4469]: NETFILTER_CFG table=filter:121 family=2 entries=14 op=nft_register_rule pid=4469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:38.649000 audit[4469]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcfef06200 a2=0 a3=7ffcfef061ec items=0 ppid=2153 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:38.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:38.653000 audit[4469]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:31:38.653000 audit[4469]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcfef06200 a2=0 a3=7ffcfef061ec items=0 ppid=2153 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:31:38.653000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:31:40.848637 kernel: kauditd_printk_skb: 1067 callbacks suppressed Oct 31 05:31:40.849168 kernel: audit: type=1400 audit(1761888700.844:1361): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:40.844000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:40.844000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:40.844000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002dc1a00 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:31:40.859991 kernel: audit: type=1400 audit(1761888700.844:1362): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:40.860068 kernel: audit: type=1300 audit(1761888700.844:1361): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002dc1a00 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:31:40.860096 kernel: audit: type=1327 audit(1761888700.844:1361): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:31:40.844000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:31:40.844000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fd1260 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:31:40.868806 kernel: audit: type=1300 audit(1761888700.844:1362): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fd1260 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:31:40.868893 kernel: audit: type=1327 audit(1761888700.844:1362): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:31:40.844000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:31:41.849000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:41.879639 kernel: audit: type=1400 audit(1761888701.849:1363): avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:41.880373 kernel: audit: type=1300 audit(1761888701.849:1363): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00d7e03c0 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:31:41.880412 kernel: audit: type=1327 audit(1761888701.849:1363): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:31:41.880452 kernel: audit: type=1400 audit(1761888701.873:1364): avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525841 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:41.849000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00d7e03c0 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:31:41.849000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:31:41.873000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525841 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:41.873000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00d7e0420 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:31:41.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:31:41.892000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:41.892000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00dc03860 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:31:41.892000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:31:41.893000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:41.893000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00d7e0450 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:31:41.893000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:31:41.894000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:41.894000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00dc60600 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:31:41.894000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:31:41.894000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:41.894000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00d9c5f80 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:31:41.894000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:31:46.121972 env[1194]: time="2025-10-31T05:31:46.121877077Z" level=info msg="StopPodSandbox for \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\"" Oct 31 05:31:46.167235 env[1194]: time="2025-10-31T05:31:46.167186632Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 05:31:46.326884 env[1194]: 2025-10-31 05:31:46.236 [WARNING][4491] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0", GenerateName:"calico-apiserver-544d56dcbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"d4b61754-f1af-4f1e-adb6-2e6093fbe9da", ResourceVersion:"1075", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544d56dcbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a", Pod:"calico-apiserver-544d56dcbc-g5g87", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6e136835282", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:46.326884 env[1194]: 2025-10-31 05:31:46.237 [INFO][4491] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:46.326884 env[1194]: 2025-10-31 05:31:46.237 [INFO][4491] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" iface="eth0" netns="" Oct 31 05:31:46.326884 env[1194]: 2025-10-31 05:31:46.237 [INFO][4491] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:46.326884 env[1194]: 2025-10-31 05:31:46.237 [INFO][4491] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:46.326884 env[1194]: 2025-10-31 05:31:46.295 [INFO][4498] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" HandleID="k8s-pod-network.fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:46.326884 env[1194]: 2025-10-31 05:31:46.295 [INFO][4498] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:46.326884 env[1194]: 2025-10-31 05:31:46.295 [INFO][4498] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:46.326884 env[1194]: 2025-10-31 05:31:46.316 [WARNING][4498] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" HandleID="k8s-pod-network.fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:46.326884 env[1194]: 2025-10-31 05:31:46.316 [INFO][4498] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" HandleID="k8s-pod-network.fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:46.326884 env[1194]: 2025-10-31 05:31:46.321 [INFO][4498] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:46.326884 env[1194]: 2025-10-31 05:31:46.324 [INFO][4491] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:46.328194 env[1194]: time="2025-10-31T05:31:46.327962584Z" level=info msg="TearDown network for sandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\" successfully" Oct 31 05:31:46.328194 env[1194]: time="2025-10-31T05:31:46.328012746Z" level=info msg="StopPodSandbox for \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\" returns successfully" Oct 31 05:31:46.329399 env[1194]: time="2025-10-31T05:31:46.329359383Z" level=info msg="RemovePodSandbox for \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\"" Oct 31 05:31:46.329740 env[1194]: time="2025-10-31T05:31:46.329663798Z" level=info msg="Forcibly stopping sandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\"" Oct 31 05:31:46.469763 env[1194]: 2025-10-31 05:31:46.383 [WARNING][4512] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0", GenerateName:"calico-apiserver-544d56dcbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"d4b61754-f1af-4f1e-adb6-2e6093fbe9da", ResourceVersion:"1075", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544d56dcbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"2c0b4c723108fb5fb3c5d0022aded3ed60638712ff852f46f7b41b23b060948a", Pod:"calico-apiserver-544d56dcbc-g5g87", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6e136835282", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:46.469763 env[1194]: 2025-10-31 05:31:46.384 [INFO][4512] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:46.469763 env[1194]: 2025-10-31 05:31:46.384 [INFO][4512] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" iface="eth0" netns="" Oct 31 05:31:46.469763 env[1194]: 2025-10-31 05:31:46.384 [INFO][4512] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:46.469763 env[1194]: 2025-10-31 05:31:46.384 [INFO][4512] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:46.469763 env[1194]: 2025-10-31 05:31:46.444 [INFO][4519] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" HandleID="k8s-pod-network.fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:46.469763 env[1194]: 2025-10-31 05:31:46.445 [INFO][4519] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:46.469763 env[1194]: 2025-10-31 05:31:46.445 [INFO][4519] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:46.469763 env[1194]: 2025-10-31 05:31:46.462 [WARNING][4519] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" HandleID="k8s-pod-network.fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:46.469763 env[1194]: 2025-10-31 05:31:46.462 [INFO][4519] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" HandleID="k8s-pod-network.fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--g5g87-eth0" Oct 31 05:31:46.469763 env[1194]: 2025-10-31 05:31:46.465 [INFO][4519] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:46.469763 env[1194]: 2025-10-31 05:31:46.467 [INFO][4512] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e" Oct 31 05:31:46.470718 env[1194]: time="2025-10-31T05:31:46.470504402Z" level=info msg="TearDown network for sandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\" successfully" Oct 31 05:31:46.474283 env[1194]: time="2025-10-31T05:31:46.474213126Z" level=info msg="RemovePodSandbox \"fbbdd22cfa2beac260980e1f1325a1302c8c84638ce9394bb143dcc89edd364e\" returns successfully" Oct 31 05:31:46.475837 env[1194]: time="2025-10-31T05:31:46.475803399Z" level=info msg="StopPodSandbox for \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\"" Oct 31 05:31:46.476621 env[1194]: time="2025-10-31T05:31:46.476581235Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:46.477312 env[1194]: time="2025-10-31T05:31:46.477253440Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 05:31:46.477835 kubelet[2011]: E1031 05:31:46.477725 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:31:46.478330 kubelet[2011]: E1031 05:31:46.477885 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:31:46.479124 kubelet[2011]: E1031 05:31:46.479048 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:c724eceb2e944e5f951eec5826565ec8,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-drf8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d487dbcdc-xbgtz_calico-system(f8918c31-0985-4c54-9c84-3f7bcbddeb56): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:46.485466 env[1194]: time="2025-10-31T05:31:46.485367028Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 05:31:46.627251 env[1194]: 2025-10-31 05:31:46.576 [WARNING][4534] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0", GenerateName:"calico-apiserver-544d56dcbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"844e14a9-59ae-4490-8511-4b0d9cac9971", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544d56dcbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e", Pod:"calico-apiserver-544d56dcbc-xpjhh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6b3a9d85b44", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:46.627251 env[1194]: 2025-10-31 05:31:46.577 [INFO][4534] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:46.627251 env[1194]: 2025-10-31 05:31:46.577 [INFO][4534] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" iface="eth0" netns="" Oct 31 05:31:46.627251 env[1194]: 2025-10-31 05:31:46.577 [INFO][4534] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:46.627251 env[1194]: 2025-10-31 05:31:46.577 [INFO][4534] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:46.627251 env[1194]: 2025-10-31 05:31:46.609 [INFO][4542] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" HandleID="k8s-pod-network.e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:46.627251 env[1194]: 2025-10-31 05:31:46.609 [INFO][4542] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:46.627251 env[1194]: 2025-10-31 05:31:46.610 [INFO][4542] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:46.627251 env[1194]: 2025-10-31 05:31:46.620 [WARNING][4542] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" HandleID="k8s-pod-network.e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:46.627251 env[1194]: 2025-10-31 05:31:46.620 [INFO][4542] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" HandleID="k8s-pod-network.e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:46.627251 env[1194]: 2025-10-31 05:31:46.623 [INFO][4542] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:46.627251 env[1194]: 2025-10-31 05:31:46.625 [INFO][4534] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:46.628325 env[1194]: time="2025-10-31T05:31:46.627903851Z" level=info msg="TearDown network for sandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\" successfully" Oct 31 05:31:46.628325 env[1194]: time="2025-10-31T05:31:46.627951153Z" level=info msg="StopPodSandbox for \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\" returns successfully" Oct 31 05:31:46.629083 env[1194]: time="2025-10-31T05:31:46.629052736Z" level=info msg="RemovePodSandbox for \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\"" Oct 31 05:31:46.629356 env[1194]: time="2025-10-31T05:31:46.629251170Z" level=info msg="Forcibly stopping sandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\"" Oct 31 05:31:46.742396 env[1194]: 2025-10-31 05:31:46.694 [WARNING][4556] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0", GenerateName:"calico-apiserver-544d56dcbc-", Namespace:"calico-apiserver", SelfLink:"", UID:"844e14a9-59ae-4490-8511-4b0d9cac9971", ResourceVersion:"997", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"544d56dcbc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"0411b8ea17200ce780e2901c2772dffd7cf53cd68d6e8785fa9b40eba706204e", Pod:"calico-apiserver-544d56dcbc-xpjhh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali6b3a9d85b44", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:46.742396 env[1194]: 2025-10-31 05:31:46.695 [INFO][4556] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:46.742396 env[1194]: 2025-10-31 05:31:46.695 [INFO][4556] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" iface="eth0" netns="" Oct 31 05:31:46.742396 env[1194]: 2025-10-31 05:31:46.695 [INFO][4556] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:46.742396 env[1194]: 2025-10-31 05:31:46.695 [INFO][4556] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:46.742396 env[1194]: 2025-10-31 05:31:46.723 [INFO][4564] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" HandleID="k8s-pod-network.e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:46.742396 env[1194]: 2025-10-31 05:31:46.723 [INFO][4564] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:46.742396 env[1194]: 2025-10-31 05:31:46.723 [INFO][4564] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:46.742396 env[1194]: 2025-10-31 05:31:46.734 [WARNING][4564] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" HandleID="k8s-pod-network.e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:46.742396 env[1194]: 2025-10-31 05:31:46.735 [INFO][4564] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" HandleID="k8s-pod-network.e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--544d56dcbc--xpjhh-eth0" Oct 31 05:31:46.742396 env[1194]: 2025-10-31 05:31:46.737 [INFO][4564] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:46.742396 env[1194]: 2025-10-31 05:31:46.740 [INFO][4556] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd" Oct 31 05:31:46.743274 env[1194]: time="2025-10-31T05:31:46.743225963Z" level=info msg="TearDown network for sandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\" successfully" Oct 31 05:31:46.746233 env[1194]: time="2025-10-31T05:31:46.746196338Z" level=info msg="RemovePodSandbox \"e0110164a52e5353bd5c272407a88554c9375994da993296a8046755422789bd\" returns successfully" Oct 31 05:31:46.747309 env[1194]: time="2025-10-31T05:31:46.747265726Z" level=info msg="StopPodSandbox for \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\"" Oct 31 05:31:46.809094 env[1194]: time="2025-10-31T05:31:46.809023656Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:46.810278 env[1194]: time="2025-10-31T05:31:46.810219585Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 05:31:46.810940 kubelet[2011]: E1031 05:31:46.810872 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:31:46.811075 kubelet[2011]: E1031 05:31:46.810948 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:31:46.811250 kubelet[2011]: E1031 05:31:46.811144 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-drf8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d487dbcdc-xbgtz_calico-system(f8918c31-0985-4c54-9c84-3f7bcbddeb56): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:46.813291 kubelet[2011]: E1031 05:31:46.812924 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-d487dbcdc-xbgtz" podUID="f8918c31-0985-4c54-9c84-3f7bcbddeb56" Oct 31 05:31:46.895000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:46.909817 kernel: kauditd_printk_skb: 14 callbacks suppressed Oct 31 05:31:46.909998 kernel: audit: type=1400 audit(1761888706.895:1369): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:46.895000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fe8d40 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:31:46.919971 kernel: audit: type=1300 audit(1761888706.895:1369): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fe8d40 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:31:46.895000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:31:46.924566 kernel: audit: type=1327 audit(1761888706.895:1369): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:31:46.924689 env[1194]: 2025-10-31 05:31:46.820 [WARNING][4580] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"4169be37-9b82-4526-bd73-17cdc3a8253e", ResourceVersion:"1079", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0", Pod:"goldmane-666569f655-tpvj9", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.48.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali1f271b261ce", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:46.924689 env[1194]: 2025-10-31 05:31:46.821 [INFO][4580] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:46.924689 env[1194]: 2025-10-31 05:31:46.821 [INFO][4580] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" iface="eth0" netns="" Oct 31 05:31:46.924689 env[1194]: 2025-10-31 05:31:46.821 [INFO][4580] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:46.924689 env[1194]: 2025-10-31 05:31:46.821 [INFO][4580] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:46.924689 env[1194]: 2025-10-31 05:31:46.876 [INFO][4587] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" HandleID="k8s-pod-network.6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Workload="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:46.924689 env[1194]: 2025-10-31 05:31:46.876 [INFO][4587] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:46.924689 env[1194]: 2025-10-31 05:31:46.876 [INFO][4587] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:46.924689 env[1194]: 2025-10-31 05:31:46.889 [WARNING][4587] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" HandleID="k8s-pod-network.6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Workload="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:46.924689 env[1194]: 2025-10-31 05:31:46.889 [INFO][4587] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" HandleID="k8s-pod-network.6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Workload="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:46.924689 env[1194]: 2025-10-31 05:31:46.895 [INFO][4587] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:46.924689 env[1194]: 2025-10-31 05:31:46.915 [INFO][4580] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:46.925419 env[1194]: time="2025-10-31T05:31:46.924720532Z" level=info msg="TearDown network for sandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\" successfully" Oct 31 05:31:46.925419 env[1194]: time="2025-10-31T05:31:46.924755941Z" level=info msg="StopPodSandbox for \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\" returns successfully" Oct 31 05:31:46.925419 env[1194]: time="2025-10-31T05:31:46.925267793Z" level=info msg="RemovePodSandbox for \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\"" Oct 31 05:31:46.925419 env[1194]: time="2025-10-31T05:31:46.925296832Z" level=info msg="Forcibly stopping sandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\"" Oct 31 05:31:46.904000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:46.933583 kernel: audit: type=1400 audit(1761888706.904:1370): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:46.904000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fe8d60 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:31:46.904000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:31:46.943218 kernel: audit: type=1300 audit(1761888706.904:1370): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fe8d60 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:31:46.943327 kernel: audit: type=1327 audit(1761888706.904:1370): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:31:46.906000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:46.906000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fe8d80 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:31:46.952429 kernel: audit: type=1400 audit(1761888706.906:1371): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:46.952631 kernel: audit: type=1300 audit(1761888706.906:1371): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fe8d80 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:31:46.952682 kernel: audit: type=1327 audit(1761888706.906:1371): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:31:46.906000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:31:46.911000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:46.961557 kernel: audit: type=1400 audit(1761888706.911:1372): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:31:46.911000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002dc1f40 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:31:46.911000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:31:47.055758 env[1194]: 2025-10-31 05:31:47.000 [WARNING][4602] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"4169be37-9b82-4526-bd73-17cdc3a8253e", ResourceVersion:"1079", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"a23836aa8b69b15ef01b1b59464e9b231d63e8aff22f0f57934a3146dfc57af0", Pod:"goldmane-666569f655-tpvj9", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.48.201/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali1f271b261ce", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:47.055758 env[1194]: 2025-10-31 05:31:47.001 [INFO][4602] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:47.055758 env[1194]: 2025-10-31 05:31:47.001 [INFO][4602] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" iface="eth0" netns="" Oct 31 05:31:47.055758 env[1194]: 2025-10-31 05:31:47.001 [INFO][4602] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:47.055758 env[1194]: 2025-10-31 05:31:47.001 [INFO][4602] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:47.055758 env[1194]: 2025-10-31 05:31:47.036 [INFO][4609] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" HandleID="k8s-pod-network.6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Workload="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:47.055758 env[1194]: 2025-10-31 05:31:47.036 [INFO][4609] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:47.055758 env[1194]: 2025-10-31 05:31:47.036 [INFO][4609] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:47.055758 env[1194]: 2025-10-31 05:31:47.046 [WARNING][4609] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" HandleID="k8s-pod-network.6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Workload="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:47.055758 env[1194]: 2025-10-31 05:31:47.046 [INFO][4609] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" HandleID="k8s-pod-network.6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Workload="srv--29uxp.gb1.brightbox.com-k8s-goldmane--666569f655--tpvj9-eth0" Oct 31 05:31:47.055758 env[1194]: 2025-10-31 05:31:47.048 [INFO][4609] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:47.055758 env[1194]: 2025-10-31 05:31:47.051 [INFO][4602] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34" Oct 31 05:31:47.055758 env[1194]: time="2025-10-31T05:31:47.054715428Z" level=info msg="TearDown network for sandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\" successfully" Oct 31 05:31:47.058135 env[1194]: time="2025-10-31T05:31:47.058090598Z" level=info msg="RemovePodSandbox \"6ef2c45fb9e4b1e04968f0b02556f42f2198c2c92b086d49edc258035a647a34\" returns successfully" Oct 31 05:31:47.058846 env[1194]: time="2025-10-31T05:31:47.058817935Z" level=info msg="StopPodSandbox for \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\"" Oct 31 05:31:47.173269 env[1194]: 2025-10-31 05:31:47.120 [WARNING][4624] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0", GenerateName:"calico-kube-controllers-774b8c5f49-", Namespace:"calico-system", SelfLink:"", UID:"66fd0aa1-ee8d-4f3e-828b-4549c47b74e9", ResourceVersion:"1053", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"774b8c5f49", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904", Pod:"calico-kube-controllers-774b8c5f49-wcstd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.48.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali14ca1da4661", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:47.173269 env[1194]: 2025-10-31 05:31:47.120 [INFO][4624] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:47.173269 env[1194]: 2025-10-31 05:31:47.120 [INFO][4624] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" iface="eth0" netns="" Oct 31 05:31:47.173269 env[1194]: 2025-10-31 05:31:47.120 [INFO][4624] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:47.173269 env[1194]: 2025-10-31 05:31:47.120 [INFO][4624] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:47.173269 env[1194]: 2025-10-31 05:31:47.153 [INFO][4631] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" HandleID="k8s-pod-network.38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:47.173269 env[1194]: 2025-10-31 05:31:47.153 [INFO][4631] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:47.173269 env[1194]: 2025-10-31 05:31:47.153 [INFO][4631] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:47.173269 env[1194]: 2025-10-31 05:31:47.166 [WARNING][4631] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" HandleID="k8s-pod-network.38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:47.173269 env[1194]: 2025-10-31 05:31:47.166 [INFO][4631] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" HandleID="k8s-pod-network.38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:47.173269 env[1194]: 2025-10-31 05:31:47.168 [INFO][4631] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:47.173269 env[1194]: 2025-10-31 05:31:47.171 [INFO][4624] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:47.174250 env[1194]: time="2025-10-31T05:31:47.173271239Z" level=info msg="TearDown network for sandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\" successfully" Oct 31 05:31:47.174250 env[1194]: time="2025-10-31T05:31:47.173316799Z" level=info msg="StopPodSandbox for \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\" returns successfully" Oct 31 05:31:47.174250 env[1194]: time="2025-10-31T05:31:47.173983385Z" level=info msg="RemovePodSandbox for \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\"" Oct 31 05:31:47.174250 env[1194]: time="2025-10-31T05:31:47.174018447Z" level=info msg="Forcibly stopping sandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\"" Oct 31 05:31:47.333731 env[1194]: 2025-10-31 05:31:47.219 [WARNING][4645] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0", GenerateName:"calico-kube-controllers-774b8c5f49-", Namespace:"calico-system", SelfLink:"", UID:"66fd0aa1-ee8d-4f3e-828b-4549c47b74e9", ResourceVersion:"1053", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"774b8c5f49", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"46ca3a9d3e88c3296863628adf21d8c4997eaa70a84a140652a7d075b9552904", Pod:"calico-kube-controllers-774b8c5f49-wcstd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.48.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali14ca1da4661", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:47.333731 env[1194]: 2025-10-31 05:31:47.220 [INFO][4645] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:47.333731 env[1194]: 2025-10-31 05:31:47.220 [INFO][4645] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" iface="eth0" netns="" Oct 31 05:31:47.333731 env[1194]: 2025-10-31 05:31:47.220 [INFO][4645] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:47.333731 env[1194]: 2025-10-31 05:31:47.220 [INFO][4645] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:47.333731 env[1194]: 2025-10-31 05:31:47.311 [INFO][4652] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" HandleID="k8s-pod-network.38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:47.333731 env[1194]: 2025-10-31 05:31:47.312 [INFO][4652] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:47.333731 env[1194]: 2025-10-31 05:31:47.316 [INFO][4652] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:47.333731 env[1194]: 2025-10-31 05:31:47.325 [WARNING][4652] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" HandleID="k8s-pod-network.38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:47.333731 env[1194]: 2025-10-31 05:31:47.325 [INFO][4652] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" HandleID="k8s-pod-network.38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--kube--controllers--774b8c5f49--wcstd-eth0" Oct 31 05:31:47.333731 env[1194]: 2025-10-31 05:31:47.328 [INFO][4652] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:47.333731 env[1194]: 2025-10-31 05:31:47.330 [INFO][4645] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610" Oct 31 05:31:47.333731 env[1194]: time="2025-10-31T05:31:47.332487000Z" level=info msg="TearDown network for sandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\" successfully" Oct 31 05:31:47.335290 env[1194]: time="2025-10-31T05:31:47.335252543Z" level=info msg="RemovePodSandbox \"38c6b31cdbfe8105ca8bff54880f6672f4cf2b2b48fc244ddf63f8ba3ec04610\" returns successfully" Oct 31 05:31:47.336061 env[1194]: time="2025-10-31T05:31:47.336020604Z" level=info msg="StopPodSandbox for \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\"" Oct 31 05:31:47.433703 env[1194]: 2025-10-31 05:31:47.378 [WARNING][4672] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-whisker--5546b7f78c--lk27p-eth0" Oct 31 05:31:47.433703 env[1194]: 2025-10-31 05:31:47.378 [INFO][4672] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:47.433703 env[1194]: 2025-10-31 05:31:47.378 [INFO][4672] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" iface="eth0" netns="" Oct 31 05:31:47.433703 env[1194]: 2025-10-31 05:31:47.378 [INFO][4672] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:47.433703 env[1194]: 2025-10-31 05:31:47.378 [INFO][4672] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:47.433703 env[1194]: 2025-10-31 05:31:47.412 [INFO][4681] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" HandleID="k8s-pod-network.3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Workload="srv--29uxp.gb1.brightbox.com-k8s-whisker--5546b7f78c--lk27p-eth0" Oct 31 05:31:47.433703 env[1194]: 2025-10-31 05:31:47.412 [INFO][4681] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:47.433703 env[1194]: 2025-10-31 05:31:47.412 [INFO][4681] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:47.433703 env[1194]: 2025-10-31 05:31:47.426 [WARNING][4681] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" HandleID="k8s-pod-network.3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Workload="srv--29uxp.gb1.brightbox.com-k8s-whisker--5546b7f78c--lk27p-eth0" Oct 31 05:31:47.433703 env[1194]: 2025-10-31 05:31:47.426 [INFO][4681] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" HandleID="k8s-pod-network.3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Workload="srv--29uxp.gb1.brightbox.com-k8s-whisker--5546b7f78c--lk27p-eth0" Oct 31 05:31:47.433703 env[1194]: 2025-10-31 05:31:47.429 [INFO][4681] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:47.433703 env[1194]: 2025-10-31 05:31:47.431 [INFO][4672] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:47.434285 env[1194]: time="2025-10-31T05:31:47.433773298Z" level=info msg="TearDown network for sandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\" successfully" Oct 31 05:31:47.434285 env[1194]: time="2025-10-31T05:31:47.433815445Z" level=info msg="StopPodSandbox for \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\" returns successfully" Oct 31 05:31:47.435330 env[1194]: time="2025-10-31T05:31:47.435300483Z" level=info msg="RemovePodSandbox for \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\"" Oct 31 05:31:47.435622 env[1194]: time="2025-10-31T05:31:47.435577879Z" level=info msg="Forcibly stopping sandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\"" Oct 31 05:31:47.569494 env[1194]: 2025-10-31 05:31:47.501 [WARNING][4696] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" WorkloadEndpoint="srv--29uxp.gb1.brightbox.com-k8s-whisker--5546b7f78c--lk27p-eth0" Oct 31 05:31:47.569494 env[1194]: 2025-10-31 05:31:47.501 [INFO][4696] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:47.569494 env[1194]: 2025-10-31 05:31:47.502 [INFO][4696] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" iface="eth0" netns="" Oct 31 05:31:47.569494 env[1194]: 2025-10-31 05:31:47.502 [INFO][4696] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:47.569494 env[1194]: 2025-10-31 05:31:47.502 [INFO][4696] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:47.569494 env[1194]: 2025-10-31 05:31:47.544 [INFO][4703] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" HandleID="k8s-pod-network.3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Workload="srv--29uxp.gb1.brightbox.com-k8s-whisker--5546b7f78c--lk27p-eth0" Oct 31 05:31:47.569494 env[1194]: 2025-10-31 05:31:47.545 [INFO][4703] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:47.569494 env[1194]: 2025-10-31 05:31:47.545 [INFO][4703] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:47.569494 env[1194]: 2025-10-31 05:31:47.560 [WARNING][4703] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" HandleID="k8s-pod-network.3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Workload="srv--29uxp.gb1.brightbox.com-k8s-whisker--5546b7f78c--lk27p-eth0" Oct 31 05:31:47.569494 env[1194]: 2025-10-31 05:31:47.561 [INFO][4703] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" HandleID="k8s-pod-network.3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Workload="srv--29uxp.gb1.brightbox.com-k8s-whisker--5546b7f78c--lk27p-eth0" Oct 31 05:31:47.569494 env[1194]: 2025-10-31 05:31:47.564 [INFO][4703] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:47.569494 env[1194]: 2025-10-31 05:31:47.567 [INFO][4696] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5" Oct 31 05:31:47.570098 env[1194]: time="2025-10-31T05:31:47.569532570Z" level=info msg="TearDown network for sandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\" successfully" Oct 31 05:31:47.572390 env[1194]: time="2025-10-31T05:31:47.572337490Z" level=info msg="RemovePodSandbox \"3bdbdb867ae38ef97b32481a4cc2b5ac975f82fa604526369ad3cc77118c22d5\" returns successfully" Oct 31 05:31:47.573235 env[1194]: time="2025-10-31T05:31:47.573201959Z" level=info msg="StopPodSandbox for \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\"" Oct 31 05:31:47.693629 env[1194]: 2025-10-31 05:31:47.632 [WARNING][4717] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"488d3938-e6f8-42e4-a891-26530154283f", ResourceVersion:"1059", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 30, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db", Pod:"coredns-674b8bbfcf-gtt8c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali020d6d03832", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:47.693629 env[1194]: 2025-10-31 05:31:47.633 [INFO][4717] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:47.693629 env[1194]: 2025-10-31 05:31:47.633 [INFO][4717] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" iface="eth0" netns="" Oct 31 05:31:47.693629 env[1194]: 2025-10-31 05:31:47.633 [INFO][4717] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:47.693629 env[1194]: 2025-10-31 05:31:47.633 [INFO][4717] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:47.693629 env[1194]: 2025-10-31 05:31:47.673 [INFO][4724] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" HandleID="k8s-pod-network.add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:47.693629 env[1194]: 2025-10-31 05:31:47.673 [INFO][4724] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:47.693629 env[1194]: 2025-10-31 05:31:47.673 [INFO][4724] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:47.693629 env[1194]: 2025-10-31 05:31:47.683 [WARNING][4724] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" HandleID="k8s-pod-network.add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:47.693629 env[1194]: 2025-10-31 05:31:47.683 [INFO][4724] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" HandleID="k8s-pod-network.add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:47.693629 env[1194]: 2025-10-31 05:31:47.686 [INFO][4724] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:47.693629 env[1194]: 2025-10-31 05:31:47.689 [INFO][4717] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:47.693629 env[1194]: time="2025-10-31T05:31:47.691141196Z" level=info msg="TearDown network for sandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\" successfully" Oct 31 05:31:47.693629 env[1194]: time="2025-10-31T05:31:47.691232570Z" level=info msg="StopPodSandbox for \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\" returns successfully" Oct 31 05:31:47.694855 env[1194]: time="2025-10-31T05:31:47.694821928Z" level=info msg="RemovePodSandbox for \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\"" Oct 31 05:31:47.695106 env[1194]: time="2025-10-31T05:31:47.695060017Z" level=info msg="Forcibly stopping sandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\"" Oct 31 05:31:47.827279 env[1194]: 2025-10-31 05:31:47.770 [WARNING][4738] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"488d3938-e6f8-42e4-a891-26530154283f", ResourceVersion:"1059", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 30, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"ab69f1003cf8dde327e4626c4dd73d0361ab27973f6c32fccf68f3496b6512db", Pod:"coredns-674b8bbfcf-gtt8c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali020d6d03832", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:47.827279 env[1194]: 2025-10-31 05:31:47.771 [INFO][4738] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:47.827279 env[1194]: 2025-10-31 05:31:47.771 [INFO][4738] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" iface="eth0" netns="" Oct 31 05:31:47.827279 env[1194]: 2025-10-31 05:31:47.771 [INFO][4738] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:47.827279 env[1194]: 2025-10-31 05:31:47.771 [INFO][4738] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:47.827279 env[1194]: 2025-10-31 05:31:47.805 [INFO][4745] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" HandleID="k8s-pod-network.add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:47.827279 env[1194]: 2025-10-31 05:31:47.805 [INFO][4745] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:47.827279 env[1194]: 2025-10-31 05:31:47.805 [INFO][4745] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:47.827279 env[1194]: 2025-10-31 05:31:47.816 [WARNING][4745] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" HandleID="k8s-pod-network.add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:47.827279 env[1194]: 2025-10-31 05:31:47.816 [INFO][4745] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" HandleID="k8s-pod-network.add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--gtt8c-eth0" Oct 31 05:31:47.827279 env[1194]: 2025-10-31 05:31:47.819 [INFO][4745] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:47.827279 env[1194]: 2025-10-31 05:31:47.822 [INFO][4738] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c" Oct 31 05:31:47.828617 env[1194]: time="2025-10-31T05:31:47.827320798Z" level=info msg="TearDown network for sandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\" successfully" Oct 31 05:31:47.830424 env[1194]: time="2025-10-31T05:31:47.830306453Z" level=info msg="RemovePodSandbox \"add6ac79351f50565f97312dbf2f1689090c3ed7bc634c95ead3ec488edf5a9c\" returns successfully" Oct 31 05:31:47.831604 env[1194]: time="2025-10-31T05:31:47.831552071Z" level=info msg="StopPodSandbox for \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\"" Oct 31 05:31:47.928160 env[1194]: 2025-10-31 05:31:47.880 [WARNING][4760] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a36976db-14b7-47fe-acb9-23fcd77c496c", ResourceVersion:"1087", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03", Pod:"csi-node-driver-g8kkv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.48.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9ab87a11fdc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:47.928160 env[1194]: 2025-10-31 05:31:47.881 [INFO][4760] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:47.928160 env[1194]: 2025-10-31 05:31:47.881 [INFO][4760] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" iface="eth0" netns="" Oct 31 05:31:47.928160 env[1194]: 2025-10-31 05:31:47.881 [INFO][4760] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:47.928160 env[1194]: 2025-10-31 05:31:47.881 [INFO][4760] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:47.928160 env[1194]: 2025-10-31 05:31:47.910 [INFO][4768] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" HandleID="k8s-pod-network.e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Workload="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:47.928160 env[1194]: 2025-10-31 05:31:47.910 [INFO][4768] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:47.928160 env[1194]: 2025-10-31 05:31:47.910 [INFO][4768] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:47.928160 env[1194]: 2025-10-31 05:31:47.918 [WARNING][4768] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" HandleID="k8s-pod-network.e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Workload="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:47.928160 env[1194]: 2025-10-31 05:31:47.918 [INFO][4768] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" HandleID="k8s-pod-network.e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Workload="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:47.928160 env[1194]: 2025-10-31 05:31:47.921 [INFO][4768] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:47.928160 env[1194]: 2025-10-31 05:31:47.925 [INFO][4760] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:47.929012 env[1194]: time="2025-10-31T05:31:47.928963951Z" level=info msg="TearDown network for sandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\" successfully" Oct 31 05:31:47.929098 env[1194]: time="2025-10-31T05:31:47.929079491Z" level=info msg="StopPodSandbox for \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\" returns successfully" Oct 31 05:31:47.929783 env[1194]: time="2025-10-31T05:31:47.929755540Z" level=info msg="RemovePodSandbox for \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\"" Oct 31 05:31:47.929965 env[1194]: time="2025-10-31T05:31:47.929914777Z" level=info msg="Forcibly stopping sandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\"" Oct 31 05:31:48.028064 env[1194]: 2025-10-31 05:31:47.977 [WARNING][4782] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a36976db-14b7-47fe-acb9-23fcd77c496c", ResourceVersion:"1087", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"f1bd3dc9fdbe77b33f8eb11ac0ad9eb73e3ee4f689949e8b7bc5d92f8b648f03", Pod:"csi-node-driver-g8kkv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.48.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali9ab87a11fdc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:48.028064 env[1194]: 2025-10-31 05:31:47.977 [INFO][4782] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:48.028064 env[1194]: 2025-10-31 05:31:47.977 [INFO][4782] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" iface="eth0" netns="" Oct 31 05:31:48.028064 env[1194]: 2025-10-31 05:31:47.977 [INFO][4782] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:48.028064 env[1194]: 2025-10-31 05:31:47.977 [INFO][4782] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:48.028064 env[1194]: 2025-10-31 05:31:48.006 [INFO][4789] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" HandleID="k8s-pod-network.e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Workload="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:48.028064 env[1194]: 2025-10-31 05:31:48.006 [INFO][4789] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:48.028064 env[1194]: 2025-10-31 05:31:48.006 [INFO][4789] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:48.028064 env[1194]: 2025-10-31 05:31:48.019 [WARNING][4789] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" HandleID="k8s-pod-network.e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Workload="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:48.028064 env[1194]: 2025-10-31 05:31:48.019 [INFO][4789] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" HandleID="k8s-pod-network.e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Workload="srv--29uxp.gb1.brightbox.com-k8s-csi--node--driver--g8kkv-eth0" Oct 31 05:31:48.028064 env[1194]: 2025-10-31 05:31:48.021 [INFO][4789] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:48.028064 env[1194]: 2025-10-31 05:31:48.024 [INFO][4782] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca" Oct 31 05:31:48.028064 env[1194]: time="2025-10-31T05:31:48.026353854Z" level=info msg="TearDown network for sandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\" successfully" Oct 31 05:31:48.029229 env[1194]: time="2025-10-31T05:31:48.029177148Z" level=info msg="RemovePodSandbox \"e885dd0d764a26f3e42c09be459247031dd51ffe8eaea6e857fcbc9d34b12eca\" returns successfully" Oct 31 05:31:48.030199 env[1194]: time="2025-10-31T05:31:48.030153005Z" level=info msg="StopPodSandbox for \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\"" Oct 31 05:31:48.126653 env[1194]: time="2025-10-31T05:31:48.126588176Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 05:31:48.151645 env[1194]: 2025-10-31 05:31:48.085 [WARNING][4803] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"092be9e0-94a3-4b5b-a357-28d27ef577b0", ResourceVersion:"1056", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 30, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708", Pod:"coredns-674b8bbfcf-qktmx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4d416fac5f4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:48.151645 env[1194]: 2025-10-31 05:31:48.085 [INFO][4803] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:48.151645 env[1194]: 2025-10-31 05:31:48.085 [INFO][4803] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" iface="eth0" netns="" Oct 31 05:31:48.151645 env[1194]: 2025-10-31 05:31:48.085 [INFO][4803] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:48.151645 env[1194]: 2025-10-31 05:31:48.085 [INFO][4803] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:48.151645 env[1194]: 2025-10-31 05:31:48.116 [INFO][4810] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" HandleID="k8s-pod-network.2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:48.151645 env[1194]: 2025-10-31 05:31:48.116 [INFO][4810] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:48.151645 env[1194]: 2025-10-31 05:31:48.116 [INFO][4810] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:48.151645 env[1194]: 2025-10-31 05:31:48.144 [WARNING][4810] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" HandleID="k8s-pod-network.2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:48.151645 env[1194]: 2025-10-31 05:31:48.144 [INFO][4810] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" HandleID="k8s-pod-network.2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:48.151645 env[1194]: 2025-10-31 05:31:48.147 [INFO][4810] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:48.151645 env[1194]: 2025-10-31 05:31:48.149 [INFO][4803] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:48.152365 env[1194]: time="2025-10-31T05:31:48.151678576Z" level=info msg="TearDown network for sandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\" successfully" Oct 31 05:31:48.152365 env[1194]: time="2025-10-31T05:31:48.151717161Z" level=info msg="StopPodSandbox for \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\" returns successfully" Oct 31 05:31:48.152971 env[1194]: time="2025-10-31T05:31:48.152937424Z" level=info msg="RemovePodSandbox for \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\"" Oct 31 05:31:48.153147 env[1194]: time="2025-10-31T05:31:48.153101176Z" level=info msg="Forcibly stopping sandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\"" Oct 31 05:31:48.258126 env[1194]: 2025-10-31 05:31:48.203 [WARNING][4825] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"092be9e0-94a3-4b5b-a357-28d27ef577b0", ResourceVersion:"1056", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 30, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"f37dc2a7f2560a3d6fc8476f942bf93d6e0d26b852e361aaf0189388bfe90708", Pod:"coredns-674b8bbfcf-qktmx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.48.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4d416fac5f4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:48.258126 env[1194]: 2025-10-31 05:31:48.203 [INFO][4825] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:48.258126 env[1194]: 2025-10-31 05:31:48.203 [INFO][4825] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" iface="eth0" netns="" Oct 31 05:31:48.258126 env[1194]: 2025-10-31 05:31:48.203 [INFO][4825] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:48.258126 env[1194]: 2025-10-31 05:31:48.203 [INFO][4825] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:48.258126 env[1194]: 2025-10-31 05:31:48.238 [INFO][4832] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" HandleID="k8s-pod-network.2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:48.258126 env[1194]: 2025-10-31 05:31:48.238 [INFO][4832] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:48.258126 env[1194]: 2025-10-31 05:31:48.238 [INFO][4832] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:48.258126 env[1194]: 2025-10-31 05:31:48.250 [WARNING][4832] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" HandleID="k8s-pod-network.2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:48.258126 env[1194]: 2025-10-31 05:31:48.250 [INFO][4832] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" HandleID="k8s-pod-network.2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Workload="srv--29uxp.gb1.brightbox.com-k8s-coredns--674b8bbfcf--qktmx-eth0" Oct 31 05:31:48.258126 env[1194]: 2025-10-31 05:31:48.252 [INFO][4832] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:48.258126 env[1194]: 2025-10-31 05:31:48.255 [INFO][4825] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77" Oct 31 05:31:48.259912 env[1194]: time="2025-10-31T05:31:48.258185309Z" level=info msg="TearDown network for sandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\" successfully" Oct 31 05:31:48.261004 env[1194]: time="2025-10-31T05:31:48.260807874Z" level=info msg="RemovePodSandbox \"2b3c0d837a49fcc52bd9f6789c9c649793f0b8703d5f93b1466ec3d07d7e3a77\" returns successfully" Oct 31 05:31:48.262042 env[1194]: time="2025-10-31T05:31:48.261999854Z" level=info msg="StopPodSandbox for \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\"" Oct 31 05:31:48.369299 env[1194]: 2025-10-31 05:31:48.312 [WARNING][4848] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0", GenerateName:"calico-apiserver-584f6f7c67-", Namespace:"calico-apiserver", SelfLink:"", UID:"efc77054-b6cb-470d-b188-31acbe754356", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"584f6f7c67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4", Pod:"calico-apiserver-584f6f7c67-lh668", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali79cec2f36a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:48.369299 env[1194]: 2025-10-31 05:31:48.312 [INFO][4848] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:48.369299 env[1194]: 2025-10-31 05:31:48.312 [INFO][4848] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" iface="eth0" netns="" Oct 31 05:31:48.369299 env[1194]: 2025-10-31 05:31:48.312 [INFO][4848] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:48.369299 env[1194]: 2025-10-31 05:31:48.312 [INFO][4848] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:48.369299 env[1194]: 2025-10-31 05:31:48.345 [INFO][4856] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" HandleID="k8s-pod-network.e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:48.369299 env[1194]: 2025-10-31 05:31:48.346 [INFO][4856] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:48.369299 env[1194]: 2025-10-31 05:31:48.346 [INFO][4856] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:48.369299 env[1194]: 2025-10-31 05:31:48.358 [WARNING][4856] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" HandleID="k8s-pod-network.e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:48.369299 env[1194]: 2025-10-31 05:31:48.358 [INFO][4856] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" HandleID="k8s-pod-network.e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:48.369299 env[1194]: 2025-10-31 05:31:48.361 [INFO][4856] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:48.369299 env[1194]: 2025-10-31 05:31:48.365 [INFO][4848] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:48.371432 env[1194]: time="2025-10-31T05:31:48.369340139Z" level=info msg="TearDown network for sandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\" successfully" Oct 31 05:31:48.371432 env[1194]: time="2025-10-31T05:31:48.369389574Z" level=info msg="StopPodSandbox for \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\" returns successfully" Oct 31 05:31:48.371432 env[1194]: time="2025-10-31T05:31:48.370340572Z" level=info msg="RemovePodSandbox for \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\"" Oct 31 05:31:48.371432 env[1194]: time="2025-10-31T05:31:48.370386450Z" level=info msg="Forcibly stopping sandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\"" Oct 31 05:31:48.461132 env[1194]: 2025-10-31 05:31:48.417 [WARNING][4871] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0", GenerateName:"calico-apiserver-584f6f7c67-", Namespace:"calico-apiserver", SelfLink:"", UID:"efc77054-b6cb-470d-b188-31acbe754356", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 31, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"584f6f7c67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-29uxp.gb1.brightbox.com", ContainerID:"bc396ec1e71de58f6f04f12b747aee7d8f3a6fdfc19e627abd9b5de0c5774bf4", Pod:"calico-apiserver-584f6f7c67-lh668", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.48.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali79cec2f36a8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:31:48.461132 env[1194]: 2025-10-31 05:31:48.417 [INFO][4871] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:48.461132 env[1194]: 2025-10-31 05:31:48.417 [INFO][4871] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" iface="eth0" netns="" Oct 31 05:31:48.461132 env[1194]: 2025-10-31 05:31:48.417 [INFO][4871] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:48.461132 env[1194]: 2025-10-31 05:31:48.417 [INFO][4871] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:48.461132 env[1194]: 2025-10-31 05:31:48.445 [INFO][4878] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" HandleID="k8s-pod-network.e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:48.461132 env[1194]: 2025-10-31 05:31:48.445 [INFO][4878] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:31:48.461132 env[1194]: 2025-10-31 05:31:48.445 [INFO][4878] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:31:48.461132 env[1194]: 2025-10-31 05:31:48.453 [WARNING][4878] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" HandleID="k8s-pod-network.e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:48.461132 env[1194]: 2025-10-31 05:31:48.453 [INFO][4878] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" HandleID="k8s-pod-network.e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Workload="srv--29uxp.gb1.brightbox.com-k8s-calico--apiserver--584f6f7c67--lh668-eth0" Oct 31 05:31:48.461132 env[1194]: 2025-10-31 05:31:48.455 [INFO][4878] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:31:48.461132 env[1194]: 2025-10-31 05:31:48.458 [INFO][4871] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e" Oct 31 05:31:48.462274 env[1194]: time="2025-10-31T05:31:48.461179621Z" level=info msg="TearDown network for sandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\" successfully" Oct 31 05:31:48.465634 env[1194]: time="2025-10-31T05:31:48.465463426Z" level=info msg="RemovePodSandbox \"e1b12147a84a4752cec6fe7e151ebacbfcddbf9d183fa345f9b544d2f2cfd59e\" returns successfully" Oct 31 05:31:48.472418 env[1194]: time="2025-10-31T05:31:48.472360359Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:48.473345 env[1194]: time="2025-10-31T05:31:48.473291949Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 05:31:48.473815 kubelet[2011]: E1031 05:31:48.473758 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:31:48.474242 kubelet[2011]: E1031 05:31:48.473833 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:31:48.474242 kubelet[2011]: E1031 05:31:48.474074 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xdbnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-774b8c5f49-wcstd_calico-system(66fd0aa1-ee8d-4f3e-828b-4549c47b74e9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:48.475827 kubelet[2011]: E1031 05:31:48.475784 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" podUID="66fd0aa1-ee8d-4f3e-828b-4549c47b74e9" Oct 31 05:31:49.125939 env[1194]: time="2025-10-31T05:31:49.125623279Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 05:31:49.426620 env[1194]: time="2025-10-31T05:31:49.425317728Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:49.428317 env[1194]: time="2025-10-31T05:31:49.428088698Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 05:31:49.428767 kubelet[2011]: E1031 05:31:49.428683 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:31:49.428934 kubelet[2011]: E1031 05:31:49.428778 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:31:49.429749 env[1194]: time="2025-10-31T05:31:49.429392679Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:31:49.429860 kubelet[2011]: E1031 05:31:49.429389 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mz8pd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-g8kkv_calico-system(a36976db-14b7-47fe-acb9-23fcd77c496c): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:49.740100 env[1194]: time="2025-10-31T05:31:49.739903687Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:49.742068 env[1194]: time="2025-10-31T05:31:49.741971877Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:31:49.742658 kubelet[2011]: E1031 05:31:49.742599 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:31:49.743254 kubelet[2011]: E1031 05:31:49.742695 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:31:49.743254 kubelet[2011]: E1031 05:31:49.743026 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-g5zkf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-544d56dcbc-g5g87_calico-apiserver(d4b61754-f1af-4f1e-adb6-2e6093fbe9da): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:49.744358 env[1194]: time="2025-10-31T05:31:49.743925648Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:31:49.744683 kubelet[2011]: E1031 05:31:49.744628 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" podUID="d4b61754-f1af-4f1e-adb6-2e6093fbe9da" Oct 31 05:31:50.065344 env[1194]: time="2025-10-31T05:31:50.065094797Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:50.066648 env[1194]: time="2025-10-31T05:31:50.066514331Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:31:50.067126 kubelet[2011]: E1031 05:31:50.067054 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:31:50.067392 kubelet[2011]: E1031 05:31:50.067351 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:31:50.068145 env[1194]: time="2025-10-31T05:31:50.068100520Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 05:31:50.070073 kubelet[2011]: E1031 05:31:50.069712 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fft4d,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-544d56dcbc-xpjhh_calico-apiserver(844e14a9-59ae-4490-8511-4b0d9cac9971): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:50.071068 kubelet[2011]: E1031 05:31:50.071018 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:31:50.382317 env[1194]: time="2025-10-31T05:31:50.382213512Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:50.383547 env[1194]: time="2025-10-31T05:31:50.383430364Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 05:31:50.384382 kubelet[2011]: E1031 05:31:50.384238 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:31:50.384382 kubelet[2011]: E1031 05:31:50.384322 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:31:50.384666 kubelet[2011]: E1031 05:31:50.384592 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mz8pd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-g8kkv_calico-system(a36976db-14b7-47fe-acb9-23fcd77c496c): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:50.387157 kubelet[2011]: E1031 05:31:50.386948 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:31:51.128544 env[1194]: time="2025-10-31T05:31:51.127511923Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 05:31:51.451609 env[1194]: time="2025-10-31T05:31:51.451146012Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:51.453087 env[1194]: time="2025-10-31T05:31:51.452947514Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 05:31:51.453617 kubelet[2011]: E1031 05:31:51.453479 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:31:51.453987 kubelet[2011]: E1031 05:31:51.453651 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:31:51.454082 kubelet[2011]: E1031 05:31:51.453981 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2cqm5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-tpvj9_calico-system(4169be37-9b82-4526-bd73-17cdc3a8253e): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:51.455996 kubelet[2011]: E1031 05:31:51.455955 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-tpvj9" podUID="4169be37-9b82-4526-bd73-17cdc3a8253e" Oct 31 05:31:52.129466 env[1194]: time="2025-10-31T05:31:52.129384217Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:31:52.445217 env[1194]: time="2025-10-31T05:31:52.444920272Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:31:52.446142 env[1194]: time="2025-10-31T05:31:52.446056347Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:31:52.446427 kubelet[2011]: E1031 05:31:52.446348 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:31:52.446676 kubelet[2011]: E1031 05:31:52.446440 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:31:52.447278 kubelet[2011]: E1031 05:31:52.447128 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xd6jg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-584f6f7c67-lh668_calico-apiserver(efc77054-b6cb-470d-b188-31acbe754356): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:31:52.448731 kubelet[2011]: E1031 05:31:52.448663 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356" Oct 31 05:32:00.129058 kubelet[2011]: E1031 05:32:00.128915 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-d487dbcdc-xbgtz" podUID="f8918c31-0985-4c54-9c84-3f7bcbddeb56" Oct 31 05:32:02.126210 kubelet[2011]: E1031 05:32:02.126153 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" podUID="66fd0aa1-ee8d-4f3e-828b-4549c47b74e9" Oct 31 05:32:02.563309 systemd[1]: run-containerd-runc-k8s.io-393da8d258afdec75bb60daee1f0e6becfd2b3131c5f7091522c421b1c573dcd-runc.LkzngS.mount: Deactivated successfully. Oct 31 05:32:03.126210 kubelet[2011]: E1031 05:32:03.126148 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-tpvj9" podUID="4169be37-9b82-4526-bd73-17cdc3a8253e" Oct 31 05:32:03.127354 kubelet[2011]: E1031 05:32:03.126947 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:32:05.126686 kubelet[2011]: E1031 05:32:05.126603 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" podUID="d4b61754-f1af-4f1e-adb6-2e6093fbe9da" Oct 31 05:32:06.130569 kubelet[2011]: E1031 05:32:06.130286 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:32:07.125491 kubelet[2011]: E1031 05:32:07.125420 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356" Oct 31 05:32:09.280866 systemd[1]: Started sshd@9-10.244.102.214:22-139.178.68.195:60854.service. Oct 31 05:32:09.301398 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 31 05:32:09.302306 kernel: audit: type=1130 audit(1761888729.280:1373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.102.214:22-139.178.68.195:60854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:09.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.102.214:22-139.178.68.195:60854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:10.261000 audit[4920]: USER_ACCT pid=4920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:10.273385 kernel: audit: type=1101 audit(1761888730.261:1374): pid=4920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:10.273493 kernel: audit: type=1103 audit(1761888730.266:1375): pid=4920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:10.273538 kernel: audit: type=1006 audit(1761888730.266:1376): pid=4920 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 31 05:32:10.266000 audit[4920]: CRED_ACQ pid=4920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:10.273872 sshd[4920]: Accepted publickey for core from 139.178.68.195 port 60854 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:32:10.272856 sshd[4920]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:32:10.266000 audit[4920]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff404f2350 a2=3 a3=0 items=0 ppid=1 pid=4920 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:10.279174 kernel: audit: type=1300 audit(1761888730.266:1376): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff404f2350 a2=3 a3=0 items=0 ppid=1 pid=4920 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:10.266000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:10.281808 kernel: audit: type=1327 audit(1761888730.266:1376): proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:10.295880 systemd[1]: Started session-10.scope. Oct 31 05:32:10.296285 systemd-logind[1187]: New session 10 of user core. Oct 31 05:32:10.301000 audit[4920]: USER_START pid=4920 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:10.308784 kernel: audit: type=1105 audit(1761888730.301:1377): pid=4920 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:10.308939 kernel: audit: type=1103 audit(1761888730.305:1378): pid=4922 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:10.305000 audit[4922]: CRED_ACQ pid=4922 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:11.271160 env[1194]: time="2025-10-31T05:32:11.269504073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 05:32:11.604770 env[1194]: time="2025-10-31T05:32:11.604617130Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:32:11.606079 env[1194]: time="2025-10-31T05:32:11.605933080Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 05:32:11.611272 kubelet[2011]: E1031 05:32:11.608359 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:32:11.612033 kubelet[2011]: E1031 05:32:11.611984 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:32:11.613118 kubelet[2011]: E1031 05:32:11.612426 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:c724eceb2e944e5f951eec5826565ec8,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-drf8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d487dbcdc-xbgtz_calico-system(f8918c31-0985-4c54-9c84-3f7bcbddeb56): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 05:32:11.615793 env[1194]: time="2025-10-31T05:32:11.615556247Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 05:32:11.823640 sshd[4920]: pam_unix(sshd:session): session closed for user core Oct 31 05:32:11.825000 audit[4920]: USER_END pid=4920 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:11.833599 kernel: audit: type=1106 audit(1761888731.825:1379): pid=4920 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:11.833808 systemd[1]: sshd@9-10.244.102.214:22-139.178.68.195:60854.service: Deactivated successfully. Oct 31 05:32:11.835178 systemd[1]: session-10.scope: Deactivated successfully. Oct 31 05:32:11.826000 audit[4920]: CRED_DISP pid=4920 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:11.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.102.214:22-139.178.68.195:60854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:11.839580 kernel: audit: type=1104 audit(1761888731.826:1380): pid=4920 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:11.839616 systemd-logind[1187]: Session 10 logged out. Waiting for processes to exit. Oct 31 05:32:11.841855 systemd-logind[1187]: Removed session 10. Oct 31 05:32:11.946596 env[1194]: time="2025-10-31T05:32:11.946377370Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:32:11.948446 env[1194]: time="2025-10-31T05:32:11.948374164Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 05:32:11.949781 kubelet[2011]: E1031 05:32:11.948991 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:32:11.949781 kubelet[2011]: E1031 05:32:11.949080 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:32:11.949781 kubelet[2011]: E1031 05:32:11.949284 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-drf8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d487dbcdc-xbgtz_calico-system(f8918c31-0985-4c54-9c84-3f7bcbddeb56): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 05:32:11.954421 kubelet[2011]: E1031 05:32:11.954349 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-d487dbcdc-xbgtz" podUID="f8918c31-0985-4c54-9c84-3f7bcbddeb56" Oct 31 05:32:14.129888 env[1194]: time="2025-10-31T05:32:14.128774821Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 05:32:14.446301 env[1194]: time="2025-10-31T05:32:14.446045528Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:32:14.448205 env[1194]: time="2025-10-31T05:32:14.448070169Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 05:32:14.449246 kubelet[2011]: E1031 05:32:14.449097 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:32:14.450264 kubelet[2011]: E1031 05:32:14.450187 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:32:14.452119 kubelet[2011]: E1031 05:32:14.451940 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2cqm5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-tpvj9_calico-system(4169be37-9b82-4526-bd73-17cdc3a8253e): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 05:32:14.453582 kubelet[2011]: E1031 05:32:14.453455 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-tpvj9" podUID="4169be37-9b82-4526-bd73-17cdc3a8253e" Oct 31 05:32:15.127389 env[1194]: time="2025-10-31T05:32:15.127315814Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 05:32:15.445752 env[1194]: time="2025-10-31T05:32:15.445546765Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:32:15.446469 env[1194]: time="2025-10-31T05:32:15.446311266Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 05:32:15.446829 kubelet[2011]: E1031 05:32:15.446733 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:32:15.446829 kubelet[2011]: E1031 05:32:15.446819 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:32:15.447587 kubelet[2011]: E1031 05:32:15.447502 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xdbnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-774b8c5f49-wcstd_calico-system(66fd0aa1-ee8d-4f3e-828b-4549c47b74e9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 05:32:15.448822 kubelet[2011]: E1031 05:32:15.448770 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" podUID="66fd0aa1-ee8d-4f3e-828b-4549c47b74e9" Oct 31 05:32:16.979399 systemd[1]: Started sshd@10-10.244.102.214:22-139.178.68.195:41300.service. Oct 31 05:32:16.984553 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 05:32:16.984700 kernel: audit: type=1130 audit(1761888736.979:1382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.102.214:22-139.178.68.195:41300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:16.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.102.214:22-139.178.68.195:41300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:17.126505 env[1194]: time="2025-10-31T05:32:17.126451197Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 05:32:17.445460 env[1194]: time="2025-10-31T05:32:17.445242548Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:32:17.446392 env[1194]: time="2025-10-31T05:32:17.446275921Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 05:32:17.446892 kubelet[2011]: E1031 05:32:17.446730 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:32:17.447833 kubelet[2011]: E1031 05:32:17.446932 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:32:17.447833 kubelet[2011]: E1031 05:32:17.447243 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mz8pd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-g8kkv_calico-system(a36976db-14b7-47fe-acb9-23fcd77c496c): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 05:32:17.451213 env[1194]: time="2025-10-31T05:32:17.450703378Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 05:32:17.757334 env[1194]: time="2025-10-31T05:32:17.757017781Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:32:17.758931 env[1194]: time="2025-10-31T05:32:17.758825882Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 05:32:17.759598 kubelet[2011]: E1031 05:32:17.759459 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:32:17.759598 kubelet[2011]: E1031 05:32:17.759565 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:32:17.760440 kubelet[2011]: E1031 05:32:17.760352 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mz8pd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-g8kkv_calico-system(a36976db-14b7-47fe-acb9-23fcd77c496c): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 05:32:17.762081 kubelet[2011]: E1031 05:32:17.761986 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:32:17.883000 audit[4933]: USER_ACCT pid=4933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:17.885449 sshd[4933]: Accepted publickey for core from 139.178.68.195 port 41300 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:32:17.890654 kernel: audit: type=1101 audit(1761888737.883:1383): pid=4933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:17.892646 sshd[4933]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:32:17.890000 audit[4933]: CRED_ACQ pid=4933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:17.902727 kernel: audit: type=1103 audit(1761888737.890:1384): pid=4933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:17.909704 kernel: audit: type=1006 audit(1761888737.890:1385): pid=4933 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 31 05:32:17.911747 kernel: audit: type=1300 audit(1761888737.890:1385): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff378389b0 a2=3 a3=0 items=0 ppid=1 pid=4933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:17.890000 audit[4933]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff378389b0 a2=3 a3=0 items=0 ppid=1 pid=4933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:17.915681 kernel: audit: type=1327 audit(1761888737.890:1385): proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:17.890000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:17.916371 systemd-logind[1187]: New session 11 of user core. Oct 31 05:32:17.917821 systemd[1]: Started session-11.scope. Oct 31 05:32:17.922000 audit[4933]: USER_START pid=4933 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:17.924000 audit[4943]: CRED_ACQ pid=4943 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:17.940196 kernel: audit: type=1105 audit(1761888737.922:1386): pid=4933 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:17.940265 kernel: audit: type=1103 audit(1761888737.924:1387): pid=4943 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:18.128859 env[1194]: time="2025-10-31T05:32:18.128423198Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:32:18.456159 env[1194]: time="2025-10-31T05:32:18.455947260Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:32:18.457933 env[1194]: time="2025-10-31T05:32:18.457844310Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:32:18.464340 kubelet[2011]: E1031 05:32:18.463358 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:32:18.464340 kubelet[2011]: E1031 05:32:18.463606 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:32:18.471309 kubelet[2011]: E1031 05:32:18.470508 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fft4d,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-544d56dcbc-xpjhh_calico-apiserver(844e14a9-59ae-4490-8511-4b0d9cac9971): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:32:18.471893 kubelet[2011]: E1031 05:32:18.471827 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:32:18.686892 sshd[4933]: pam_unix(sshd:session): session closed for user core Oct 31 05:32:18.688000 audit[4933]: USER_END pid=4933 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:18.705630 kernel: audit: type=1106 audit(1761888738.688:1388): pid=4933 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:18.704214 systemd[1]: sshd@10-10.244.102.214:22-139.178.68.195:41300.service: Deactivated successfully. Oct 31 05:32:18.688000 audit[4933]: CRED_DISP pid=4933 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:18.709175 systemd[1]: session-11.scope: Deactivated successfully. Oct 31 05:32:18.711185 kernel: audit: type=1104 audit(1761888738.688:1389): pid=4933 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:18.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.102.214:22-139.178.68.195:41300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:18.714448 systemd-logind[1187]: Session 11 logged out. Waiting for processes to exit. Oct 31 05:32:18.718649 systemd-logind[1187]: Removed session 11. Oct 31 05:32:20.126869 env[1194]: time="2025-10-31T05:32:20.126766089Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:32:20.431419 env[1194]: time="2025-10-31T05:32:20.430974058Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:32:20.432323 env[1194]: time="2025-10-31T05:32:20.432194505Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:32:20.432683 kubelet[2011]: E1031 05:32:20.432618 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:32:20.433671 kubelet[2011]: E1031 05:32:20.432704 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:32:20.433671 kubelet[2011]: E1031 05:32:20.432975 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-g5zkf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-544d56dcbc-g5g87_calico-apiserver(d4b61754-f1af-4f1e-adb6-2e6093fbe9da): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:32:20.434455 kubelet[2011]: E1031 05:32:20.434377 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" podUID="d4b61754-f1af-4f1e-adb6-2e6093fbe9da" Oct 31 05:32:21.125778 env[1194]: time="2025-10-31T05:32:21.125399038Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:32:21.432590 env[1194]: time="2025-10-31T05:32:21.432121902Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:32:21.433456 env[1194]: time="2025-10-31T05:32:21.433381834Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:32:21.433909 kubelet[2011]: E1031 05:32:21.433800 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:32:21.434541 kubelet[2011]: E1031 05:32:21.433912 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:32:21.434541 kubelet[2011]: E1031 05:32:21.434202 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xd6jg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-584f6f7c67-lh668_calico-apiserver(efc77054-b6cb-470d-b188-31acbe754356): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:32:21.436143 kubelet[2011]: E1031 05:32:21.436045 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356" Oct 31 05:32:23.857044 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 05:32:23.857667 kernel: audit: type=1130 audit(1761888743.843:1391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.102.214:22-139.178.68.195:38656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:23.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.102.214:22-139.178.68.195:38656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:23.843578 systemd[1]: Started sshd@11-10.244.102.214:22-139.178.68.195:38656.service. Oct 31 05:32:24.139044 kubelet[2011]: E1031 05:32:24.137866 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-d487dbcdc-xbgtz" podUID="f8918c31-0985-4c54-9c84-3f7bcbddeb56" Oct 31 05:32:24.764000 audit[4956]: USER_ACCT pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:24.765017 sshd[4956]: Accepted publickey for core from 139.178.68.195 port 38656 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:32:24.770000 audit[4956]: CRED_ACQ pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:24.772055 sshd[4956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:32:24.775835 kernel: audit: type=1101 audit(1761888744.764:1392): pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:24.775935 kernel: audit: type=1103 audit(1761888744.770:1393): pid=4956 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:24.776461 kernel: audit: type=1006 audit(1761888744.771:1394): pid=4956 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 31 05:32:24.771000 audit[4956]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2f2aa7b0 a2=3 a3=0 items=0 ppid=1 pid=4956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:24.785625 kernel: audit: type=1300 audit(1761888744.771:1394): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2f2aa7b0 a2=3 a3=0 items=0 ppid=1 pid=4956 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:24.771000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:24.788561 kernel: audit: type=1327 audit(1761888744.771:1394): proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:24.789817 systemd-logind[1187]: New session 12 of user core. Oct 31 05:32:24.790719 systemd[1]: Started session-12.scope. Oct 31 05:32:24.802667 kernel: audit: type=1105 audit(1761888744.797:1395): pid=4956 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:24.797000 audit[4956]: USER_START pid=4956 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:24.803000 audit[4958]: CRED_ACQ pid=4958 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:24.807581 kernel: audit: type=1103 audit(1761888744.803:1396): pid=4958 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:25.526307 sshd[4956]: pam_unix(sshd:session): session closed for user core Oct 31 05:32:25.528000 audit[4956]: USER_END pid=4956 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:25.528000 audit[4956]: CRED_DISP pid=4956 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:25.534613 systemd[1]: sshd@11-10.244.102.214:22-139.178.68.195:38656.service: Deactivated successfully. Oct 31 05:32:25.535775 systemd[1]: session-12.scope: Deactivated successfully. Oct 31 05:32:25.537908 kernel: audit: type=1106 audit(1761888745.528:1397): pid=4956 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:25.538044 kernel: audit: type=1104 audit(1761888745.528:1398): pid=4956 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:25.538501 systemd-logind[1187]: Session 12 logged out. Waiting for processes to exit. Oct 31 05:32:25.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.102.214:22-139.178.68.195:38656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:25.539780 systemd-logind[1187]: Removed session 12. Oct 31 05:32:28.127638 kubelet[2011]: E1031 05:32:28.127481 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-tpvj9" podUID="4169be37-9b82-4526-bd73-17cdc3a8253e" Oct 31 05:32:29.125694 kubelet[2011]: E1031 05:32:29.125594 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:32:30.127368 kubelet[2011]: E1031 05:32:30.127277 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" podUID="66fd0aa1-ee8d-4f3e-828b-4549c47b74e9" Oct 31 05:32:30.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.102.214:22-139.178.68.195:38668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:30.694054 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 05:32:30.694173 kernel: audit: type=1130 audit(1761888750.684:1400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.102.214:22-139.178.68.195:38668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:30.685769 systemd[1]: Started sshd@12-10.244.102.214:22-139.178.68.195:38668.service. Oct 31 05:32:31.591000 audit[4969]: USER_ACCT pid=4969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:31.593567 sshd[4969]: Accepted publickey for core from 139.178.68.195 port 38668 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:32:31.599555 kernel: audit: type=1101 audit(1761888751.591:1401): pid=4969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:31.602394 sshd[4969]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:32:31.600000 audit[4969]: CRED_ACQ pid=4969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:31.608601 kernel: audit: type=1103 audit(1761888751.600:1402): pid=4969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:31.600000 audit[4969]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25efb020 a2=3 a3=0 items=0 ppid=1 pid=4969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:31.618189 kernel: audit: type=1006 audit(1761888751.600:1403): pid=4969 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Oct 31 05:32:31.618340 kernel: audit: type=1300 audit(1761888751.600:1403): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25efb020 a2=3 a3=0 items=0 ppid=1 pid=4969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:31.600000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:31.621951 kernel: audit: type=1327 audit(1761888751.600:1403): proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:31.623618 systemd-logind[1187]: New session 13 of user core. Oct 31 05:32:31.625471 systemd[1]: Started session-13.scope. Oct 31 05:32:31.630000 audit[4969]: USER_START pid=4969 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:31.638370 kernel: audit: type=1105 audit(1761888751.630:1404): pid=4969 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:31.638496 kernel: audit: type=1103 audit(1761888751.636:1405): pid=4971 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:31.636000 audit[4971]: CRED_ACQ pid=4971 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:32.134318 kubelet[2011]: E1031 05:32:32.132959 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" podUID="d4b61754-f1af-4f1e-adb6-2e6093fbe9da" Oct 31 05:32:32.140205 kubelet[2011]: E1031 05:32:32.140143 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:32:32.344283 sshd[4969]: pam_unix(sshd:session): session closed for user core Oct 31 05:32:32.345000 audit[4969]: USER_END pid=4969 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:32.356635 kernel: audit: type=1106 audit(1761888752.345:1406): pid=4969 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:32.356859 kernel: audit: type=1104 audit(1761888752.345:1407): pid=4969 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:32.345000 audit[4969]: CRED_DISP pid=4969 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:32.353402 systemd[1]: sshd@12-10.244.102.214:22-139.178.68.195:38668.service: Deactivated successfully. Oct 31 05:32:32.354829 systemd[1]: session-13.scope: Deactivated successfully. Oct 31 05:32:32.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.102.214:22-139.178.68.195:38668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:32.358627 systemd-logind[1187]: Session 13 logged out. Waiting for processes to exit. Oct 31 05:32:32.361149 systemd-logind[1187]: Removed session 13. Oct 31 05:32:32.491771 systemd[1]: Started sshd@13-10.244.102.214:22-139.178.68.195:38674.service. Oct 31 05:32:32.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.102.214:22-139.178.68.195:38674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:33.390000 audit[4981]: USER_ACCT pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:33.392951 sshd[4981]: Accepted publickey for core from 139.178.68.195 port 38674 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:32:33.396000 audit[4981]: CRED_ACQ pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:33.396000 audit[4981]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcad2e4a60 a2=3 a3=0 items=0 ppid=1 pid=4981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:33.396000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:33.398962 sshd[4981]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:32:33.406216 systemd-logind[1187]: New session 14 of user core. Oct 31 05:32:33.406835 systemd[1]: Started session-14.scope. Oct 31 05:32:33.414000 audit[4981]: USER_START pid=4981 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:33.418000 audit[5004]: CRED_ACQ pid=5004 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:34.131678 kubelet[2011]: E1031 05:32:34.131578 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356" Oct 31 05:32:34.219311 sshd[4981]: pam_unix(sshd:session): session closed for user core Oct 31 05:32:34.221000 audit[4981]: USER_END pid=4981 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:34.221000 audit[4981]: CRED_DISP pid=4981 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:34.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.102.214:22-139.178.68.195:38674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:34.224667 systemd[1]: sshd@13-10.244.102.214:22-139.178.68.195:38674.service: Deactivated successfully. Oct 31 05:32:34.226067 systemd[1]: session-14.scope: Deactivated successfully. Oct 31 05:32:34.227898 systemd-logind[1187]: Session 14 logged out. Waiting for processes to exit. Oct 31 05:32:34.228959 systemd-logind[1187]: Removed session 14. Oct 31 05:32:34.374832 systemd[1]: Started sshd@14-10.244.102.214:22-139.178.68.195:49390.service. Oct 31 05:32:34.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.102.214:22-139.178.68.195:49390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:35.313489 sshd[5012]: Accepted publickey for core from 139.178.68.195 port 49390 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:32:35.312000 audit[5012]: USER_ACCT pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:35.315000 audit[5012]: CRED_ACQ pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:35.316000 audit[5012]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef6c9cc90 a2=3 a3=0 items=0 ppid=1 pid=5012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:35.316000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:35.319148 sshd[5012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:32:35.328111 systemd-logind[1187]: New session 15 of user core. Oct 31 05:32:35.329152 systemd[1]: Started session-15.scope. Oct 31 05:32:35.335000 audit[5012]: USER_START pid=5012 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:35.337000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:36.052966 sshd[5012]: pam_unix(sshd:session): session closed for user core Oct 31 05:32:36.063928 kernel: kauditd_printk_skb: 20 callbacks suppressed Oct 31 05:32:36.064099 kernel: audit: type=1106 audit(1761888756.054:1424): pid=5012 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:36.054000 audit[5012]: USER_END pid=5012 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:36.057996 systemd-logind[1187]: Session 15 logged out. Waiting for processes to exit. Oct 31 05:32:36.059788 systemd[1]: sshd@14-10.244.102.214:22-139.178.68.195:49390.service: Deactivated successfully. Oct 31 05:32:36.061089 systemd[1]: session-15.scope: Deactivated successfully. Oct 31 05:32:36.062878 systemd-logind[1187]: Removed session 15. Oct 31 05:32:36.054000 audit[5012]: CRED_DISP pid=5012 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:36.071618 kernel: audit: type=1104 audit(1761888756.054:1425): pid=5012 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:36.071954 kernel: audit: type=1131 audit(1761888756.056:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.102.214:22-139.178.68.195:49390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:36.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.102.214:22-139.178.68.195:49390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:36.130570 kubelet[2011]: E1031 05:32:36.130183 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-d487dbcdc-xbgtz" podUID="f8918c31-0985-4c54-9c84-3f7bcbddeb56" Oct 31 05:32:40.850000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:40.850000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001eb8160 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:32:40.862441 kernel: audit: type=1400 audit(1761888760.850:1427): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:40.862598 kernel: audit: type=1300 audit(1761888760.850:1427): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001eb8160 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:32:40.850000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:32:40.850000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:40.870729 kernel: audit: type=1327 audit(1761888760.850:1427): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:32:40.870836 kernel: audit: type=1400 audit(1761888760.850:1428): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:40.870865 kernel: audit: type=1300 audit(1761888760.850:1428): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008b5a40 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:32:40.850000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008b5a40 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:32:40.850000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:32:40.879406 kernel: audit: type=1327 audit(1761888760.850:1428): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:32:41.205981 systemd[1]: Started sshd@15-10.244.102.214:22-139.178.68.195:49394.service. Oct 31 05:32:41.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.102.214:22-139.178.68.195:49394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:41.213568 kernel: audit: type=1130 audit(1761888761.205:1429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.102.214:22-139.178.68.195:49394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:41.895000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:41.906367 kernel: audit: type=1400 audit(1761888761.895:1430): avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:41.906665 kernel: audit: type=1400 audit(1761888761.895:1431): avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:41.895000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:41.895000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0048b9a60 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:32:41.914289 kernel: audit: type=1300 audit(1761888761.895:1431): arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0048b9a60 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:32:41.914453 kernel: audit: type=1327 audit(1761888761.895:1431): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:32:41.895000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:32:41.900000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:41.921819 kernel: audit: type=1400 audit(1761888761.900:1432): avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:41.922010 kernel: audit: type=1300 audit(1761888761.900:1432): arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0087f2bd0 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:32:41.900000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0087f2bd0 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:32:41.930134 kernel: audit: type=1327 audit(1761888761.900:1432): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:32:41.900000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:32:41.895000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c0048b9a40 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:32:41.942747 kernel: audit: type=1300 audit(1761888761.895:1430): arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c0048b9a40 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:32:41.895000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:32:41.901000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525835 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:41.901000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0087f2c30 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:32:41.948587 kernel: audit: type=1327 audit(1761888761.895:1430): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:32:41.901000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:32:41.901000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:41.901000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0087f2c60 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:32:41.901000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:32:41.903000 audit[1891]: AVC avc: denied { watch } for pid=1891 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525841 scontext=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:41.903000 audit[1891]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c007e55a70 a2=fc6 a3=0 items=0 ppid=1753 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c25,c626 key=(null) Oct 31 05:32:41.903000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E3130322E323134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Oct 31 05:32:42.115000 audit[5030]: USER_ACCT pid=5030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:42.117283 sshd[5030]: Accepted publickey for core from 139.178.68.195 port 49394 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:32:42.117000 audit[5030]: CRED_ACQ pid=5030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:42.117000 audit[5030]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0d0fcc30 a2=3 a3=0 items=0 ppid=1 pid=5030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:42.117000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:42.119193 sshd[5030]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:32:42.129795 kubelet[2011]: E1031 05:32:42.129726 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:32:42.132683 systemd[1]: Started session-16.scope. Oct 31 05:32:42.133599 systemd-logind[1187]: New session 16 of user core. Oct 31 05:32:42.142000 audit[5030]: USER_START pid=5030 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:42.145000 audit[5032]: CRED_ACQ pid=5032 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:42.866941 sshd[5030]: pam_unix(sshd:session): session closed for user core Oct 31 05:32:42.867000 audit[5030]: USER_END pid=5030 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:42.868000 audit[5030]: CRED_DISP pid=5030 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:42.871549 systemd[1]: sshd@15-10.244.102.214:22-139.178.68.195:49394.service: Deactivated successfully. Oct 31 05:32:42.872778 systemd[1]: session-16.scope: Deactivated successfully. Oct 31 05:32:42.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.102.214:22-139.178.68.195:49394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:42.874284 systemd-logind[1187]: Session 16 logged out. Waiting for processes to exit. Oct 31 05:32:42.877895 systemd-logind[1187]: Removed session 16. Oct 31 05:32:43.128656 kubelet[2011]: E1031 05:32:43.128317 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-tpvj9" podUID="4169be37-9b82-4526-bd73-17cdc3a8253e" Oct 31 05:32:44.133856 kubelet[2011]: E1031 05:32:44.133777 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" podUID="66fd0aa1-ee8d-4f3e-828b-4549c47b74e9" Oct 31 05:32:45.127156 kubelet[2011]: E1031 05:32:45.127103 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:32:45.127712 kubelet[2011]: E1031 05:32:45.127686 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" podUID="d4b61754-f1af-4f1e-adb6-2e6093fbe9da" Oct 31 05:32:46.126855 kubelet[2011]: E1031 05:32:46.126666 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356" Oct 31 05:32:46.906000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:46.911557 kernel: kauditd_printk_skb: 19 callbacks suppressed Oct 31 05:32:46.911769 kernel: audit: type=1400 audit(1761888766.906:1444): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:46.906000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b69c20 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:32:46.906000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:32:46.934162 kernel: audit: type=1300 audit(1761888766.906:1444): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b69c20 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:32:46.934836 kernel: audit: type=1327 audit(1761888766.906:1444): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:32:46.934895 kernel: audit: type=1400 audit(1761888766.912:1445): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:46.912000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:46.937634 kernel: audit: type=1300 audit(1761888766.912:1445): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b69c40 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:32:46.912000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001b69c40 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:32:46.942121 kernel: audit: type=1327 audit(1761888766.912:1445): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:32:46.912000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:32:46.917000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:46.917000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001eb9a00 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:32:46.955062 kernel: audit: type=1400 audit(1761888766.917:1446): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:46.955194 kernel: audit: type=1300 audit(1761888766.917:1446): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001eb9a00 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:32:46.955227 kernel: audit: type=1327 audit(1761888766.917:1446): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:32:46.917000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:32:46.923000 audit[1851]: AVC avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:46.968756 kernel: audit: type=1400 audit(1761888766.923:1447): avc: denied { watch } for pid=1851 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525833 scontext=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:32:46.923000 audit[1851]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001eb9a20 a2=fc6 a3=0 items=0 ppid=1718 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c442,c792 key=(null) Oct 31 05:32:46.923000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:32:48.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.102.214:22-139.178.68.195:36498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:48.018995 systemd[1]: Started sshd@16-10.244.102.214:22-139.178.68.195:36498.service. Oct 31 05:32:48.919000 audit[5043]: USER_ACCT pid=5043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:48.920554 sshd[5043]: Accepted publickey for core from 139.178.68.195 port 36498 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:32:48.921000 audit[5043]: CRED_ACQ pid=5043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:48.921000 audit[5043]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed7751a00 a2=3 a3=0 items=0 ppid=1 pid=5043 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:48.921000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:48.923159 sshd[5043]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:32:48.932643 systemd[1]: Started session-17.scope. Oct 31 05:32:48.934008 systemd-logind[1187]: New session 17 of user core. Oct 31 05:32:48.938000 audit[5043]: USER_START pid=5043 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:48.941000 audit[5045]: CRED_ACQ pid=5045 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:49.126890 kubelet[2011]: E1031 05:32:49.126822 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-d487dbcdc-xbgtz" podUID="f8918c31-0985-4c54-9c84-3f7bcbddeb56" Oct 31 05:32:49.666012 sshd[5043]: pam_unix(sshd:session): session closed for user core Oct 31 05:32:49.667000 audit[5043]: USER_END pid=5043 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:49.667000 audit[5043]: CRED_DISP pid=5043 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:49.671303 systemd[1]: sshd@16-10.244.102.214:22-139.178.68.195:36498.service: Deactivated successfully. Oct 31 05:32:49.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.102.214:22-139.178.68.195:36498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:49.673066 systemd[1]: session-17.scope: Deactivated successfully. Oct 31 05:32:49.674076 systemd-logind[1187]: Session 17 logged out. Waiting for processes to exit. Oct 31 05:32:49.675755 systemd-logind[1187]: Removed session 17. Oct 31 05:32:54.126974 kubelet[2011]: E1031 05:32:54.126866 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:32:54.824253 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 31 05:32:54.824415 kernel: audit: type=1130 audit(1761888774.816:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.102.214:22-139.178.68.195:35134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:54.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.102.214:22-139.178.68.195:35134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:54.816878 systemd[1]: Started sshd@17-10.244.102.214:22-139.178.68.195:35134.service. Oct 31 05:32:55.710157 sshd[5057]: Accepted publickey for core from 139.178.68.195 port 35134 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:32:55.709000 audit[5057]: USER_ACCT pid=5057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:55.715550 kernel: audit: type=1101 audit(1761888775.709:1458): pid=5057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:55.718070 sshd[5057]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:32:55.716000 audit[5057]: CRED_ACQ pid=5057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:55.730397 kernel: audit: type=1103 audit(1761888775.716:1459): pid=5057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:55.730650 kernel: audit: type=1006 audit(1761888775.716:1460): pid=5057 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Oct 31 05:32:55.716000 audit[5057]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32e4bfd0 a2=3 a3=0 items=0 ppid=1 pid=5057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:55.747018 kernel: audit: type=1300 audit(1761888775.716:1460): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32e4bfd0 a2=3 a3=0 items=0 ppid=1 pid=5057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:32:55.716000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:55.750579 kernel: audit: type=1327 audit(1761888775.716:1460): proctitle=737368643A20636F7265205B707269765D Oct 31 05:32:55.758940 systemd[1]: Started session-18.scope. Oct 31 05:32:55.759392 systemd-logind[1187]: New session 18 of user core. Oct 31 05:32:55.767000 audit[5057]: USER_START pid=5057 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:55.772725 kernel: audit: type=1105 audit(1761888775.767:1461): pid=5057 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:55.774000 audit[5059]: CRED_ACQ pid=5059 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:55.782548 kernel: audit: type=1103 audit(1761888775.774:1462): pid=5059 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:56.445474 sshd[5057]: pam_unix(sshd:session): session closed for user core Oct 31 05:32:56.447000 audit[5057]: USER_END pid=5057 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:56.459076 kernel: audit: type=1106 audit(1761888776.447:1463): pid=5057 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:56.459224 kernel: audit: type=1104 audit(1761888776.447:1464): pid=5057 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:56.447000 audit[5057]: CRED_DISP pid=5057 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:32:56.457101 systemd[1]: sshd@17-10.244.102.214:22-139.178.68.195:35134.service: Deactivated successfully. Oct 31 05:32:56.458330 systemd[1]: session-18.scope: Deactivated successfully. Oct 31 05:32:56.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.102.214:22-139.178.68.195:35134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:32:56.460812 systemd-logind[1187]: Session 18 logged out. Waiting for processes to exit. Oct 31 05:32:56.462381 systemd-logind[1187]: Removed session 18. Oct 31 05:32:57.129394 env[1194]: time="2025-10-31T05:32:57.129297852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 05:32:57.131487 kubelet[2011]: E1031 05:32:57.131373 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:32:57.472878 env[1194]: time="2025-10-31T05:32:57.472677490Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:32:57.473861 env[1194]: time="2025-10-31T05:32:57.473757350Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 05:32:57.474184 kubelet[2011]: E1031 05:32:57.474127 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:32:57.474266 kubelet[2011]: E1031 05:32:57.474212 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:32:57.474876 env[1194]: time="2025-10-31T05:32:57.474604242Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 05:32:57.474992 kubelet[2011]: E1031 05:32:57.474618 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xdbnc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-774b8c5f49-wcstd_calico-system(66fd0aa1-ee8d-4f3e-828b-4549c47b74e9): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 05:32:57.476474 kubelet[2011]: E1031 05:32:57.476435 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" podUID="66fd0aa1-ee8d-4f3e-828b-4549c47b74e9" Oct 31 05:32:57.780562 env[1194]: time="2025-10-31T05:32:57.780304744Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:32:57.781679 env[1194]: time="2025-10-31T05:32:57.781594895Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 05:32:57.782033 kubelet[2011]: E1031 05:32:57.781939 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:32:57.782190 kubelet[2011]: E1031 05:32:57.782051 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:32:57.782375 kubelet[2011]: E1031 05:32:57.782265 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2cqm5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-tpvj9_calico-system(4169be37-9b82-4526-bd73-17cdc3a8253e): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 05:32:57.784019 kubelet[2011]: E1031 05:32:57.783943 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-tpvj9" podUID="4169be37-9b82-4526-bd73-17cdc3a8253e" Oct 31 05:32:58.126756 kubelet[2011]: E1031 05:32:58.126677 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" podUID="d4b61754-f1af-4f1e-adb6-2e6093fbe9da" Oct 31 05:33:01.126194 kubelet[2011]: E1031 05:33:01.126056 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356" Oct 31 05:33:01.610935 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 05:33:01.611146 kernel: audit: type=1130 audit(1761888781.603:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.102.214:22-139.178.68.195:35148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:01.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.102.214:22-139.178.68.195:35148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:01.604955 systemd[1]: Started sshd@18-10.244.102.214:22-139.178.68.195:35148.service. Oct 31 05:33:02.505000 audit[5077]: USER_ACCT pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:02.512107 sshd[5077]: Accepted publickey for core from 139.178.68.195 port 35148 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:33:02.512540 kernel: audit: type=1101 audit(1761888782.505:1467): pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:02.510000 audit[5077]: CRED_ACQ pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:02.512796 sshd[5077]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:33:02.517561 kernel: audit: type=1103 audit(1761888782.510:1468): pid=5077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:02.517676 kernel: audit: type=1006 audit(1761888782.510:1469): pid=5077 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Oct 31 05:33:02.510000 audit[5077]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeee2f9a00 a2=3 a3=0 items=0 ppid=1 pid=5077 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:02.523397 kernel: audit: type=1300 audit(1761888782.510:1469): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeee2f9a00 a2=3 a3=0 items=0 ppid=1 pid=5077 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:02.529113 systemd-logind[1187]: New session 19 of user core. Oct 31 05:33:02.510000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:33:02.530118 systemd[1]: Started session-19.scope. Oct 31 05:33:02.531572 kernel: audit: type=1327 audit(1761888782.510:1469): proctitle=737368643A20636F7265205B707269765D Oct 31 05:33:02.535000 audit[5077]: USER_START pid=5077 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:02.535000 audit[5080]: CRED_ACQ pid=5080 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:02.544342 kernel: audit: type=1105 audit(1761888782.535:1470): pid=5077 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:02.544703 kernel: audit: type=1103 audit(1761888782.535:1471): pid=5080 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:03.250910 sshd[5077]: pam_unix(sshd:session): session closed for user core Oct 31 05:33:03.250000 audit[5077]: USER_END pid=5077 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:03.259381 systemd[1]: sshd@18-10.244.102.214:22-139.178.68.195:35148.service: Deactivated successfully. Oct 31 05:33:03.260579 kernel: audit: type=1106 audit(1761888783.250:1472): pid=5077 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:03.260768 systemd[1]: session-19.scope: Deactivated successfully. Oct 31 05:33:03.251000 audit[5077]: CRED_DISP pid=5077 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:03.265212 systemd-logind[1187]: Session 19 logged out. Waiting for processes to exit. Oct 31 05:33:03.266328 kernel: audit: type=1104 audit(1761888783.251:1473): pid=5077 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:03.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.102.214:22-139.178.68.195:35148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:03.267312 systemd-logind[1187]: Removed session 19. Oct 31 05:33:03.403177 systemd[1]: Started sshd@19-10.244.102.214:22-139.178.68.195:44184.service. Oct 31 05:33:03.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.102.214:22-139.178.68.195:44184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:04.129459 env[1194]: time="2025-10-31T05:33:04.129374104Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 05:33:04.299000 audit[5108]: USER_ACCT pid=5108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:04.300572 sshd[5108]: Accepted publickey for core from 139.178.68.195 port 44184 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:33:04.301000 audit[5108]: CRED_ACQ pid=5108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:04.301000 audit[5108]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff03eaf360 a2=3 a3=0 items=0 ppid=1 pid=5108 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:04.301000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:33:04.302847 sshd[5108]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:33:04.308353 systemd-logind[1187]: New session 20 of user core. Oct 31 05:33:04.309228 systemd[1]: Started session-20.scope. Oct 31 05:33:04.316000 audit[5108]: USER_START pid=5108 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:04.322000 audit[5110]: CRED_ACQ pid=5110 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:04.443351 env[1194]: time="2025-10-31T05:33:04.443112089Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:33:04.447650 env[1194]: time="2025-10-31T05:33:04.446186172Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 05:33:04.448884 kubelet[2011]: E1031 05:33:04.448788 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:33:04.449422 kubelet[2011]: E1031 05:33:04.448914 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:33:04.449422 kubelet[2011]: E1031 05:33:04.449228 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:c724eceb2e944e5f951eec5826565ec8,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-drf8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d487dbcdc-xbgtz_calico-system(f8918c31-0985-4c54-9c84-3f7bcbddeb56): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 05:33:04.459538 env[1194]: time="2025-10-31T05:33:04.459429926Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 05:33:04.775205 env[1194]: time="2025-10-31T05:33:04.774903068Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:33:04.777156 env[1194]: time="2025-10-31T05:33:04.776957994Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 05:33:04.779346 kubelet[2011]: E1031 05:33:04.777947 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:33:04.779346 kubelet[2011]: E1031 05:33:04.778073 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:33:04.779346 kubelet[2011]: E1031 05:33:04.778372 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-drf8m,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-d487dbcdc-xbgtz_calico-system(f8918c31-0985-4c54-9c84-3f7bcbddeb56): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 05:33:04.780085 kubelet[2011]: E1031 05:33:04.779736 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-d487dbcdc-xbgtz" podUID="f8918c31-0985-4c54-9c84-3f7bcbddeb56" Oct 31 05:33:05.428172 sshd[5108]: pam_unix(sshd:session): session closed for user core Oct 31 05:33:05.432000 audit[5108]: USER_END pid=5108 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:05.432000 audit[5108]: CRED_DISP pid=5108 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:05.435622 systemd[1]: sshd@19-10.244.102.214:22-139.178.68.195:44184.service: Deactivated successfully. Oct 31 05:33:05.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.102.214:22-139.178.68.195:44184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:05.437170 systemd[1]: session-20.scope: Deactivated successfully. Oct 31 05:33:05.438191 systemd-logind[1187]: Session 20 logged out. Waiting for processes to exit. Oct 31 05:33:05.439503 systemd-logind[1187]: Removed session 20. Oct 31 05:33:05.577932 systemd[1]: Started sshd@20-10.244.102.214:22-139.178.68.195:44192.service. Oct 31 05:33:05.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.102.214:22-139.178.68.195:44192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:06.478000 audit[5118]: USER_ACCT pid=5118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:06.479052 sshd[5118]: Accepted publickey for core from 139.178.68.195 port 44192 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:33:06.480000 audit[5118]: CRED_ACQ pid=5118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:06.481000 audit[5118]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4d63e020 a2=3 a3=0 items=0 ppid=1 pid=5118 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:06.481000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:33:06.482836 sshd[5118]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:33:06.491570 systemd-logind[1187]: New session 21 of user core. Oct 31 05:33:06.495267 systemd[1]: Started session-21.scope. Oct 31 05:33:06.503000 audit[5118]: USER_START pid=5118 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:06.505000 audit[5120]: CRED_ACQ pid=5120 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:07.867000 audit[5131]: NETFILTER_CFG table=filter:123 family=2 entries=26 op=nft_register_rule pid=5131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:33:07.870644 kernel: kauditd_printk_skb: 20 callbacks suppressed Oct 31 05:33:07.870788 kernel: audit: type=1325 audit(1761888787.867:1490): table=filter:123 family=2 entries=26 op=nft_register_rule pid=5131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:33:07.867000 audit[5131]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffd8a69abb0 a2=0 a3=7ffd8a69ab9c items=0 ppid=2153 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:07.877571 kernel: audit: type=1300 audit(1761888787.867:1490): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffd8a69abb0 a2=0 a3=7ffd8a69ab9c items=0 ppid=2153 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:07.867000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:33:07.882553 kernel: audit: type=1327 audit(1761888787.867:1490): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:33:07.882678 kernel: audit: type=1325 audit(1761888787.878:1491): table=nat:124 family=2 entries=20 op=nft_register_rule pid=5131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:33:07.878000 audit[5131]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=5131 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:33:07.878000 audit[5131]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd8a69abb0 a2=0 a3=0 items=0 ppid=2153 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:07.891589 kernel: audit: type=1300 audit(1761888787.878:1491): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd8a69abb0 a2=0 a3=0 items=0 ppid=2153 pid=5131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:07.878000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:33:07.894536 kernel: audit: type=1327 audit(1761888787.878:1491): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:33:07.921000 audit[5139]: NETFILTER_CFG table=filter:125 family=2 entries=38 op=nft_register_rule pid=5139 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:33:07.921000 audit[5139]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffc41090d70 a2=0 a3=7ffc41090d5c items=0 ppid=2153 pid=5139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:07.929333 kernel: audit: type=1325 audit(1761888787.921:1492): table=filter:125 family=2 entries=38 op=nft_register_rule pid=5139 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:33:07.929486 kernel: audit: type=1300 audit(1761888787.921:1492): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffc41090d70 a2=0 a3=7ffc41090d5c items=0 ppid=2153 pid=5139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:07.921000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:33:07.933556 kernel: audit: type=1327 audit(1761888787.921:1492): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:33:07.936000 audit[5139]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=5139 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:33:07.936000 audit[5139]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc41090d70 a2=0 a3=0 items=0 ppid=2153 pid=5139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:07.939622 kernel: audit: type=1325 audit(1761888787.936:1493): table=nat:126 family=2 entries=20 op=nft_register_rule pid=5139 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:33:07.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:33:07.983766 sshd[5118]: pam_unix(sshd:session): session closed for user core Oct 31 05:33:07.989000 audit[5118]: USER_END pid=5118 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:07.990000 audit[5118]: CRED_DISP pid=5118 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:07.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.102.214:22-139.178.68.195:44192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:07.993308 systemd[1]: sshd@20-10.244.102.214:22-139.178.68.195:44192.service: Deactivated successfully. Oct 31 05:33:07.994750 systemd[1]: session-21.scope: Deactivated successfully. Oct 31 05:33:07.995574 systemd-logind[1187]: Session 21 logged out. Waiting for processes to exit. Oct 31 05:33:07.997726 systemd-logind[1187]: Removed session 21. Oct 31 05:33:08.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.102.214:22-139.178.68.195:44208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:08.135268 env[1194]: time="2025-10-31T05:33:08.131907129Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:33:08.134320 systemd[1]: Started sshd@21-10.244.102.214:22-139.178.68.195:44208.service. Oct 31 05:33:08.454095 env[1194]: time="2025-10-31T05:33:08.453934335Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:33:08.455453 env[1194]: time="2025-10-31T05:33:08.455375240Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:33:08.456115 kubelet[2011]: E1031 05:33:08.456045 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:33:08.456805 kubelet[2011]: E1031 05:33:08.456767 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:33:08.457243 kubelet[2011]: E1031 05:33:08.457166 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fft4d,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-544d56dcbc-xpjhh_calico-apiserver(844e14a9-59ae-4490-8511-4b0d9cac9971): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:33:08.458910 kubelet[2011]: E1031 05:33:08.458841 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:33:09.061000 audit[5142]: USER_ACCT pid=5142 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:09.066828 sshd[5142]: Accepted publickey for core from 139.178.68.195 port 44208 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:33:09.066000 audit[5142]: CRED_ACQ pid=5142 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:09.066000 audit[5142]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc76a49e0 a2=3 a3=0 items=0 ppid=1 pid=5142 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:09.066000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:33:09.069860 sshd[5142]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:33:09.079003 systemd-logind[1187]: New session 22 of user core. Oct 31 05:33:09.079674 systemd[1]: Started session-22.scope. Oct 31 05:33:09.090000 audit[5142]: USER_START pid=5142 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:09.092000 audit[5144]: CRED_ACQ pid=5144 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:09.128956 kubelet[2011]: E1031 05:33:09.128897 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" podUID="66fd0aa1-ee8d-4f3e-828b-4549c47b74e9" Oct 31 05:33:10.128404 env[1194]: time="2025-10-31T05:33:10.127894626Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 05:33:10.134410 sshd[5142]: pam_unix(sshd:session): session closed for user core Oct 31 05:33:10.135000 audit[5142]: USER_END pid=5142 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:10.135000 audit[5142]: CRED_DISP pid=5142 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:10.139496 systemd[1]: sshd@21-10.244.102.214:22-139.178.68.195:44208.service: Deactivated successfully. Oct 31 05:33:10.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.102.214:22-139.178.68.195:44208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:10.141582 systemd[1]: session-22.scope: Deactivated successfully. Oct 31 05:33:10.141671 systemd-logind[1187]: Session 22 logged out. Waiting for processes to exit. Oct 31 05:33:10.143484 systemd-logind[1187]: Removed session 22. Oct 31 05:33:10.291210 systemd[1]: Started sshd@22-10.244.102.214:22-139.178.68.195:44210.service. Oct 31 05:33:10.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.102.214:22-139.178.68.195:44210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:10.453335 env[1194]: time="2025-10-31T05:33:10.453112619Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:33:10.453787 env[1194]: time="2025-10-31T05:33:10.453720534Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 05:33:10.454834 kubelet[2011]: E1031 05:33:10.454768 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:33:10.455278 kubelet[2011]: E1031 05:33:10.454866 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:33:10.455460 kubelet[2011]: E1031 05:33:10.455410 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mz8pd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-g8kkv_calico-system(a36976db-14b7-47fe-acb9-23fcd77c496c): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 05:33:10.458544 env[1194]: time="2025-10-31T05:33:10.458221572Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 05:33:10.773300 env[1194]: time="2025-10-31T05:33:10.773069534Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:33:10.775097 env[1194]: time="2025-10-31T05:33:10.774999347Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 05:33:10.775676 kubelet[2011]: E1031 05:33:10.775615 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:33:10.775860 kubelet[2011]: E1031 05:33:10.775693 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:33:10.775965 kubelet[2011]: E1031 05:33:10.775863 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-mz8pd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-g8kkv_calico-system(a36976db-14b7-47fe-acb9-23fcd77c496c): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 05:33:10.777356 kubelet[2011]: E1031 05:33:10.777298 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:33:11.125780 kubelet[2011]: E1031 05:33:11.125726 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-tpvj9" podUID="4169be37-9b82-4526-bd73-17cdc3a8253e" Oct 31 05:33:11.130040 env[1194]: time="2025-10-31T05:33:11.129939349Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:33:11.193000 audit[5152]: USER_ACCT pid=5152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:11.195191 sshd[5152]: Accepted publickey for core from 139.178.68.195 port 44210 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:33:11.195000 audit[5152]: CRED_ACQ pid=5152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:11.195000 audit[5152]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe25f3c540 a2=3 a3=0 items=0 ppid=1 pid=5152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:11.195000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:33:11.198091 sshd[5152]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:33:11.204949 systemd-logind[1187]: New session 23 of user core. Oct 31 05:33:11.206074 systemd[1]: Started session-23.scope. Oct 31 05:33:11.210000 audit[5152]: USER_START pid=5152 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:11.213000 audit[5168]: CRED_ACQ pid=5168 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:11.450992 env[1194]: time="2025-10-31T05:33:11.450813457Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:33:11.451911 env[1194]: time="2025-10-31T05:33:11.451816492Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:33:11.452266 kubelet[2011]: E1031 05:33:11.452194 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:33:11.452423 kubelet[2011]: E1031 05:33:11.452406 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:33:11.453330 kubelet[2011]: E1031 05:33:11.453268 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-g5zkf,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-544d56dcbc-g5g87_calico-apiserver(d4b61754-f1af-4f1e-adb6-2e6093fbe9da): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:33:11.454812 kubelet[2011]: E1031 05:33:11.454761 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" podUID="d4b61754-f1af-4f1e-adb6-2e6093fbe9da" Oct 31 05:33:12.024800 sshd[5152]: pam_unix(sshd:session): session closed for user core Oct 31 05:33:12.027000 audit[5152]: USER_END pid=5152 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:12.027000 audit[5152]: CRED_DISP pid=5152 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:12.031925 systemd[1]: sshd@22-10.244.102.214:22-139.178.68.195:44210.service: Deactivated successfully. Oct 31 05:33:12.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.102.214:22-139.178.68.195:44210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:12.032932 systemd[1]: session-23.scope: Deactivated successfully. Oct 31 05:33:12.033649 systemd-logind[1187]: Session 23 logged out. Waiting for processes to exit. Oct 31 05:33:12.034565 systemd-logind[1187]: Removed session 23. Oct 31 05:33:14.130713 env[1194]: time="2025-10-31T05:33:14.129272844Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:33:14.478424 env[1194]: time="2025-10-31T05:33:14.478151139Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:33:14.480056 env[1194]: time="2025-10-31T05:33:14.479960456Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:33:14.480688 kubelet[2011]: E1031 05:33:14.480614 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:33:14.481266 kubelet[2011]: E1031 05:33:14.481227 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:33:14.481711 kubelet[2011]: E1031 05:33:14.481647 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-xd6jg,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-584f6f7c67-lh668_calico-apiserver(efc77054-b6cb-470d-b188-31acbe754356): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:33:14.483575 kubelet[2011]: E1031 05:33:14.483513 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356" Oct 31 05:33:17.180721 systemd[1]: Started sshd@23-10.244.102.214:22-139.178.68.195:44338.service. Oct 31 05:33:17.186749 kernel: kauditd_printk_skb: 27 callbacks suppressed Oct 31 05:33:17.186928 kernel: audit: type=1130 audit(1761888797.180:1515): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.102.214:22-139.178.68.195:44338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:17.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.102.214:22-139.178.68.195:44338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:17.975000 audit[5181]: NETFILTER_CFG table=filter:127 family=2 entries=26 op=nft_register_rule pid=5181 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:33:17.983377 kernel: audit: type=1325 audit(1761888797.975:1516): table=filter:127 family=2 entries=26 op=nft_register_rule pid=5181 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:33:17.983715 kernel: audit: type=1300 audit(1761888797.975:1516): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff3b3da2a0 a2=0 a3=7fff3b3da28c items=0 ppid=2153 pid=5181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:17.975000 audit[5181]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff3b3da2a0 a2=0 a3=7fff3b3da28c items=0 ppid=2153 pid=5181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:17.986553 kernel: audit: type=1327 audit(1761888797.975:1516): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:33:17.975000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:33:17.988000 audit[5181]: NETFILTER_CFG table=nat:128 family=2 entries=104 op=nft_register_chain pid=5181 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:33:18.001576 kernel: audit: type=1325 audit(1761888797.988:1517): table=nat:128 family=2 entries=104 op=nft_register_chain pid=5181 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:33:18.001841 kernel: audit: type=1300 audit(1761888797.988:1517): arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7fff3b3da2a0 a2=0 a3=7fff3b3da28c items=0 ppid=2153 pid=5181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:17.988000 audit[5181]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7fff3b3da2a0 a2=0 a3=7fff3b3da28c items=0 ppid=2153 pid=5181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:17.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:33:18.009605 kernel: audit: type=1327 audit(1761888797.988:1517): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:33:18.112581 sshd[5178]: Accepted publickey for core from 139.178.68.195 port 44338 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:33:18.111000 audit[5178]: USER_ACCT pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:18.116548 kernel: audit: type=1101 audit(1761888798.111:1518): pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:18.116000 audit[5178]: CRED_ACQ pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:18.121590 kernel: audit: type=1103 audit(1761888798.116:1519): pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:18.121693 kernel: audit: type=1006 audit(1761888798.116:1520): pid=5178 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Oct 31 05:33:18.116000 audit[5178]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4824b9d0 a2=3 a3=0 items=0 ppid=1 pid=5178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:18.116000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:33:18.125300 sshd[5178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:33:18.136247 systemd[1]: Started session-24.scope. Oct 31 05:33:18.137032 systemd-logind[1187]: New session 24 of user core. Oct 31 05:33:18.143000 audit[5178]: USER_START pid=5178 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:18.145000 audit[5182]: CRED_ACQ pid=5182 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:18.946840 sshd[5178]: pam_unix(sshd:session): session closed for user core Oct 31 05:33:18.951000 audit[5178]: USER_END pid=5178 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:18.951000 audit[5178]: CRED_DISP pid=5178 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:18.956046 systemd-logind[1187]: Session 24 logged out. Waiting for processes to exit. Oct 31 05:33:18.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.102.214:22-139.178.68.195:44338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:18.956778 systemd[1]: sshd@23-10.244.102.214:22-139.178.68.195:44338.service: Deactivated successfully. Oct 31 05:33:18.958604 systemd[1]: session-24.scope: Deactivated successfully. Oct 31 05:33:18.962799 systemd-logind[1187]: Removed session 24. Oct 31 05:33:19.127057 kubelet[2011]: E1031 05:33:19.126989 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-d487dbcdc-xbgtz" podUID="f8918c31-0985-4c54-9c84-3f7bcbddeb56" Oct 31 05:33:21.125777 kubelet[2011]: E1031 05:33:21.125661 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-774b8c5f49-wcstd" podUID="66fd0aa1-ee8d-4f3e-828b-4549c47b74e9" Oct 31 05:33:22.126889 kubelet[2011]: E1031 05:33:22.126818 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-tpvj9" podUID="4169be37-9b82-4526-bd73-17cdc3a8253e" Oct 31 05:33:22.127460 kubelet[2011]: E1031 05:33:22.126916 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-xpjhh" podUID="844e14a9-59ae-4490-8511-4b0d9cac9971" Oct 31 05:33:23.127211 kubelet[2011]: E1031 05:33:23.127109 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-544d56dcbc-g5g87" podUID="d4b61754-f1af-4f1e-adb6-2e6093fbe9da" Oct 31 05:33:24.096896 systemd[1]: Started sshd@24-10.244.102.214:22-139.178.68.195:49384.service. Oct 31 05:33:24.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.102.214:22-139.178.68.195:49384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:24.111398 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 31 05:33:24.111506 kernel: audit: type=1130 audit(1761888804.098:1526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.102.214:22-139.178.68.195:49384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:24.130268 kubelet[2011]: E1031 05:33:24.130204 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-g8kkv" podUID="a36976db-14b7-47fe-acb9-23fcd77c496c" Oct 31 05:33:25.036742 sshd[5194]: Accepted publickey for core from 139.178.68.195 port 49384 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:33:25.036000 audit[5194]: USER_ACCT pid=5194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:25.041552 kernel: audit: type=1101 audit(1761888805.036:1527): pid=5194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:25.041890 kernel: audit: type=1103 audit(1761888805.040:1528): pid=5194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:25.040000 audit[5194]: CRED_ACQ pid=5194 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:25.045538 sshd[5194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:33:25.051560 kernel: audit: type=1006 audit(1761888805.040:1529): pid=5194 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Oct 31 05:33:25.051746 kernel: audit: type=1300 audit(1761888805.040:1529): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffceb5e8060 a2=3 a3=0 items=0 ppid=1 pid=5194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:25.040000 audit[5194]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffceb5e8060 a2=3 a3=0 items=0 ppid=1 pid=5194 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:33:25.040000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:33:25.062178 kernel: audit: type=1327 audit(1761888805.040:1529): proctitle=737368643A20636F7265205B707269765D Oct 31 05:33:25.061001 systemd-logind[1187]: New session 25 of user core. Oct 31 05:33:25.061082 systemd[1]: Started session-25.scope. Oct 31 05:33:25.066000 audit[5194]: USER_START pid=5194 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:25.073547 kernel: audit: type=1105 audit(1761888805.066:1530): pid=5194 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:25.073000 audit[5196]: CRED_ACQ pid=5196 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:25.078544 kernel: audit: type=1103 audit(1761888805.073:1531): pid=5196 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:25.908694 sshd[5194]: pam_unix(sshd:session): session closed for user core Oct 31 05:33:25.910000 audit[5194]: USER_END pid=5194 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:25.913226 systemd[1]: sshd@24-10.244.102.214:22-139.178.68.195:49384.service: Deactivated successfully. Oct 31 05:33:25.910000 audit[5194]: CRED_DISP pid=5194 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:25.918110 systemd-logind[1187]: Session 25 logged out. Waiting for processes to exit. Oct 31 05:33:25.920802 kernel: audit: type=1106 audit(1761888805.910:1532): pid=5194 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:25.921434 kernel: audit: type=1104 audit(1761888805.910:1533): pid=5194 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:33:25.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.102.214:22-139.178.68.195:49384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:33:25.920980 systemd[1]: session-25.scope: Deactivated successfully. Oct 31 05:33:25.923167 systemd-logind[1187]: Removed session 25. Oct 31 05:33:28.130325 kubelet[2011]: E1031 05:33:28.130229 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-584f6f7c67-lh668" podUID="efc77054-b6cb-470d-b188-31acbe754356"