Oct 31 05:22:50.923786 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Oct 30 23:32:41 -00 2025 Oct 31 05:22:50.923829 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 05:22:50.923848 kernel: BIOS-provided physical RAM map: Oct 31 05:22:50.923859 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 31 05:22:50.923869 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 31 05:22:50.923879 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 31 05:22:50.923890 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Oct 31 05:22:50.923901 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Oct 31 05:22:50.923911 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Oct 31 05:22:50.923921 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Oct 31 05:22:50.923935 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 31 05:22:50.923945 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 31 05:22:50.923956 kernel: NX (Execute Disable) protection: active Oct 31 05:22:50.923966 kernel: SMBIOS 2.8 present. Oct 31 05:22:50.923978 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Oct 31 05:22:50.923990 kernel: Hypervisor detected: KVM Oct 31 05:22:50.924004 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 31 05:22:50.924015 kernel: kvm-clock: cpu 0, msr 271a0001, primary cpu clock Oct 31 05:22:50.924026 kernel: kvm-clock: using sched offset of 4883135713 cycles Oct 31 05:22:50.924038 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 31 05:22:50.924132 kernel: tsc: Detected 2499.998 MHz processor Oct 31 05:22:50.924147 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 31 05:22:50.924159 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 31 05:22:50.924170 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Oct 31 05:22:50.924181 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 31 05:22:50.924198 kernel: Using GB pages for direct mapping Oct 31 05:22:50.924209 kernel: ACPI: Early table checksum verification disabled Oct 31 05:22:50.924220 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Oct 31 05:22:50.924231 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:22:50.924256 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:22:50.924274 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:22:50.924285 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Oct 31 05:22:50.924296 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:22:50.924308 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:22:50.924324 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:22:50.924335 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 31 05:22:50.924346 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Oct 31 05:22:50.924357 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Oct 31 05:22:50.924368 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Oct 31 05:22:50.924379 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Oct 31 05:22:50.924396 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Oct 31 05:22:50.924411 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Oct 31 05:22:50.924423 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Oct 31 05:22:50.924435 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 31 05:22:50.924446 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 31 05:22:50.924458 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Oct 31 05:22:50.924470 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Oct 31 05:22:50.924481 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Oct 31 05:22:50.924496 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Oct 31 05:22:50.924508 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Oct 31 05:22:50.924520 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Oct 31 05:22:50.924531 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Oct 31 05:22:50.924543 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Oct 31 05:22:50.924554 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Oct 31 05:22:50.924566 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Oct 31 05:22:50.924578 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Oct 31 05:22:50.924589 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Oct 31 05:22:50.924601 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Oct 31 05:22:50.924616 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Oct 31 05:22:50.924628 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 31 05:22:50.924640 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Oct 31 05:22:50.924652 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Oct 31 05:22:50.924664 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Oct 31 05:22:50.924675 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Oct 31 05:22:50.924687 kernel: Zone ranges: Oct 31 05:22:50.924699 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 31 05:22:50.924711 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Oct 31 05:22:50.924727 kernel: Normal empty Oct 31 05:22:50.924738 kernel: Movable zone start for each node Oct 31 05:22:50.924750 kernel: Early memory node ranges Oct 31 05:22:50.924762 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 31 05:22:50.924773 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Oct 31 05:22:50.924785 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Oct 31 05:22:50.924797 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 31 05:22:50.924808 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 31 05:22:50.924820 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Oct 31 05:22:50.924835 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 31 05:22:50.924847 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 31 05:22:50.924859 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 31 05:22:50.924870 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 31 05:22:50.924882 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 31 05:22:50.924894 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 31 05:22:50.924905 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 31 05:22:50.924917 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 31 05:22:50.924929 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 31 05:22:50.924944 kernel: TSC deadline timer available Oct 31 05:22:50.924956 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Oct 31 05:22:50.924967 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Oct 31 05:22:50.924979 kernel: Booting paravirtualized kernel on KVM Oct 31 05:22:50.924991 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 31 05:22:50.925003 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Oct 31 05:22:50.925015 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Oct 31 05:22:50.925026 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Oct 31 05:22:50.925038 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Oct 31 05:22:50.925065 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Oct 31 05:22:50.925077 kernel: kvm-guest: PV spinlocks enabled Oct 31 05:22:50.925089 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 31 05:22:50.925101 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Oct 31 05:22:50.925112 kernel: Policy zone: DMA32 Oct 31 05:22:50.925125 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 05:22:50.925138 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 31 05:22:50.925150 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 31 05:22:50.925165 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 31 05:22:50.925177 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 31 05:22:50.925189 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 192524K reserved, 0K cma-reserved) Oct 31 05:22:50.925201 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Oct 31 05:22:50.925213 kernel: Kernel/User page tables isolation: enabled Oct 31 05:22:50.925225 kernel: ftrace: allocating 34614 entries in 136 pages Oct 31 05:22:50.925243 kernel: ftrace: allocated 136 pages with 2 groups Oct 31 05:22:50.925257 kernel: rcu: Hierarchical RCU implementation. Oct 31 05:22:50.925270 kernel: rcu: RCU event tracing is enabled. Oct 31 05:22:50.925286 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Oct 31 05:22:50.925298 kernel: Rude variant of Tasks RCU enabled. Oct 31 05:22:50.925310 kernel: Tracing variant of Tasks RCU enabled. Oct 31 05:22:50.925322 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 31 05:22:50.925334 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Oct 31 05:22:50.925345 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Oct 31 05:22:50.925357 kernel: random: crng init done Oct 31 05:22:50.925381 kernel: Console: colour VGA+ 80x25 Oct 31 05:22:50.925394 kernel: printk: console [tty0] enabled Oct 31 05:22:50.925406 kernel: printk: console [ttyS0] enabled Oct 31 05:22:50.925419 kernel: ACPI: Core revision 20210730 Oct 31 05:22:50.925431 kernel: APIC: Switch to symmetric I/O mode setup Oct 31 05:22:50.925446 kernel: x2apic enabled Oct 31 05:22:50.925459 kernel: Switched APIC routing to physical x2apic. Oct 31 05:22:50.925471 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Oct 31 05:22:50.925484 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Oct 31 05:22:50.925496 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 31 05:22:50.925512 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Oct 31 05:22:50.925525 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Oct 31 05:22:50.925537 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 31 05:22:50.925549 kernel: Spectre V2 : Mitigation: Retpolines Oct 31 05:22:50.925561 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Oct 31 05:22:50.925573 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Oct 31 05:22:50.925586 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 31 05:22:50.925598 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 31 05:22:50.925610 kernel: MDS: Mitigation: Clear CPU buffers Oct 31 05:22:50.925622 kernel: MMIO Stale Data: Unknown: No mitigations Oct 31 05:22:50.925634 kernel: SRBDS: Unknown: Dependent on hypervisor status Oct 31 05:22:50.925650 kernel: active return thunk: its_return_thunk Oct 31 05:22:50.925662 kernel: ITS: Mitigation: Aligned branch/return thunks Oct 31 05:22:50.925674 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 31 05:22:50.925687 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 31 05:22:50.925699 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 31 05:22:50.925711 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 31 05:22:50.925723 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 31 05:22:50.925736 kernel: Freeing SMP alternatives memory: 32K Oct 31 05:22:50.925748 kernel: pid_max: default: 32768 minimum: 301 Oct 31 05:22:50.925760 kernel: LSM: Security Framework initializing Oct 31 05:22:50.925772 kernel: SELinux: Initializing. Oct 31 05:22:50.925788 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 31 05:22:50.925800 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 31 05:22:50.925813 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Oct 31 05:22:50.925825 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Oct 31 05:22:50.925838 kernel: signal: max sigframe size: 1776 Oct 31 05:22:50.925850 kernel: rcu: Hierarchical SRCU implementation. Oct 31 05:22:50.925862 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 31 05:22:50.925875 kernel: smp: Bringing up secondary CPUs ... Oct 31 05:22:50.925887 kernel: x86: Booting SMP configuration: Oct 31 05:22:50.925899 kernel: .... node #0, CPUs: #1 Oct 31 05:22:50.925915 kernel: kvm-clock: cpu 1, msr 271a0041, secondary cpu clock Oct 31 05:22:50.925927 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Oct 31 05:22:50.925940 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Oct 31 05:22:50.925952 kernel: smp: Brought up 1 node, 2 CPUs Oct 31 05:22:50.925964 kernel: smpboot: Max logical packages: 16 Oct 31 05:22:50.925976 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Oct 31 05:22:50.925989 kernel: devtmpfs: initialized Oct 31 05:22:50.926001 kernel: x86/mm: Memory block size: 128MB Oct 31 05:22:50.926013 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 31 05:22:50.926029 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Oct 31 05:22:50.932064 kernel: pinctrl core: initialized pinctrl subsystem Oct 31 05:22:50.932089 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 31 05:22:50.932103 kernel: audit: initializing netlink subsys (disabled) Oct 31 05:22:50.932123 kernel: audit: type=2000 audit(1761888170.326:1): state=initialized audit_enabled=0 res=1 Oct 31 05:22:50.932136 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 31 05:22:50.932149 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 31 05:22:50.932162 kernel: cpuidle: using governor menu Oct 31 05:22:50.932184 kernel: ACPI: bus type PCI registered Oct 31 05:22:50.932203 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 31 05:22:50.932216 kernel: dca service started, version 1.12.1 Oct 31 05:22:50.932229 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Oct 31 05:22:50.932253 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Oct 31 05:22:50.932266 kernel: PCI: Using configuration type 1 for base access Oct 31 05:22:50.932279 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 31 05:22:50.932292 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 31 05:22:50.932304 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 31 05:22:50.932317 kernel: ACPI: Added _OSI(Module Device) Oct 31 05:22:50.932334 kernel: ACPI: Added _OSI(Processor Device) Oct 31 05:22:50.932347 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 31 05:22:50.932359 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 31 05:22:50.932372 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 31 05:22:50.932384 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 31 05:22:50.932396 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 31 05:22:50.932409 kernel: ACPI: Interpreter enabled Oct 31 05:22:50.932421 kernel: ACPI: PM: (supports S0 S5) Oct 31 05:22:50.932433 kernel: ACPI: Using IOAPIC for interrupt routing Oct 31 05:22:50.932449 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 31 05:22:50.932462 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Oct 31 05:22:50.932474 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 31 05:22:50.932735 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 31 05:22:50.932900 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 31 05:22:50.933087 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 31 05:22:50.933107 kernel: PCI host bridge to bus 0000:00 Oct 31 05:22:50.933303 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 31 05:22:50.933448 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 31 05:22:50.933596 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 31 05:22:50.933735 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Oct 31 05:22:50.933875 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 31 05:22:50.934021 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Oct 31 05:22:50.934220 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 31 05:22:50.934420 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Oct 31 05:22:50.934592 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Oct 31 05:22:50.934751 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Oct 31 05:22:50.934905 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Oct 31 05:22:50.935081 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Oct 31 05:22:50.935275 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 31 05:22:50.935444 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Oct 31 05:22:50.935610 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Oct 31 05:22:50.935782 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Oct 31 05:22:50.935951 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Oct 31 05:22:50.936155 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Oct 31 05:22:50.936327 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Oct 31 05:22:50.936492 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Oct 31 05:22:50.936653 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Oct 31 05:22:50.936816 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Oct 31 05:22:50.936972 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Oct 31 05:22:50.937172 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Oct 31 05:22:50.937361 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Oct 31 05:22:50.937548 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Oct 31 05:22:50.937713 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Oct 31 05:22:50.937877 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Oct 31 05:22:50.938031 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Oct 31 05:22:50.938229 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Oct 31 05:22:50.938403 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Oct 31 05:22:50.938561 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Oct 31 05:22:50.938743 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Oct 31 05:22:50.938899 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Oct 31 05:22:50.946100 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 31 05:22:50.946294 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Oct 31 05:22:50.946460 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Oct 31 05:22:50.946620 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Oct 31 05:22:50.946798 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Oct 31 05:22:50.946967 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Oct 31 05:22:50.947186 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Oct 31 05:22:50.947386 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Oct 31 05:22:50.947571 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Oct 31 05:22:50.947772 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Oct 31 05:22:50.947955 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Oct 31 05:22:50.948159 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Oct 31 05:22:50.948347 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Oct 31 05:22:50.948505 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Oct 31 05:22:50.948660 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Oct 31 05:22:50.948814 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 31 05:22:50.948982 kernel: pci_bus 0000:02: extended config space not accessible Oct 31 05:22:50.949192 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Oct 31 05:22:50.949382 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Oct 31 05:22:50.949548 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Oct 31 05:22:50.949709 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Oct 31 05:22:50.949879 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Oct 31 05:22:50.950059 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Oct 31 05:22:50.950222 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Oct 31 05:22:50.950399 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Oct 31 05:22:50.950556 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 31 05:22:50.950731 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Oct 31 05:22:50.950895 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Oct 31 05:22:50.951075 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Oct 31 05:22:50.951234 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Oct 31 05:22:50.951402 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 31 05:22:50.951569 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Oct 31 05:22:50.951742 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Oct 31 05:22:50.951899 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 31 05:22:50.952054 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Oct 31 05:22:50.952230 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Oct 31 05:22:50.952400 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 31 05:22:50.952566 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Oct 31 05:22:50.952726 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Oct 31 05:22:50.952888 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 31 05:22:50.960120 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Oct 31 05:22:50.960316 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Oct 31 05:22:50.960480 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 31 05:22:50.960641 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Oct 31 05:22:50.960798 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Oct 31 05:22:50.960955 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 31 05:22:50.960982 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 31 05:22:50.960996 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 31 05:22:50.961016 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 31 05:22:50.961029 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 31 05:22:50.961058 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Oct 31 05:22:50.961073 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Oct 31 05:22:50.961086 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Oct 31 05:22:50.961099 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Oct 31 05:22:50.961111 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Oct 31 05:22:50.961124 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Oct 31 05:22:50.961136 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Oct 31 05:22:50.961154 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Oct 31 05:22:50.961167 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Oct 31 05:22:50.961180 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Oct 31 05:22:50.961192 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Oct 31 05:22:50.961205 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Oct 31 05:22:50.961217 kernel: iommu: Default domain type: Translated Oct 31 05:22:50.961230 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 31 05:22:50.961398 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Oct 31 05:22:50.961554 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 31 05:22:50.961714 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Oct 31 05:22:50.961734 kernel: vgaarb: loaded Oct 31 05:22:50.961747 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 31 05:22:50.961759 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 31 05:22:50.961772 kernel: PTP clock support registered Oct 31 05:22:50.961785 kernel: PCI: Using ACPI for IRQ routing Oct 31 05:22:50.961797 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 31 05:22:50.961809 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 31 05:22:50.961822 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Oct 31 05:22:50.961840 kernel: clocksource: Switched to clocksource kvm-clock Oct 31 05:22:50.961861 kernel: VFS: Disk quotas dquot_6.6.0 Oct 31 05:22:50.961873 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 31 05:22:50.961886 kernel: pnp: PnP ACPI init Oct 31 05:22:50.962083 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Oct 31 05:22:50.962104 kernel: pnp: PnP ACPI: found 5 devices Oct 31 05:22:50.962118 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 31 05:22:50.962130 kernel: NET: Registered PF_INET protocol family Oct 31 05:22:50.962149 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 31 05:22:50.962162 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 31 05:22:50.962175 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 31 05:22:50.962187 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 31 05:22:50.962200 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 31 05:22:50.962213 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 31 05:22:50.962225 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 31 05:22:50.962250 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 31 05:22:50.962268 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 31 05:22:50.962281 kernel: NET: Registered PF_XDP protocol family Oct 31 05:22:50.962438 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Oct 31 05:22:50.962594 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Oct 31 05:22:50.962759 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Oct 31 05:22:50.962914 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Oct 31 05:22:50.963083 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Oct 31 05:22:50.963261 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Oct 31 05:22:50.963417 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Oct 31 05:22:50.963585 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Oct 31 05:22:50.963741 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Oct 31 05:22:50.963893 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Oct 31 05:22:50.964064 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Oct 31 05:22:50.964224 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Oct 31 05:22:50.964414 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Oct 31 05:22:50.964570 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Oct 31 05:22:50.964723 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Oct 31 05:22:50.964876 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Oct 31 05:22:50.965037 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Oct 31 05:22:50.965221 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Oct 31 05:22:50.965398 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Oct 31 05:22:50.965553 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Oct 31 05:22:50.965716 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Oct 31 05:22:50.965888 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 31 05:22:50.966093 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Oct 31 05:22:50.966260 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Oct 31 05:22:50.966418 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Oct 31 05:22:50.966571 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 31 05:22:50.966723 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Oct 31 05:22:50.966900 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Oct 31 05:22:50.967052 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Oct 31 05:22:50.976302 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 31 05:22:50.976465 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Oct 31 05:22:50.976623 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Oct 31 05:22:50.976778 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Oct 31 05:22:50.976931 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 31 05:22:50.977113 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Oct 31 05:22:50.977293 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Oct 31 05:22:50.977450 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Oct 31 05:22:50.977612 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 31 05:22:50.977767 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Oct 31 05:22:50.977922 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Oct 31 05:22:50.978099 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Oct 31 05:22:50.978269 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 31 05:22:50.978427 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Oct 31 05:22:50.978612 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Oct 31 05:22:50.978768 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Oct 31 05:22:50.978935 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 31 05:22:50.979131 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Oct 31 05:22:50.979305 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Oct 31 05:22:50.979473 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Oct 31 05:22:50.979643 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 31 05:22:50.979814 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 31 05:22:50.979966 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 31 05:22:50.980125 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 31 05:22:50.980321 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Oct 31 05:22:50.980476 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Oct 31 05:22:50.980659 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Oct 31 05:22:50.980839 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Oct 31 05:22:50.981020 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Oct 31 05:22:50.981201 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Oct 31 05:22:50.981388 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Oct 31 05:22:50.981568 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Oct 31 05:22:50.981778 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Oct 31 05:22:50.981939 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 31 05:22:50.982151 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Oct 31 05:22:50.982349 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Oct 31 05:22:50.982519 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 31 05:22:50.982706 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Oct 31 05:22:50.982879 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Oct 31 05:22:50.984168 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 31 05:22:50.984377 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Oct 31 05:22:50.984548 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Oct 31 05:22:50.984720 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 31 05:22:50.984888 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Oct 31 05:22:50.985035 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Oct 31 05:22:50.985214 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 31 05:22:50.985392 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Oct 31 05:22:50.985549 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Oct 31 05:22:50.985707 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 31 05:22:50.985886 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Oct 31 05:22:50.986033 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Oct 31 05:22:50.986197 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 31 05:22:50.986217 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Oct 31 05:22:50.986231 kernel: PCI: CLS 0 bytes, default 64 Oct 31 05:22:50.986256 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 31 05:22:50.986276 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Oct 31 05:22:50.986290 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 31 05:22:50.986304 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Oct 31 05:22:50.986317 kernel: Initialise system trusted keyrings Oct 31 05:22:50.986331 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 31 05:22:50.986344 kernel: Key type asymmetric registered Oct 31 05:22:50.986357 kernel: Asymmetric key parser 'x509' registered Oct 31 05:22:50.986370 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 31 05:22:50.986384 kernel: io scheduler mq-deadline registered Oct 31 05:22:50.986401 kernel: io scheduler kyber registered Oct 31 05:22:50.986414 kernel: io scheduler bfq registered Oct 31 05:22:50.986572 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Oct 31 05:22:50.986729 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Oct 31 05:22:50.986907 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:22:50.987063 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Oct 31 05:22:50.987249 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Oct 31 05:22:50.987417 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:22:50.987572 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Oct 31 05:22:50.987727 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Oct 31 05:22:50.987882 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:22:50.988037 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Oct 31 05:22:50.988216 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Oct 31 05:22:50.988390 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:22:50.988545 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Oct 31 05:22:50.988698 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Oct 31 05:22:50.988858 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:22:50.989016 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Oct 31 05:22:50.989186 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Oct 31 05:22:50.989360 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:22:50.989527 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Oct 31 05:22:50.989681 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Oct 31 05:22:50.989845 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:22:50.990027 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Oct 31 05:22:50.990196 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Oct 31 05:22:50.990372 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 31 05:22:50.990393 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 31 05:22:50.990407 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Oct 31 05:22:50.990420 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Oct 31 05:22:50.990434 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 31 05:22:50.990447 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 31 05:22:50.990461 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 31 05:22:50.990474 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 31 05:22:50.990493 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 31 05:22:50.990682 kernel: rtc_cmos 00:03: RTC can wake from S4 Oct 31 05:22:50.990703 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 31 05:22:50.990860 kernel: rtc_cmos 00:03: registered as rtc0 Oct 31 05:22:50.991023 kernel: rtc_cmos 00:03: setting system clock to 2025-10-31T05:22:50 UTC (1761888170) Oct 31 05:22:51.000258 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Oct 31 05:22:51.000284 kernel: intel_pstate: CPU model not supported Oct 31 05:22:51.000299 kernel: NET: Registered PF_INET6 protocol family Oct 31 05:22:51.000319 kernel: Segment Routing with IPv6 Oct 31 05:22:51.000333 kernel: In-situ OAM (IOAM) with IPv6 Oct 31 05:22:51.000347 kernel: NET: Registered PF_PACKET protocol family Oct 31 05:22:51.000360 kernel: Key type dns_resolver registered Oct 31 05:22:51.000373 kernel: IPI shorthand broadcast: enabled Oct 31 05:22:51.000387 kernel: sched_clock: Marking stable (996682018, 223948138)->(1509640894, -289010738) Oct 31 05:22:51.000400 kernel: registered taskstats version 1 Oct 31 05:22:51.000414 kernel: Loading compiled-in X.509 certificates Oct 31 05:22:51.000427 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 8306d4e745b00e76b5fae2596c709096b7f28adc' Oct 31 05:22:51.000444 kernel: Key type .fscrypt registered Oct 31 05:22:51.000457 kernel: Key type fscrypt-provisioning registered Oct 31 05:22:51.000470 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 31 05:22:51.000484 kernel: ima: Allocated hash algorithm: sha1 Oct 31 05:22:51.000497 kernel: ima: No architecture policies found Oct 31 05:22:51.000511 kernel: clk: Disabling unused clocks Oct 31 05:22:51.000524 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 31 05:22:51.000537 kernel: Write protecting the kernel read-only data: 28672k Oct 31 05:22:51.000550 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 31 05:22:51.000567 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 31 05:22:51.000581 kernel: Run /init as init process Oct 31 05:22:51.000594 kernel: with arguments: Oct 31 05:22:51.000607 kernel: /init Oct 31 05:22:51.000620 kernel: with environment: Oct 31 05:22:51.000633 kernel: HOME=/ Oct 31 05:22:51.000646 kernel: TERM=linux Oct 31 05:22:51.000658 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 31 05:22:51.000682 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 05:22:51.000716 systemd[1]: Detected virtualization kvm. Oct 31 05:22:51.000730 systemd[1]: Detected architecture x86-64. Oct 31 05:22:51.000744 systemd[1]: Running in initrd. Oct 31 05:22:51.000757 systemd[1]: No hostname configured, using default hostname. Oct 31 05:22:51.000771 systemd[1]: Hostname set to . Oct 31 05:22:51.000785 systemd[1]: Initializing machine ID from VM UUID. Oct 31 05:22:51.000799 systemd[1]: Queued start job for default target initrd.target. Oct 31 05:22:51.000817 systemd[1]: Started systemd-ask-password-console.path. Oct 31 05:22:51.000831 systemd[1]: Reached target cryptsetup.target. Oct 31 05:22:51.000845 systemd[1]: Reached target paths.target. Oct 31 05:22:51.000859 systemd[1]: Reached target slices.target. Oct 31 05:22:51.000873 systemd[1]: Reached target swap.target. Oct 31 05:22:51.000886 systemd[1]: Reached target timers.target. Oct 31 05:22:51.000901 systemd[1]: Listening on iscsid.socket. Oct 31 05:22:51.000918 systemd[1]: Listening on iscsiuio.socket. Oct 31 05:22:51.000940 systemd[1]: Listening on systemd-journald-audit.socket. Oct 31 05:22:51.000955 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 31 05:22:51.000969 systemd[1]: Listening on systemd-journald.socket. Oct 31 05:22:51.000982 systemd[1]: Listening on systemd-networkd.socket. Oct 31 05:22:51.001001 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 05:22:51.001015 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 05:22:51.001041 systemd[1]: Reached target sockets.target. Oct 31 05:22:51.001070 systemd[1]: Starting kmod-static-nodes.service... Oct 31 05:22:51.001091 systemd[1]: Finished network-cleanup.service. Oct 31 05:22:51.001105 systemd[1]: Starting systemd-fsck-usr.service... Oct 31 05:22:51.001128 systemd[1]: Starting systemd-journald.service... Oct 31 05:22:51.001142 systemd[1]: Starting systemd-modules-load.service... Oct 31 05:22:51.001156 systemd[1]: Starting systemd-resolved.service... Oct 31 05:22:51.001182 systemd[1]: Starting systemd-vconsole-setup.service... Oct 31 05:22:51.001196 systemd[1]: Finished kmod-static-nodes.service. Oct 31 05:22:51.001211 kernel: audit: type=1130 audit(1761888170.920:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.001229 systemd[1]: Finished systemd-fsck-usr.service. Oct 31 05:22:51.001260 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 31 05:22:51.001284 systemd-journald[202]: Journal started Oct 31 05:22:51.001357 systemd-journald[202]: Runtime Journal (/run/log/journal/74b7dc50f4074b0fb3a020fad5ed7948) is 4.7M, max 38.1M, 33.3M free. Oct 31 05:22:50.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:50.920799 systemd-modules-load[203]: Inserted module 'overlay' Oct 31 05:22:51.030933 kernel: Bridge firewalling registered Oct 31 05:22:51.030960 systemd[1]: Started systemd-resolved.service. Oct 31 05:22:51.030981 kernel: audit: type=1130 audit(1761888171.024:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:50.974803 systemd-resolved[204]: Positive Trust Anchors: Oct 31 05:22:51.039434 systemd[1]: Started systemd-journald.service. Oct 31 05:22:51.039464 kernel: audit: type=1130 audit(1761888171.031:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.039484 kernel: SCSI subsystem initialized Oct 31 05:22:51.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:50.974823 systemd-resolved[204]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 05:22:51.045488 kernel: audit: type=1130 audit(1761888171.039:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:50.974869 systemd-resolved[204]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 05:22:51.061390 kernel: audit: type=1130 audit(1761888171.046:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.061419 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 31 05:22:51.061439 kernel: device-mapper: uevent: version 1.0.3 Oct 31 05:22:51.061457 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 31 05:22:51.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:50.978796 systemd-resolved[204]: Defaulting to hostname 'linux'. Oct 31 05:22:51.004333 systemd-modules-load[203]: Inserted module 'br_netfilter' Oct 31 05:22:51.040356 systemd[1]: Finished systemd-vconsole-setup.service. Oct 31 05:22:51.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.046376 systemd[1]: Reached target nss-lookup.target. Oct 31 05:22:51.074740 kernel: audit: type=1130 audit(1761888171.067:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.061786 systemd[1]: Starting dracut-cmdline-ask.service... Oct 31 05:22:51.062780 systemd-modules-load[203]: Inserted module 'dm_multipath' Oct 31 05:22:51.064479 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 31 05:22:51.066704 systemd[1]: Finished systemd-modules-load.service. Oct 31 05:22:51.077528 systemd[1]: Starting systemd-sysctl.service... Oct 31 05:22:51.086461 systemd[1]: Finished dracut-cmdline-ask.service. Oct 31 05:22:51.093765 kernel: audit: type=1130 audit(1761888171.088:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.088326 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 31 05:22:51.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.100456 systemd[1]: Finished systemd-sysctl.service. Oct 31 05:22:51.121263 kernel: audit: type=1130 audit(1761888171.095:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.121303 kernel: audit: type=1130 audit(1761888171.101:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.102553 systemd[1]: Starting dracut-cmdline.service... Oct 31 05:22:51.122119 dracut-cmdline[224]: dracut-dracut-053 Oct 31 05:22:51.123099 dracut-cmdline[224]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=7605c743a37b990723033788c91d5dcda748347858877b1088098370c2a7e4d3 Oct 31 05:22:51.208134 kernel: Loading iSCSI transport class v2.0-870. Oct 31 05:22:51.230077 kernel: iscsi: registered transport (tcp) Oct 31 05:22:51.259333 kernel: iscsi: registered transport (qla4xxx) Oct 31 05:22:51.259386 kernel: QLogic iSCSI HBA Driver Oct 31 05:22:51.307221 systemd[1]: Finished dracut-cmdline.service. Oct 31 05:22:51.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.309253 systemd[1]: Starting dracut-pre-udev.service... Oct 31 05:22:51.369137 kernel: raid6: sse2x4 gen() 13186 MB/s Oct 31 05:22:51.387152 kernel: raid6: sse2x4 xor() 7672 MB/s Oct 31 05:22:51.405219 kernel: raid6: sse2x2 gen() 8872 MB/s Oct 31 05:22:51.423080 kernel: raid6: sse2x2 xor() 7590 MB/s Oct 31 05:22:51.441147 kernel: raid6: sse2x1 gen() 9413 MB/s Oct 31 05:22:51.459843 kernel: raid6: sse2x1 xor() 6983 MB/s Oct 31 05:22:51.459879 kernel: raid6: using algorithm sse2x4 gen() 13186 MB/s Oct 31 05:22:51.459896 kernel: raid6: .... xor() 7672 MB/s, rmw enabled Oct 31 05:22:51.461273 kernel: raid6: using ssse3x2 recovery algorithm Oct 31 05:22:51.479171 kernel: xor: automatically using best checksumming function avx Oct 31 05:22:51.599094 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 31 05:22:51.612342 systemd[1]: Finished dracut-pre-udev.service. Oct 31 05:22:51.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.613000 audit: BPF prog-id=7 op=LOAD Oct 31 05:22:51.613000 audit: BPF prog-id=8 op=LOAD Oct 31 05:22:51.614353 systemd[1]: Starting systemd-udevd.service... Oct 31 05:22:51.632316 systemd-udevd[402]: Using default interface naming scheme 'v252'. Oct 31 05:22:51.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.640856 systemd[1]: Started systemd-udevd.service. Oct 31 05:22:51.642640 systemd[1]: Starting dracut-pre-trigger.service... Oct 31 05:22:51.660217 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation Oct 31 05:22:51.700724 systemd[1]: Finished dracut-pre-trigger.service. Oct 31 05:22:51.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.702608 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 05:22:51.801079 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 05:22:51.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:51.885225 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Oct 31 05:22:51.977147 kernel: ACPI: bus type USB registered Oct 31 05:22:51.977195 kernel: usbcore: registered new interface driver usbfs Oct 31 05:22:51.977238 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 31 05:22:51.977258 kernel: usbcore: registered new interface driver hub Oct 31 05:22:51.977293 kernel: GPT:17805311 != 125829119 Oct 31 05:22:51.977312 kernel: usbcore: registered new device driver usb Oct 31 05:22:51.977329 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 31 05:22:51.977345 kernel: GPT:17805311 != 125829119 Oct 31 05:22:51.977361 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 31 05:22:51.977378 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 05:22:51.977395 kernel: cryptd: max_cpu_qlen set to 1000 Oct 31 05:22:51.977412 kernel: AVX version of gcm_enc/dec engaged. Oct 31 05:22:51.977428 kernel: AES CTR mode by8 optimization enabled Oct 31 05:22:51.977444 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Oct 31 05:22:51.977674 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Oct 31 05:22:51.977874 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Oct 31 05:22:51.978068 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Oct 31 05:22:51.978284 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Oct 31 05:22:51.978472 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Oct 31 05:22:51.978658 kernel: hub 1-0:1.0: USB hub found Oct 31 05:22:51.978891 kernel: hub 1-0:1.0: 4 ports detected Oct 31 05:22:51.979107 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Oct 31 05:22:51.979358 kernel: hub 2-0:1.0: USB hub found Oct 31 05:22:51.979572 kernel: hub 2-0:1.0: 4 ports detected Oct 31 05:22:51.997075 kernel: libata version 3.00 loaded. Oct 31 05:22:52.022106 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (447) Oct 31 05:22:52.039515 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 31 05:22:52.135304 kernel: ahci 0000:00:1f.2: version 3.0 Oct 31 05:22:52.135545 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Oct 31 05:22:52.135568 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Oct 31 05:22:52.135776 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Oct 31 05:22:52.135977 kernel: scsi host0: ahci Oct 31 05:22:52.136224 kernel: scsi host1: ahci Oct 31 05:22:52.136425 kernel: scsi host2: ahci Oct 31 05:22:52.136610 kernel: scsi host3: ahci Oct 31 05:22:52.136817 kernel: scsi host4: ahci Oct 31 05:22:52.137035 kernel: scsi host5: ahci Oct 31 05:22:52.137279 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 41 Oct 31 05:22:52.137300 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 41 Oct 31 05:22:52.137317 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 41 Oct 31 05:22:52.137341 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 41 Oct 31 05:22:52.137358 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 41 Oct 31 05:22:52.137374 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 41 Oct 31 05:22:52.139352 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 31 05:22:52.144023 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 31 05:22:52.144825 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 31 05:22:52.152642 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 05:22:52.154726 systemd[1]: Starting disk-uuid.service... Oct 31 05:22:52.162655 disk-uuid[526]: Primary Header is updated. Oct 31 05:22:52.162655 disk-uuid[526]: Secondary Entries is updated. Oct 31 05:22:52.162655 disk-uuid[526]: Secondary Header is updated. Oct 31 05:22:52.167068 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 05:22:52.174081 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 05:22:52.222065 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Oct 31 05:22:52.364115 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 31 05:22:52.375718 kernel: ata2: SATA link down (SStatus 0 SControl 300) Oct 31 05:22:52.375797 kernel: ata1: SATA link down (SStatus 0 SControl 300) Oct 31 05:22:52.376066 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 31 05:22:52.381144 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 31 05:22:52.381188 kernel: ata3: SATA link down (SStatus 0 SControl 300) Oct 31 05:22:52.383102 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 31 05:22:52.396461 kernel: usbcore: registered new interface driver usbhid Oct 31 05:22:52.396514 kernel: usbhid: USB HID core driver Oct 31 05:22:52.409274 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input3 Oct 31 05:22:52.409318 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Oct 31 05:22:53.180104 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 31 05:22:53.182098 disk-uuid[527]: The operation has completed successfully. Oct 31 05:22:53.232938 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 31 05:22:53.233122 systemd[1]: Finished disk-uuid.service. Oct 31 05:22:53.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.235170 systemd[1]: Starting verity-setup.service... Oct 31 05:22:53.256090 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Oct 31 05:22:53.313358 systemd[1]: Found device dev-mapper-usr.device. Oct 31 05:22:53.316111 systemd[1]: Mounting sysusr-usr.mount... Oct 31 05:22:53.319536 systemd[1]: Finished verity-setup.service. Oct 31 05:22:53.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.414101 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 31 05:22:53.414463 systemd[1]: Mounted sysusr-usr.mount. Oct 31 05:22:53.415316 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 31 05:22:53.416347 systemd[1]: Starting ignition-setup.service... Oct 31 05:22:53.419028 systemd[1]: Starting parse-ip-for-networkd.service... Oct 31 05:22:53.438011 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 05:22:53.438101 kernel: BTRFS info (device vda6): using free space tree Oct 31 05:22:53.438131 kernel: BTRFS info (device vda6): has skinny extents Oct 31 05:22:53.457373 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 31 05:22:53.466867 systemd[1]: Finished ignition-setup.service. Oct 31 05:22:53.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.468774 systemd[1]: Starting ignition-fetch-offline.service... Oct 31 05:22:53.582199 systemd[1]: Finished parse-ip-for-networkd.service. Oct 31 05:22:53.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.584000 audit: BPF prog-id=9 op=LOAD Oct 31 05:22:53.585100 systemd[1]: Starting systemd-networkd.service... Oct 31 05:22:53.628707 systemd-networkd[707]: lo: Link UP Oct 31 05:22:53.628725 systemd-networkd[707]: lo: Gained carrier Oct 31 05:22:53.631080 systemd-networkd[707]: Enumeration completed Oct 31 05:22:53.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.631871 systemd-networkd[707]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 05:22:53.631916 systemd[1]: Started systemd-networkd.service. Oct 31 05:22:53.632737 systemd[1]: Reached target network.target. Oct 31 05:22:53.634456 systemd-networkd[707]: eth0: Link UP Oct 31 05:22:53.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.634462 systemd-networkd[707]: eth0: Gained carrier Oct 31 05:22:53.646259 systemd[1]: Starting iscsiuio.service... Oct 31 05:22:53.650954 systemd[1]: Started iscsiuio.service. Oct 31 05:22:53.654099 systemd[1]: Starting iscsid.service... Oct 31 05:22:53.659416 iscsid[712]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 31 05:22:53.659416 iscsid[712]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 31 05:22:53.659416 iscsid[712]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 31 05:22:53.659416 iscsid[712]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 31 05:22:53.669133 iscsid[712]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 31 05:22:53.669133 iscsid[712]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 31 05:22:53.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.663852 ignition[624]: Ignition 2.14.0 Oct 31 05:22:53.663094 systemd[1]: Started iscsid.service. Oct 31 05:22:53.663873 ignition[624]: Stage: fetch-offline Oct 31 05:22:53.669882 systemd[1]: Finished ignition-fetch-offline.service. Oct 31 05:22:53.663997 ignition[624]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:22:53.672193 systemd-networkd[707]: eth0: DHCPv4 address 10.230.36.102/30, gateway 10.230.36.101 acquired from 10.230.36.101 Oct 31 05:22:53.664036 ignition[624]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:22:53.675157 systemd[1]: Starting dracut-initqueue.service... Oct 31 05:22:53.665822 ignition[624]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:22:53.684077 systemd[1]: Starting ignition-fetch.service... Oct 31 05:22:53.665985 ignition[624]: parsed url from cmdline: "" Oct 31 05:22:53.665993 ignition[624]: no config URL provided Oct 31 05:22:53.666003 ignition[624]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 05:22:53.666019 ignition[624]: no config at "/usr/lib/ignition/user.ign" Oct 31 05:22:53.666065 ignition[624]: failed to fetch config: resource requires networking Oct 31 05:22:53.666425 ignition[624]: Ignition finished successfully Oct 31 05:22:53.699617 ignition[715]: Ignition 2.14.0 Oct 31 05:22:53.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.702639 systemd[1]: Finished dracut-initqueue.service. Oct 31 05:22:53.699633 ignition[715]: Stage: fetch Oct 31 05:22:53.703537 systemd[1]: Reached target remote-fs-pre.target. Oct 31 05:22:53.699805 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:22:53.705211 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 05:22:53.699853 ignition[715]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:22:53.706696 systemd[1]: Reached target remote-fs.target. Oct 31 05:22:53.701197 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:22:53.709364 systemd[1]: Starting dracut-pre-mount.service... Oct 31 05:22:53.701348 ignition[715]: parsed url from cmdline: "" Oct 31 05:22:53.701355 ignition[715]: no config URL provided Oct 31 05:22:53.701366 ignition[715]: reading system config file "/usr/lib/ignition/user.ign" Oct 31 05:22:53.701382 ignition[715]: no config at "/usr/lib/ignition/user.ign" Oct 31 05:22:53.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.723733 systemd[1]: Finished dracut-pre-mount.service. Oct 31 05:22:53.705242 ignition[715]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Oct 31 05:22:53.705261 ignition[715]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Oct 31 05:22:53.706756 ignition[715]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Oct 31 05:22:53.740565 ignition[715]: GET result: OK Oct 31 05:22:53.741436 ignition[715]: parsing config with SHA512: f786c32ed86c961d67e623a14f5e780e4a819fe1b29fa6e9b36101d5b1e786f113f8dbefe42e1602226d28c070a7dc2be8da0beb5ddcb07ca9cea57d31ba16b4 Oct 31 05:22:53.750158 unknown[715]: fetched base config from "system" Oct 31 05:22:53.750191 unknown[715]: fetched base config from "system" Oct 31 05:22:53.750697 ignition[715]: fetch: fetch complete Oct 31 05:22:53.750215 unknown[715]: fetched user config from "openstack" Oct 31 05:22:53.750706 ignition[715]: fetch: fetch passed Oct 31 05:22:53.752514 systemd[1]: Finished ignition-fetch.service. Oct 31 05:22:53.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.750764 ignition[715]: Ignition finished successfully Oct 31 05:22:53.754636 systemd[1]: Starting ignition-kargs.service... Oct 31 05:22:53.767727 ignition[732]: Ignition 2.14.0 Oct 31 05:22:53.768779 ignition[732]: Stage: kargs Oct 31 05:22:53.769612 ignition[732]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:22:53.770609 ignition[732]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:22:53.772054 ignition[732]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:22:53.774589 ignition[732]: kargs: kargs passed Oct 31 05:22:53.775352 ignition[732]: Ignition finished successfully Oct 31 05:22:53.777238 systemd[1]: Finished ignition-kargs.service. Oct 31 05:22:53.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.779154 systemd[1]: Starting ignition-disks.service... Oct 31 05:22:53.789277 ignition[738]: Ignition 2.14.0 Oct 31 05:22:53.789297 ignition[738]: Stage: disks Oct 31 05:22:53.789480 ignition[738]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:22:53.789526 ignition[738]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:22:53.790820 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:22:53.792312 ignition[738]: disks: disks passed Oct 31 05:22:53.793409 systemd[1]: Finished ignition-disks.service. Oct 31 05:22:53.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.792379 ignition[738]: Ignition finished successfully Oct 31 05:22:53.794826 systemd[1]: Reached target initrd-root-device.target. Oct 31 05:22:53.795946 systemd[1]: Reached target local-fs-pre.target. Oct 31 05:22:53.797218 systemd[1]: Reached target local-fs.target. Oct 31 05:22:53.798412 systemd[1]: Reached target sysinit.target. Oct 31 05:22:53.799603 systemd[1]: Reached target basic.target. Oct 31 05:22:53.802299 systemd[1]: Starting systemd-fsck-root.service... Oct 31 05:22:53.821879 systemd-fsck[745]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Oct 31 05:22:53.825945 systemd[1]: Finished systemd-fsck-root.service. Oct 31 05:22:53.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.827900 systemd[1]: Mounting sysroot.mount... Oct 31 05:22:53.840064 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 31 05:22:53.840748 systemd[1]: Mounted sysroot.mount. Oct 31 05:22:53.841541 systemd[1]: Reached target initrd-root-fs.target. Oct 31 05:22:53.844268 systemd[1]: Mounting sysroot-usr.mount... Oct 31 05:22:53.845502 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 31 05:22:53.846471 systemd[1]: Starting flatcar-openstack-hostname.service... Oct 31 05:22:53.849539 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 31 05:22:53.849583 systemd[1]: Reached target ignition-diskful.target. Oct 31 05:22:53.854641 systemd[1]: Mounted sysroot-usr.mount. Oct 31 05:22:53.857659 systemd[1]: Starting initrd-setup-root.service... Oct 31 05:22:53.868972 initrd-setup-root[756]: cut: /sysroot/etc/passwd: No such file or directory Oct 31 05:22:53.880944 initrd-setup-root[764]: cut: /sysroot/etc/group: No such file or directory Oct 31 05:22:53.888882 initrd-setup-root[772]: cut: /sysroot/etc/shadow: No such file or directory Oct 31 05:22:53.900890 initrd-setup-root[781]: cut: /sysroot/etc/gshadow: No such file or directory Oct 31 05:22:53.963010 systemd[1]: Finished initrd-setup-root.service. Oct 31 05:22:53.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:53.965273 systemd[1]: Starting ignition-mount.service... Oct 31 05:22:53.966956 systemd[1]: Starting sysroot-boot.service... Oct 31 05:22:53.975677 bash[799]: umount: /sysroot/usr/share/oem: not mounted. Oct 31 05:22:53.993316 ignition[800]: INFO : Ignition 2.14.0 Oct 31 05:22:53.994387 ignition[800]: INFO : Stage: mount Oct 31 05:22:53.995246 ignition[800]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:22:53.996221 ignition[800]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:22:53.999722 ignition[800]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:22:54.002402 ignition[800]: INFO : mount: mount passed Oct 31 05:22:54.003641 ignition[800]: INFO : Ignition finished successfully Oct 31 05:22:54.005312 systemd[1]: Finished ignition-mount.service. Oct 31 05:22:54.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:54.012441 systemd[1]: Finished sysroot-boot.service. Oct 31 05:22:54.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:54.014390 coreos-metadata[751]: Oct 31 05:22:54.014 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Oct 31 05:22:54.036094 coreos-metadata[751]: Oct 31 05:22:54.035 INFO Fetch successful Oct 31 05:22:54.037269 coreos-metadata[751]: Oct 31 05:22:54.037 INFO wrote hostname srv-clgmo.gb1.brightbox.com to /sysroot/etc/hostname Oct 31 05:22:54.039950 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Oct 31 05:22:54.040128 systemd[1]: Finished flatcar-openstack-hostname.service. Oct 31 05:22:54.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:54.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:54.339854 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 31 05:22:54.352117 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (808) Oct 31 05:22:54.356008 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 31 05:22:54.356065 kernel: BTRFS info (device vda6): using free space tree Oct 31 05:22:54.356097 kernel: BTRFS info (device vda6): has skinny extents Oct 31 05:22:54.363359 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 31 05:22:54.365484 systemd[1]: Starting ignition-files.service... Oct 31 05:22:54.387448 ignition[828]: INFO : Ignition 2.14.0 Oct 31 05:22:54.387448 ignition[828]: INFO : Stage: files Oct 31 05:22:54.389278 ignition[828]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:22:54.389278 ignition[828]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:22:54.389278 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:22:54.392521 ignition[828]: DEBUG : files: compiled without relabeling support, skipping Oct 31 05:22:54.392521 ignition[828]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 31 05:22:54.392521 ignition[828]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 31 05:22:54.395757 ignition[828]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 31 05:22:54.395757 ignition[828]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 31 05:22:54.398519 ignition[828]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 31 05:22:54.398519 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Oct 31 05:22:54.398519 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 Oct 31 05:22:54.397328 unknown[828]: wrote ssh authorized keys file for user: core Oct 31 05:22:54.591246 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 31 05:22:54.875271 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Oct 31 05:22:54.876632 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Oct 31 05:22:54.876632 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Oct 31 05:22:54.876632 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 31 05:22:54.879870 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 31 05:22:54.879870 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 31 05:22:54.879870 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 31 05:22:54.879870 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 31 05:22:54.879870 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 31 05:22:54.879870 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 05:22:54.879870 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 31 05:22:54.879870 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.34.1-x86-64.raw" Oct 31 05:22:54.879870 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.34.1-x86-64.raw" Oct 31 05:22:54.879870 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.34.1-x86-64.raw" Oct 31 05:22:54.879870 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.34.1-x86-64.raw: attempt #1 Oct 31 05:22:55.445803 systemd-networkd[707]: eth0: Gained IPv6LL Oct 31 05:22:55.607072 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Oct 31 05:22:56.774157 systemd-networkd[707]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8919:24:19ff:fee6:2466/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8919:24:19ff:fee6:2466/64 assigned by NDisc. Oct 31 05:22:56.774172 systemd-networkd[707]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Oct 31 05:22:57.464180 ignition[828]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.34.1-x86-64.raw" Oct 31 05:22:57.466175 ignition[828]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 31 05:22:57.466175 ignition[828]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 31 05:22:57.466175 ignition[828]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Oct 31 05:22:57.466175 ignition[828]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 31 05:22:57.475054 ignition[828]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 31 05:22:57.475054 ignition[828]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Oct 31 05:22:57.475054 ignition[828]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 31 05:22:57.475054 ignition[828]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 31 05:22:57.475054 ignition[828]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Oct 31 05:22:57.475054 ignition[828]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Oct 31 05:22:57.491252 kernel: kauditd_printk_skb: 28 callbacks suppressed Oct 31 05:22:57.491305 kernel: audit: type=1130 audit(1761888177.483:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.481446 systemd[1]: Finished ignition-files.service. Oct 31 05:22:57.492315 ignition[828]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 31 05:22:57.492315 ignition[828]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 31 05:22:57.492315 ignition[828]: INFO : files: files passed Oct 31 05:22:57.492315 ignition[828]: INFO : Ignition finished successfully Oct 31 05:22:57.494656 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 31 05:22:57.495776 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 31 05:22:57.497470 systemd[1]: Starting ignition-quench.service... Oct 31 05:22:57.521173 kernel: audit: type=1130 audit(1761888177.504:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.521222 kernel: audit: type=1131 audit(1761888177.504:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.521242 kernel: audit: type=1130 audit(1761888177.515:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.502890 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 31 05:22:57.522479 initrd-setup-root-after-ignition[853]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 31 05:22:57.503059 systemd[1]: Finished ignition-quench.service. Oct 31 05:22:57.514500 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 31 05:22:57.515630 systemd[1]: Reached target ignition-complete.target. Oct 31 05:22:57.523024 systemd[1]: Starting initrd-parse-etc.service... Oct 31 05:22:57.543251 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 31 05:22:57.543443 systemd[1]: Finished initrd-parse-etc.service. Oct 31 05:22:57.555008 kernel: audit: type=1130 audit(1761888177.544:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.555110 kernel: audit: type=1131 audit(1761888177.544:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.545156 systemd[1]: Reached target initrd-fs.target. Oct 31 05:22:57.555614 systemd[1]: Reached target initrd.target. Oct 31 05:22:57.556937 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 31 05:22:57.558344 systemd[1]: Starting dracut-pre-pivot.service... Oct 31 05:22:57.582796 kernel: audit: type=1130 audit(1761888177.576:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.575885 systemd[1]: Finished dracut-pre-pivot.service. Oct 31 05:22:57.577700 systemd[1]: Starting initrd-cleanup.service... Oct 31 05:22:57.592397 systemd[1]: Stopped target nss-lookup.target. Oct 31 05:22:57.594011 systemd[1]: Stopped target remote-cryptsetup.target. Oct 31 05:22:57.594893 systemd[1]: Stopped target timers.target. Oct 31 05:22:57.610449 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 31 05:22:57.616950 kernel: audit: type=1131 audit(1761888177.611:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.610639 systemd[1]: Stopped dracut-pre-pivot.service. Oct 31 05:22:57.611761 systemd[1]: Stopped target initrd.target. Oct 31 05:22:57.617671 systemd[1]: Stopped target basic.target. Oct 31 05:22:57.618867 systemd[1]: Stopped target ignition-complete.target. Oct 31 05:22:57.620172 systemd[1]: Stopped target ignition-diskful.target. Oct 31 05:22:57.621410 systemd[1]: Stopped target initrd-root-device.target. Oct 31 05:22:57.622696 systemd[1]: Stopped target remote-fs.target. Oct 31 05:22:57.623981 systemd[1]: Stopped target remote-fs-pre.target. Oct 31 05:22:57.625387 systemd[1]: Stopped target sysinit.target. Oct 31 05:22:57.626585 systemd[1]: Stopped target local-fs.target. Oct 31 05:22:57.627804 systemd[1]: Stopped target local-fs-pre.target. Oct 31 05:22:57.629098 systemd[1]: Stopped target swap.target. Oct 31 05:22:57.636643 kernel: audit: type=1131 audit(1761888177.631:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.630205 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 31 05:22:57.630446 systemd[1]: Stopped dracut-pre-mount.service. Oct 31 05:22:57.644024 kernel: audit: type=1131 audit(1761888177.638:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.631674 systemd[1]: Stopped target cryptsetup.target. Oct 31 05:22:57.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.637416 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 31 05:22:57.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.637642 systemd[1]: Stopped dracut-initqueue.service. Oct 31 05:22:57.638840 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 31 05:22:57.639106 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 31 05:22:57.645019 systemd[1]: ignition-files.service: Deactivated successfully. Oct 31 05:22:57.645303 systemd[1]: Stopped ignition-files.service. Oct 31 05:22:57.647563 systemd[1]: Stopping ignition-mount.service... Oct 31 05:22:57.654677 iscsid[712]: iscsid shutting down. Oct 31 05:22:57.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.660267 systemd[1]: Stopping iscsid.service... Oct 31 05:22:57.660876 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 31 05:22:57.661085 systemd[1]: Stopped kmod-static-nodes.service. Oct 31 05:22:57.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.662968 systemd[1]: Stopping sysroot-boot.service... Oct 31 05:22:57.663609 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 31 05:22:57.663799 systemd[1]: Stopped systemd-udev-trigger.service. Oct 31 05:22:57.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.664641 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 31 05:22:57.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.664785 systemd[1]: Stopped dracut-pre-trigger.service. Oct 31 05:22:57.668505 systemd[1]: iscsid.service: Deactivated successfully. Oct 31 05:22:57.669583 systemd[1]: Stopped iscsid.service. Oct 31 05:22:57.676172 systemd[1]: Stopping iscsiuio.service... Oct 31 05:22:57.677962 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 31 05:22:57.678159 systemd[1]: Stopped iscsiuio.service. Oct 31 05:22:57.689143 ignition[866]: INFO : Ignition 2.14.0 Oct 31 05:22:57.689143 ignition[866]: INFO : Stage: umount Oct 31 05:22:57.689143 ignition[866]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 31 05:22:57.689143 ignition[866]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 31 05:22:57.689143 ignition[866]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 31 05:22:57.679872 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 31 05:22:57.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.696460 ignition[866]: INFO : umount: umount passed Oct 31 05:22:57.696460 ignition[866]: INFO : Ignition finished successfully Oct 31 05:22:57.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.680952 systemd[1]: Finished initrd-cleanup.service. Oct 31 05:22:57.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.687688 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 31 05:22:57.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.693355 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 31 05:22:57.693506 systemd[1]: Stopped sysroot-boot.service. Oct 31 05:22:57.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.695997 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 31 05:22:57.696184 systemd[1]: Stopped ignition-mount.service. Oct 31 05:22:57.697176 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 31 05:22:57.697243 systemd[1]: Stopped ignition-disks.service. Oct 31 05:22:57.698449 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 31 05:22:57.698519 systemd[1]: Stopped ignition-kargs.service. Oct 31 05:22:57.699826 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 31 05:22:57.699887 systemd[1]: Stopped ignition-fetch.service. Oct 31 05:22:57.701144 systemd[1]: Stopped target network.target. Oct 31 05:22:57.702405 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 31 05:22:57.702473 systemd[1]: Stopped ignition-fetch-offline.service. Oct 31 05:22:57.703832 systemd[1]: Stopped target paths.target. Oct 31 05:22:57.705006 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 31 05:22:57.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.709128 systemd[1]: Stopped systemd-ask-password-console.path. Oct 31 05:22:57.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.710025 systemd[1]: Stopped target slices.target. Oct 31 05:22:57.712036 systemd[1]: Stopped target sockets.target. Oct 31 05:22:57.713306 systemd[1]: iscsid.socket: Deactivated successfully. Oct 31 05:22:57.713362 systemd[1]: Closed iscsid.socket. Oct 31 05:22:57.714739 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 31 05:22:57.714795 systemd[1]: Closed iscsiuio.socket. Oct 31 05:22:57.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.716009 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 31 05:22:57.716119 systemd[1]: Stopped ignition-setup.service. Oct 31 05:22:57.717277 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 31 05:22:57.717339 systemd[1]: Stopped initrd-setup-root.service. Oct 31 05:22:57.719403 systemd[1]: Stopping systemd-networkd.service... Oct 31 05:22:57.720241 systemd[1]: Stopping systemd-resolved.service... Oct 31 05:22:57.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.723111 systemd-networkd[707]: eth0: DHCPv6 lease lost Oct 31 05:22:57.733000 audit: BPF prog-id=9 op=UNLOAD Oct 31 05:22:57.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.724317 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 31 05:22:57.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.724467 systemd[1]: Stopped systemd-networkd.service. Oct 31 05:22:57.726017 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 31 05:22:57.726119 systemd[1]: Closed systemd-networkd.socket. Oct 31 05:22:57.727798 systemd[1]: Stopping network-cleanup.service... Oct 31 05:22:57.731162 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 31 05:22:57.731236 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 31 05:22:57.732672 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 31 05:22:57.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.732752 systemd[1]: Stopped systemd-sysctl.service. Oct 31 05:22:57.734307 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 31 05:22:57.734381 systemd[1]: Stopped systemd-modules-load.service. Oct 31 05:22:57.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.738806 systemd[1]: Stopping systemd-udevd.service... Oct 31 05:22:57.744686 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 31 05:22:57.752000 audit: BPF prog-id=6 op=UNLOAD Oct 31 05:22:57.745453 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 31 05:22:57.745619 systemd[1]: Stopped systemd-resolved.service. Oct 31 05:22:57.749006 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 31 05:22:57.749268 systemd[1]: Stopped systemd-udevd.service. Oct 31 05:22:57.752514 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 31 05:22:57.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.752599 systemd[1]: Closed systemd-udevd-control.socket. Oct 31 05:22:57.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.755880 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 31 05:22:57.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.755932 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 31 05:22:57.757220 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 31 05:22:57.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.757293 systemd[1]: Stopped dracut-pre-udev.service. Oct 31 05:22:57.758497 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 31 05:22:57.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.758565 systemd[1]: Stopped dracut-cmdline.service. Oct 31 05:22:57.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:57.759936 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 31 05:22:57.759995 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 31 05:22:57.762049 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 31 05:22:57.776750 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 31 05:22:57.776828 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 31 05:22:57.778725 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 31 05:22:57.778869 systemd[1]: Stopped network-cleanup.service. Oct 31 05:22:57.780510 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 31 05:22:57.780626 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 31 05:22:57.781736 systemd[1]: Reached target initrd-switch-root.target. Oct 31 05:22:57.783706 systemd[1]: Starting initrd-switch-root.service... Oct 31 05:22:57.800962 systemd[1]: Switching root. Oct 31 05:22:57.821435 systemd-journald[202]: Journal stopped Oct 31 05:23:01.845796 systemd-journald[202]: Received SIGTERM from PID 1 (systemd). Oct 31 05:23:01.846458 kernel: SELinux: Class mctp_socket not defined in policy. Oct 31 05:23:01.846504 kernel: SELinux: Class anon_inode not defined in policy. Oct 31 05:23:01.846532 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 31 05:23:01.846558 kernel: SELinux: policy capability network_peer_controls=1 Oct 31 05:23:01.846584 kernel: SELinux: policy capability open_perms=1 Oct 31 05:23:01.846612 kernel: SELinux: policy capability extended_socket_class=1 Oct 31 05:23:01.846637 kernel: SELinux: policy capability always_check_network=0 Oct 31 05:23:01.846671 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 31 05:23:01.846954 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 31 05:23:01.846997 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 31 05:23:01.847017 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 31 05:23:01.847086 systemd[1]: Successfully loaded SELinux policy in 62.687ms. Oct 31 05:23:01.847137 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.585ms. Oct 31 05:23:01.847177 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 31 05:23:01.847201 systemd[1]: Detected virtualization kvm. Oct 31 05:23:01.847222 systemd[1]: Detected architecture x86-64. Oct 31 05:23:01.847254 systemd[1]: Detected first boot. Oct 31 05:23:01.847285 systemd[1]: Hostname set to . Oct 31 05:23:01.847307 systemd[1]: Initializing machine ID from VM UUID. Oct 31 05:23:01.847343 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 31 05:23:01.847385 systemd[1]: Populated /etc with preset unit settings. Oct 31 05:23:01.847417 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 05:23:01.847445 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 05:23:01.847475 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 05:23:01.847510 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 31 05:23:01.847538 systemd[1]: Stopped initrd-switch-root.service. Oct 31 05:23:01.847573 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 31 05:23:01.847601 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 31 05:23:01.847623 systemd[1]: Created slice system-addon\x2drun.slice. Oct 31 05:23:01.847644 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 31 05:23:01.847665 systemd[1]: Created slice system-getty.slice. Oct 31 05:23:01.847685 systemd[1]: Created slice system-modprobe.slice. Oct 31 05:23:01.847720 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 31 05:23:01.847742 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 31 05:23:01.847763 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 31 05:23:01.847796 systemd[1]: Created slice user.slice. Oct 31 05:23:01.847820 systemd[1]: Started systemd-ask-password-console.path. Oct 31 05:23:01.847846 systemd[1]: Started systemd-ask-password-wall.path. Oct 31 05:23:01.847876 systemd[1]: Set up automount boot.automount. Oct 31 05:23:01.847906 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 31 05:23:01.847932 systemd[1]: Stopped target initrd-switch-root.target. Oct 31 05:23:01.847973 systemd[1]: Stopped target initrd-fs.target. Oct 31 05:23:01.848005 systemd[1]: Stopped target initrd-root-fs.target. Oct 31 05:23:01.848036 systemd[1]: Reached target integritysetup.target. Oct 31 05:23:01.848077 systemd[1]: Reached target remote-cryptsetup.target. Oct 31 05:23:01.848100 systemd[1]: Reached target remote-fs.target. Oct 31 05:23:01.848127 systemd[1]: Reached target slices.target. Oct 31 05:23:01.848148 systemd[1]: Reached target swap.target. Oct 31 05:23:01.848169 systemd[1]: Reached target torcx.target. Oct 31 05:23:01.848202 systemd[1]: Reached target veritysetup.target. Oct 31 05:23:01.848225 systemd[1]: Listening on systemd-coredump.socket. Oct 31 05:23:01.848256 systemd[1]: Listening on systemd-initctl.socket. Oct 31 05:23:01.848279 systemd[1]: Listening on systemd-networkd.socket. Oct 31 05:23:01.848319 systemd[1]: Listening on systemd-udevd-control.socket. Oct 31 05:23:01.848342 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 31 05:23:01.848369 systemd[1]: Listening on systemd-userdbd.socket. Oct 31 05:23:01.848391 systemd[1]: Mounting dev-hugepages.mount... Oct 31 05:23:01.848418 systemd[1]: Mounting dev-mqueue.mount... Oct 31 05:23:01.848440 systemd[1]: Mounting media.mount... Oct 31 05:23:01.848466 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:23:01.848499 systemd[1]: Mounting sys-kernel-debug.mount... Oct 31 05:23:01.848521 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 31 05:23:01.848543 systemd[1]: Mounting tmp.mount... Oct 31 05:23:01.848571 systemd[1]: Starting flatcar-tmpfiles.service... Oct 31 05:23:01.848601 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:23:01.848622 systemd[1]: Starting kmod-static-nodes.service... Oct 31 05:23:01.848651 systemd[1]: Starting modprobe@configfs.service... Oct 31 05:23:01.848678 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:23:01.848705 systemd[1]: Starting modprobe@drm.service... Oct 31 05:23:01.848736 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:23:01.848765 systemd[1]: Starting modprobe@fuse.service... Oct 31 05:23:01.848787 systemd[1]: Starting modprobe@loop.service... Oct 31 05:23:01.848808 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 31 05:23:01.848835 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 31 05:23:01.848869 systemd[1]: Stopped systemd-fsck-root.service. Oct 31 05:23:01.848890 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 31 05:23:01.848918 systemd[1]: Stopped systemd-fsck-usr.service. Oct 31 05:23:01.848947 systemd[1]: Stopped systemd-journald.service. Oct 31 05:23:01.848996 systemd[1]: Starting systemd-journald.service... Oct 31 05:23:01.849027 systemd[1]: Starting systemd-modules-load.service... Oct 31 05:23:01.849063 systemd[1]: Starting systemd-network-generator.service... Oct 31 05:23:01.849085 kernel: fuse: init (API version 7.34) Oct 31 05:23:01.849106 systemd[1]: Starting systemd-remount-fs.service... Oct 31 05:23:01.849134 systemd[1]: Starting systemd-udev-trigger.service... Oct 31 05:23:01.849162 systemd[1]: verity-setup.service: Deactivated successfully. Oct 31 05:23:01.849191 systemd[1]: Stopped verity-setup.service. Oct 31 05:23:01.849218 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:23:01.849250 kernel: loop: module loaded Oct 31 05:23:01.849277 systemd-journald[976]: Journal started Oct 31 05:23:01.849379 systemd-journald[976]: Runtime Journal (/run/log/journal/74b7dc50f4074b0fb3a020fad5ed7948) is 4.7M, max 38.1M, 33.3M free. Oct 31 05:22:57.991000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 31 05:22:58.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 05:22:58.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 31 05:22:58.069000 audit: BPF prog-id=10 op=LOAD Oct 31 05:22:58.069000 audit: BPF prog-id=10 op=UNLOAD Oct 31 05:22:58.070000 audit: BPF prog-id=11 op=LOAD Oct 31 05:22:58.070000 audit: BPF prog-id=11 op=UNLOAD Oct 31 05:22:58.199000 audit[898]: AVC avc: denied { associate } for pid=898 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 31 05:22:58.199000 audit[898]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878c2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=881 pid=898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:22:58.199000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 05:22:58.202000 audit[898]: AVC avc: denied { associate } for pid=898 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 31 05:22:58.202000 audit[898]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000187999 a2=1ed a3=0 items=2 ppid=881 pid=898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:22:58.202000 audit: CWD cwd="/" Oct 31 05:22:58.202000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:22:58.202000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:22:58.202000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 31 05:23:01.610000 audit: BPF prog-id=12 op=LOAD Oct 31 05:23:01.610000 audit: BPF prog-id=3 op=UNLOAD Oct 31 05:23:01.610000 audit: BPF prog-id=13 op=LOAD Oct 31 05:23:01.611000 audit: BPF prog-id=14 op=LOAD Oct 31 05:23:01.611000 audit: BPF prog-id=4 op=UNLOAD Oct 31 05:23:01.611000 audit: BPF prog-id=5 op=UNLOAD Oct 31 05:23:01.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.621000 audit: BPF prog-id=12 op=UNLOAD Oct 31 05:23:01.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.784000 audit: BPF prog-id=15 op=LOAD Oct 31 05:23:01.785000 audit: BPF prog-id=16 op=LOAD Oct 31 05:23:01.852113 systemd[1]: Started systemd-journald.service. Oct 31 05:23:01.785000 audit: BPF prog-id=17 op=LOAD Oct 31 05:23:01.785000 audit: BPF prog-id=13 op=UNLOAD Oct 31 05:23:01.785000 audit: BPF prog-id=14 op=UNLOAD Oct 31 05:23:01.825000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 31 05:23:01.825000 audit[976]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7fff3eb50410 a2=4000 a3=7fff3eb504ac items=0 ppid=1 pid=976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:01.825000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 31 05:23:01.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:22:58.194527 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 05:23:01.606300 systemd[1]: Queued start job for default target multi-user.target. Oct 31 05:22:58.195361 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 05:23:01.606329 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 31 05:22:58.195411 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 05:23:01.612912 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 31 05:22:58.195466 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 31 05:23:01.852224 systemd[1]: Mounted dev-hugepages.mount. Oct 31 05:22:58.195484 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 31 05:23:01.853280 systemd[1]: Mounted dev-mqueue.mount. Oct 31 05:22:58.195536 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 31 05:22:58.195558 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 31 05:22:58.195959 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 31 05:22:58.196021 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 31 05:22:58.196107 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 31 05:22:58.198168 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 31 05:22:58.198226 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 31 05:22:58.198259 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 31 05:22:58.198286 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 31 05:22:58.198319 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 31 05:22:58.198346 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:22:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 31 05:23:00.999309 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:23:00Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 05:23:01.000005 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:23:00Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 05:23:01.000263 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:23:01Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 05:23:01.000722 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:23:01Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 31 05:23:01.000856 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:23:01Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 31 05:23:01.001058 /usr/lib/systemd/system-generators/torcx-generator[898]: time="2025-10-31T05:23:01Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 31 05:23:01.857950 systemd[1]: Mounted media.mount. Oct 31 05:23:01.858711 systemd[1]: Mounted sys-kernel-debug.mount. Oct 31 05:23:01.859464 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 31 05:23:01.860236 systemd[1]: Mounted tmp.mount. Oct 31 05:23:01.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.861241 systemd[1]: Finished kmod-static-nodes.service. Oct 31 05:23:01.862316 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 31 05:23:01.862552 systemd[1]: Finished modprobe@configfs.service. Oct 31 05:23:01.863692 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:23:01.863886 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:23:01.864950 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 05:23:01.865221 systemd[1]: Finished modprobe@drm.service. Oct 31 05:23:01.866296 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:23:01.866509 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:23:01.868574 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 31 05:23:01.868818 systemd[1]: Finished modprobe@fuse.service. Oct 31 05:23:01.869887 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:23:01.872208 systemd[1]: Finished modprobe@loop.service. Oct 31 05:23:01.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.874984 systemd[1]: Finished systemd-modules-load.service. Oct 31 05:23:01.876388 systemd[1]: Finished systemd-network-generator.service. Oct 31 05:23:01.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.878254 systemd[1]: Finished systemd-remount-fs.service. Oct 31 05:23:01.879705 systemd[1]: Reached target network-pre.target. Oct 31 05:23:01.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.882662 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 31 05:23:01.885236 systemd[1]: Mounting sys-kernel-config.mount... Oct 31 05:23:01.889553 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 31 05:23:01.892766 systemd[1]: Starting systemd-hwdb-update.service... Oct 31 05:23:01.896081 systemd[1]: Starting systemd-journal-flush.service... Oct 31 05:23:01.897532 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 05:23:01.901693 systemd[1]: Starting systemd-random-seed.service... Oct 31 05:23:01.902517 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 05:23:01.904511 systemd[1]: Starting systemd-sysctl.service... Oct 31 05:23:01.908024 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 31 05:23:01.909165 systemd[1]: Mounted sys-kernel-config.mount. Oct 31 05:23:01.911207 systemd-journald[976]: Time spent on flushing to /var/log/journal/74b7dc50f4074b0fb3a020fad5ed7948 is 73.858ms for 1281 entries. Oct 31 05:23:01.911207 systemd-journald[976]: System Journal (/var/log/journal/74b7dc50f4074b0fb3a020fad5ed7948) is 8.0M, max 584.8M, 576.8M free. Oct 31 05:23:02.009351 systemd-journald[976]: Received client request to flush runtime journal. Oct 31 05:23:01.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:01.930080 systemd[1]: Finished systemd-random-seed.service. Oct 31 05:23:01.931006 systemd[1]: Reached target first-boot-complete.target. Oct 31 05:23:01.932976 systemd[1]: Finished flatcar-tmpfiles.service. Oct 31 05:23:01.935607 systemd[1]: Starting systemd-sysusers.service... Oct 31 05:23:01.950519 systemd[1]: Finished systemd-sysctl.service. Oct 31 05:23:01.978666 systemd[1]: Finished systemd-sysusers.service. Oct 31 05:23:02.011102 systemd[1]: Finished systemd-journal-flush.service. Oct 31 05:23:02.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:02.084057 systemd[1]: Finished systemd-udev-trigger.service. Oct 31 05:23:02.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:02.086564 systemd[1]: Starting systemd-udev-settle.service... Oct 31 05:23:02.098474 udevadm[1008]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 31 05:23:02.559639 systemd[1]: Finished systemd-hwdb-update.service. Oct 31 05:23:02.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:02.562511 systemd[1]: Starting systemd-udevd.service... Oct 31 05:23:02.564564 kernel: kauditd_printk_skb: 94 callbacks suppressed Oct 31 05:23:02.564640 kernel: audit: type=1130 audit(1761888182.560:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:02.561000 audit: BPF prog-id=18 op=LOAD Oct 31 05:23:02.572465 kernel: audit: type=1334 audit(1761888182.561:135): prog-id=18 op=LOAD Oct 31 05:23:02.572546 kernel: audit: type=1334 audit(1761888182.561:136): prog-id=19 op=LOAD Oct 31 05:23:02.561000 audit: BPF prog-id=19 op=LOAD Oct 31 05:23:02.574006 kernel: audit: type=1334 audit(1761888182.561:137): prog-id=7 op=UNLOAD Oct 31 05:23:02.561000 audit: BPF prog-id=7 op=UNLOAD Oct 31 05:23:02.575784 kernel: audit: type=1334 audit(1761888182.561:138): prog-id=8 op=UNLOAD Oct 31 05:23:02.561000 audit: BPF prog-id=8 op=UNLOAD Oct 31 05:23:02.599005 systemd-udevd[1009]: Using default interface naming scheme 'v252'. Oct 31 05:23:02.658801 kernel: audit: type=1130 audit(1761888182.652:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:02.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:02.649817 systemd[1]: Started systemd-udevd.service. Oct 31 05:23:02.657000 audit: BPF prog-id=20 op=LOAD Oct 31 05:23:02.661120 systemd[1]: Starting systemd-networkd.service... Oct 31 05:23:02.663236 kernel: audit: type=1334 audit(1761888182.657:140): prog-id=20 op=LOAD Oct 31 05:23:02.677791 kernel: audit: type=1334 audit(1761888182.673:141): prog-id=21 op=LOAD Oct 31 05:23:02.678071 kernel: audit: type=1334 audit(1761888182.675:142): prog-id=22 op=LOAD Oct 31 05:23:02.678187 kernel: audit: type=1334 audit(1761888182.676:143): prog-id=23 op=LOAD Oct 31 05:23:02.673000 audit: BPF prog-id=21 op=LOAD Oct 31 05:23:02.675000 audit: BPF prog-id=22 op=LOAD Oct 31 05:23:02.676000 audit: BPF prog-id=23 op=LOAD Oct 31 05:23:02.680002 systemd[1]: Starting systemd-userdbd.service... Oct 31 05:23:02.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:02.727693 systemd[1]: Started systemd-userdbd.service. Oct 31 05:23:02.767982 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 31 05:23:02.860857 systemd-networkd[1013]: lo: Link UP Oct 31 05:23:02.861513 systemd-networkd[1013]: lo: Gained carrier Oct 31 05:23:02.862541 systemd-networkd[1013]: Enumeration completed Oct 31 05:23:02.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:02.862797 systemd[1]: Started systemd-networkd.service. Oct 31 05:23:02.864230 systemd-networkd[1013]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 31 05:23:02.873139 systemd-networkd[1013]: eth0: Link UP Oct 31 05:23:02.873301 systemd-networkd[1013]: eth0: Gained carrier Oct 31 05:23:02.881096 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input4 Oct 31 05:23:02.894491 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 31 05:23:02.898980 kernel: mousedev: PS/2 mouse device common for all mice Oct 31 05:23:02.899661 kernel: ACPI: button: Power Button [PWRF] Oct 31 05:23:02.899260 systemd-networkd[1013]: eth0: DHCPv4 address 10.230.36.102/30, gateway 10.230.36.101 acquired from 10.230.36.101 Oct 31 05:23:02.946000 audit[1019]: AVC avc: denied { confidentiality } for pid=1019 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 31 05:23:02.946000 audit[1019]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5651872b6bc0 a1=338ec a2=7f5e34a29bc5 a3=5 items=110 ppid=1009 pid=1019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:02.946000 audit: CWD cwd="/" Oct 31 05:23:02.946000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=1 name=(null) inode=15967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=2 name=(null) inode=15967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=3 name=(null) inode=15968 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=4 name=(null) inode=15967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=5 name=(null) inode=15969 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=6 name=(null) inode=15967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=7 name=(null) inode=15970 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=8 name=(null) inode=15970 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=9 name=(null) inode=15971 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=10 name=(null) inode=15970 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=11 name=(null) inode=15972 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=12 name=(null) inode=15970 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=13 name=(null) inode=15973 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=14 name=(null) inode=15970 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=15 name=(null) inode=15974 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=16 name=(null) inode=15970 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=17 name=(null) inode=15975 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=18 name=(null) inode=15967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=19 name=(null) inode=15976 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=20 name=(null) inode=15976 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=21 name=(null) inode=15977 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=22 name=(null) inode=15976 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=23 name=(null) inode=15978 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=24 name=(null) inode=15976 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=25 name=(null) inode=15979 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=26 name=(null) inode=15976 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=27 name=(null) inode=15980 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=28 name=(null) inode=15976 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=29 name=(null) inode=15981 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=30 name=(null) inode=15967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=31 name=(null) inode=15982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=32 name=(null) inode=15982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=33 name=(null) inode=15983 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=34 name=(null) inode=15982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=35 name=(null) inode=15984 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=36 name=(null) inode=15982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=37 name=(null) inode=15985 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=38 name=(null) inode=15982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=39 name=(null) inode=15986 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=40 name=(null) inode=15982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=41 name=(null) inode=15987 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=42 name=(null) inode=15967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=43 name=(null) inode=15988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=44 name=(null) inode=15988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=45 name=(null) inode=15989 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=46 name=(null) inode=15988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=47 name=(null) inode=15990 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=48 name=(null) inode=15988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=49 name=(null) inode=15991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=50 name=(null) inode=15988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=51 name=(null) inode=15992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=52 name=(null) inode=15988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=53 name=(null) inode=15993 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=55 name=(null) inode=15994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=56 name=(null) inode=15994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=57 name=(null) inode=15995 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=58 name=(null) inode=15994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=59 name=(null) inode=15996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=60 name=(null) inode=15994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=61 name=(null) inode=15997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=62 name=(null) inode=15997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=63 name=(null) inode=15998 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=64 name=(null) inode=15997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=65 name=(null) inode=15999 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=66 name=(null) inode=15997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=67 name=(null) inode=16000 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=68 name=(null) inode=15997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=69 name=(null) inode=16001 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=70 name=(null) inode=15997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=71 name=(null) inode=16002 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=72 name=(null) inode=15994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=73 name=(null) inode=16003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=74 name=(null) inode=16003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=75 name=(null) inode=16004 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=76 name=(null) inode=16003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=77 name=(null) inode=16005 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=78 name=(null) inode=16003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=79 name=(null) inode=16006 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=80 name=(null) inode=16003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=81 name=(null) inode=16007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=82 name=(null) inode=16003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=83 name=(null) inode=16008 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=84 name=(null) inode=15994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=85 name=(null) inode=16009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=86 name=(null) inode=16009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=87 name=(null) inode=16010 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=88 name=(null) inode=16009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=89 name=(null) inode=16011 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=90 name=(null) inode=16009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=91 name=(null) inode=16012 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=92 name=(null) inode=16009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=93 name=(null) inode=16013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=94 name=(null) inode=16009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=95 name=(null) inode=16014 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=96 name=(null) inode=15994 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=97 name=(null) inode=16015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=98 name=(null) inode=16015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=99 name=(null) inode=16016 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=100 name=(null) inode=16015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=101 name=(null) inode=16017 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=102 name=(null) inode=16015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=103 name=(null) inode=16018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=104 name=(null) inode=16015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=105 name=(null) inode=16019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=106 name=(null) inode=16015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=107 name=(null) inode=16020 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PATH item=109 name=(null) inode=16021 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:23:02.946000 audit: PROCTITLE proctitle="(udev-worker)" Oct 31 05:23:03.020071 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input5 Oct 31 05:23:03.031070 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Oct 31 05:23:03.054465 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Oct 31 05:23:03.054751 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Oct 31 05:23:03.171689 systemd[1]: Finished systemd-udev-settle.service. Oct 31 05:23:03.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.174420 systemd[1]: Starting lvm2-activation-early.service... Oct 31 05:23:03.212628 lvm[1038]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 05:23:03.244668 systemd[1]: Finished lvm2-activation-early.service. Oct 31 05:23:03.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.245616 systemd[1]: Reached target cryptsetup.target. Oct 31 05:23:03.248107 systemd[1]: Starting lvm2-activation.service... Oct 31 05:23:03.253942 lvm[1039]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 31 05:23:03.283600 systemd[1]: Finished lvm2-activation.service. Oct 31 05:23:03.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.284539 systemd[1]: Reached target local-fs-pre.target. Oct 31 05:23:03.285226 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 31 05:23:03.285274 systemd[1]: Reached target local-fs.target. Oct 31 05:23:03.285887 systemd[1]: Reached target machines.target. Oct 31 05:23:03.288514 systemd[1]: Starting ldconfig.service... Oct 31 05:23:03.289879 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:23:03.289991 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:23:03.291814 systemd[1]: Starting systemd-boot-update.service... Oct 31 05:23:03.293978 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 31 05:23:03.304596 systemd[1]: Starting systemd-machine-id-commit.service... Oct 31 05:23:03.310233 systemd[1]: Starting systemd-sysext.service... Oct 31 05:23:03.322084 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1041 (bootctl) Oct 31 05:23:03.324479 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 31 05:23:03.334428 systemd[1]: Unmounting usr-share-oem.mount... Oct 31 05:23:03.341720 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 31 05:23:03.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.436760 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 31 05:23:03.437105 systemd[1]: Unmounted usr-share-oem.mount. Oct 31 05:23:03.493297 kernel: loop0: detected capacity change from 0 to 219144 Oct 31 05:23:03.518654 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 31 05:23:03.519511 systemd[1]: Finished systemd-machine-id-commit.service. Oct 31 05:23:03.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.537076 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 31 05:23:03.562076 kernel: loop1: detected capacity change from 0 to 219144 Oct 31 05:23:03.583348 (sd-sysext)[1053]: Using extensions 'kubernetes'. Oct 31 05:23:03.584428 (sd-sysext)[1053]: Merged extensions into '/usr'. Oct 31 05:23:03.588381 systemd-fsck[1050]: fsck.fat 4.2 (2021-01-31) Oct 31 05:23:03.588381 systemd-fsck[1050]: /dev/vda1: 790 files, 120772/258078 clusters Oct 31 05:23:03.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.592817 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 31 05:23:03.595323 systemd[1]: Mounting boot.mount... Oct 31 05:23:03.626487 systemd[1]: Mounted boot.mount. Oct 31 05:23:03.628476 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:23:03.631336 systemd[1]: Mounting usr-share-oem.mount... Oct 31 05:23:03.637596 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:23:03.642137 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:23:03.645337 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:23:03.652057 systemd[1]: Starting modprobe@loop.service... Oct 31 05:23:03.652879 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:23:03.653144 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:23:03.653389 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:23:03.658278 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:23:03.658524 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:23:03.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.663312 systemd[1]: Mounted usr-share-oem.mount. Oct 31 05:23:03.664467 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:23:03.664693 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:23:03.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.666383 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:23:03.666600 systemd[1]: Finished modprobe@loop.service. Oct 31 05:23:03.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.667999 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 05:23:03.668269 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 05:23:03.669726 systemd[1]: Finished systemd-sysext.service. Oct 31 05:23:03.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.673535 systemd[1]: Starting ensure-sysext.service... Oct 31 05:23:03.675897 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 31 05:23:03.679767 systemd[1]: Finished systemd-boot-update.service. Oct 31 05:23:03.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:03.694216 systemd[1]: Reloading. Oct 31 05:23:03.718026 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 31 05:23:03.727689 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 31 05:23:03.740574 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 31 05:23:03.873886 /usr/lib/systemd/system-generators/torcx-generator[1080]: time="2025-10-31T05:23:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 05:23:03.873953 /usr/lib/systemd/system-generators/torcx-generator[1080]: time="2025-10-31T05:23:03Z" level=info msg="torcx already run" Oct 31 05:23:03.894210 ldconfig[1040]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 31 05:23:03.993340 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 05:23:03.993371 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 05:23:04.024524 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 05:23:04.109000 audit: BPF prog-id=24 op=LOAD Oct 31 05:23:04.109000 audit: BPF prog-id=20 op=UNLOAD Oct 31 05:23:04.113000 audit: BPF prog-id=25 op=LOAD Oct 31 05:23:04.113000 audit: BPF prog-id=21 op=UNLOAD Oct 31 05:23:04.113000 audit: BPF prog-id=26 op=LOAD Oct 31 05:23:04.113000 audit: BPF prog-id=27 op=LOAD Oct 31 05:23:04.113000 audit: BPF prog-id=22 op=UNLOAD Oct 31 05:23:04.113000 audit: BPF prog-id=23 op=UNLOAD Oct 31 05:23:04.115000 audit: BPF prog-id=28 op=LOAD Oct 31 05:23:04.115000 audit: BPF prog-id=15 op=UNLOAD Oct 31 05:23:04.115000 audit: BPF prog-id=29 op=LOAD Oct 31 05:23:04.115000 audit: BPF prog-id=30 op=LOAD Oct 31 05:23:04.115000 audit: BPF prog-id=16 op=UNLOAD Oct 31 05:23:04.115000 audit: BPF prog-id=17 op=UNLOAD Oct 31 05:23:04.117000 audit: BPF prog-id=31 op=LOAD Oct 31 05:23:04.117000 audit: BPF prog-id=32 op=LOAD Oct 31 05:23:04.117000 audit: BPF prog-id=18 op=UNLOAD Oct 31 05:23:04.117000 audit: BPF prog-id=19 op=UNLOAD Oct 31 05:23:04.124789 systemd[1]: Finished ldconfig.service. Oct 31 05:23:04.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.127104 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 31 05:23:04.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.132611 systemd[1]: Starting audit-rules.service... Oct 31 05:23:04.134862 systemd[1]: Starting clean-ca-certificates.service... Oct 31 05:23:04.137538 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 31 05:23:04.142000 audit: BPF prog-id=33 op=LOAD Oct 31 05:23:04.143624 systemd[1]: Starting systemd-resolved.service... Oct 31 05:23:04.145000 audit: BPF prog-id=34 op=LOAD Oct 31 05:23:04.148273 systemd[1]: Starting systemd-timesyncd.service... Oct 31 05:23:04.150675 systemd[1]: Starting systemd-update-utmp.service... Oct 31 05:23:04.152479 systemd[1]: Finished clean-ca-certificates.service. Oct 31 05:23:04.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.156846 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 05:23:04.163752 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:23:04.165688 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:23:04.169790 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:23:04.173527 systemd[1]: Starting modprobe@loop.service... Oct 31 05:23:04.174293 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:23:04.174472 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:23:04.174655 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 05:23:04.176475 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:23:04.176692 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:23:04.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.179812 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:23:04.180154 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:23:04.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.181489 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:23:04.181676 systemd[1]: Finished modprobe@loop.service. Oct 31 05:23:04.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.187287 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:23:04.190750 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:23:04.194000 audit[1136]: SYSTEM_BOOT pid=1136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.194772 systemd[1]: Starting modprobe@efi_pstore.service... Oct 31 05:23:04.203145 systemd[1]: Starting modprobe@loop.service... Oct 31 05:23:04.203939 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:23:04.204184 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:23:04.204454 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 05:23:04.206200 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:23:04.206452 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:23:04.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.218875 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 31 05:23:04.219118 systemd[1]: Finished modprobe@efi_pstore.service. Oct 31 05:23:04.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.221669 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 31 05:23:04.224394 systemd[1]: Starting modprobe@dm_mod.service... Oct 31 05:23:04.227573 systemd[1]: Starting modprobe@drm.service... Oct 31 05:23:04.229948 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 31 05:23:04.230187 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:23:04.232262 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 31 05:23:04.233141 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 31 05:23:04.233357 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 31 05:23:04.237001 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 31 05:23:04.237234 systemd[1]: Finished modprobe@loop.service. Oct 31 05:23:04.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.238535 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 31 05:23:04.238733 systemd[1]: Finished modprobe@dm_mod.service. Oct 31 05:23:04.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.240081 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 31 05:23:04.240264 systemd[1]: Finished modprobe@drm.service. Oct 31 05:23:04.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.243621 systemd[1]: Finished ensure-sysext.service. Oct 31 05:23:04.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.248590 systemd[1]: Finished systemd-update-utmp.service. Oct 31 05:23:04.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.250768 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 31 05:23:04.277690 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 31 05:23:04.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:04.284376 systemd[1]: Starting systemd-update-done.service... Oct 31 05:23:04.292000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 31 05:23:04.292000 audit[1157]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd218066f0 a2=420 a3=0 items=0 ppid=1128 pid=1157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:04.292000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 31 05:23:04.293339 augenrules[1157]: No rules Oct 31 05:23:04.293719 systemd[1]: Finished audit-rules.service. Oct 31 05:23:04.298627 systemd[1]: Finished systemd-update-done.service. Oct 31 05:23:04.319366 systemd[1]: Started systemd-timesyncd.service. Oct 31 05:23:04.320182 systemd[1]: Reached target time-set.target. Oct 31 05:23:04.330941 systemd-resolved[1131]: Positive Trust Anchors: Oct 31 05:23:04.331502 systemd-resolved[1131]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 31 05:23:04.331666 systemd-resolved[1131]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 31 05:23:04.339652 systemd-resolved[1131]: Using system hostname 'srv-clgmo.gb1.brightbox.com'. Oct 31 05:23:04.342650 systemd[1]: Started systemd-resolved.service. Oct 31 05:23:04.343500 systemd[1]: Reached target network.target. Oct 31 05:23:04.344116 systemd[1]: Reached target nss-lookup.target. Oct 31 05:23:04.344737 systemd[1]: Reached target sysinit.target. Oct 31 05:23:04.345455 systemd[1]: Started motdgen.path. Oct 31 05:23:04.346099 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 31 05:23:04.347070 systemd[1]: Started logrotate.timer. Oct 31 05:23:04.347796 systemd[1]: Started mdadm.timer. Oct 31 05:23:04.348381 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 31 05:23:04.349020 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 31 05:23:04.349115 systemd[1]: Reached target paths.target. Oct 31 05:23:04.349698 systemd[1]: Reached target timers.target. Oct 31 05:23:04.350833 systemd[1]: Listening on dbus.socket. Oct 31 05:23:04.353006 systemd[1]: Starting docker.socket... Oct 31 05:23:04.357438 systemd[1]: Listening on sshd.socket. Oct 31 05:23:04.358247 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:23:04.358884 systemd[1]: Listening on docker.socket. Oct 31 05:23:04.359635 systemd[1]: Reached target sockets.target. Oct 31 05:23:04.360277 systemd[1]: Reached target basic.target. Oct 31 05:23:04.360982 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 05:23:04.361054 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 31 05:23:04.362731 systemd[1]: Starting containerd.service... Oct 31 05:23:04.366362 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 31 05:23:04.368754 systemd[1]: Starting dbus.service... Oct 31 05:23:04.372810 systemd[1]: Starting enable-oem-cloudinit.service... Oct 31 05:23:04.381351 systemd[1]: Starting extend-filesystems.service... Oct 31 05:23:04.383214 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 31 05:23:04.387754 systemd[1]: Starting motdgen.service... Oct 31 05:23:04.397447 jq[1171]: false Oct 31 05:23:04.391909 systemd[1]: Starting prepare-helm.service... Oct 31 05:23:04.394327 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 31 05:23:04.420197 systemd[1]: Starting sshd-keygen.service... Oct 31 05:23:04.426318 systemd[1]: Starting systemd-logind.service... Oct 31 05:23:04.430173 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 31 05:23:04.430295 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 31 05:23:04.431005 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 31 05:23:04.432283 systemd[1]: Starting update-engine.service... Oct 31 05:23:04.435366 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 31 05:23:04.439395 jq[1189]: true Oct 31 05:23:04.444383 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 31 05:23:04.444753 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 31 05:23:04.445440 systemd[1]: motdgen.service: Deactivated successfully. Oct 31 05:23:04.447150 systemd[1]: Finished motdgen.service. Oct 31 05:23:04.454921 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 31 05:23:04.456003 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 31 05:23:04.457692 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:23:04.457739 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 31 05:23:04.465797 extend-filesystems[1172]: Found loop1 Oct 31 05:23:04.465797 extend-filesystems[1172]: Found vda Oct 31 05:23:04.465797 extend-filesystems[1172]: Found vda1 Oct 31 05:23:04.465797 extend-filesystems[1172]: Found vda2 Oct 31 05:23:04.465797 extend-filesystems[1172]: Found vda3 Oct 31 05:23:04.465797 extend-filesystems[1172]: Found usr Oct 31 05:23:04.465797 extend-filesystems[1172]: Found vda4 Oct 31 05:23:04.465797 extend-filesystems[1172]: Found vda6 Oct 31 05:23:04.465797 extend-filesystems[1172]: Found vda7 Oct 31 05:23:04.465797 extend-filesystems[1172]: Found vda9 Oct 31 05:23:04.465797 extend-filesystems[1172]: Checking size of /dev/vda9 Oct 31 05:23:04.497210 jq[1192]: true Oct 31 05:23:04.497432 tar[1191]: linux-amd64/LICENSE Oct 31 05:23:04.497432 tar[1191]: linux-amd64/helm Oct 31 05:23:04.533558 systemd-networkd[1013]: eth0: Gained IPv6LL Oct 31 05:23:04.538600 extend-filesystems[1172]: Resized partition /dev/vda9 Oct 31 05:23:04.539574 dbus-daemon[1168]: [system] SELinux support is enabled Oct 31 05:23:04.539103 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 31 05:23:04.541317 systemd[1]: Started dbus.service. Oct 31 05:23:04.546555 systemd[1]: Reached target network-online.target. Oct 31 05:23:04.547800 extend-filesystems[1217]: resize2fs 1.46.5 (30-Dec-2021) Oct 31 05:23:04.551614 systemd[1]: Starting kubelet.service... Oct 31 05:23:04.552445 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 31 05:23:04.552552 systemd[1]: Reached target system-config.target. Oct 31 05:23:04.553073 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Oct 31 05:23:04.557164 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 31 05:23:04.557203 systemd[1]: Reached target user-config.target. Oct 31 05:23:04.563665 dbus-daemon[1168]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1013 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 31 05:23:04.577199 dbus-daemon[1168]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 31 05:23:04.585362 systemd[1]: Starting systemd-hostnamed.service... Oct 31 05:23:05.840564 systemd-resolved[1131]: Clock change detected. Flushing caches. Oct 31 05:23:05.841028 systemd-timesyncd[1133]: Contacted time server 87.106.103.161:123 (0.flatcar.pool.ntp.org). Oct 31 05:23:05.841120 systemd-timesyncd[1133]: Initial clock synchronization to Fri 2025-10-31 05:23:05.840491 UTC. Oct 31 05:23:05.859254 update_engine[1188]: I1031 05:23:05.858129 1188 main.cc:92] Flatcar Update Engine starting Oct 31 05:23:05.867471 systemd[1]: Started update-engine.service. Oct 31 05:23:05.870965 systemd[1]: Started locksmithd.service. Oct 31 05:23:05.873691 update_engine[1188]: I1031 05:23:05.872135 1188 update_check_scheduler.cc:74] Next update check in 9m21s Oct 31 05:23:05.881511 bash[1223]: Updated "/home/core/.ssh/authorized_keys" Oct 31 05:23:05.882108 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 31 05:23:05.908424 systemd-logind[1187]: Watching system buttons on /dev/input/event2 (Power Button) Oct 31 05:23:05.908481 systemd-logind[1187]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 31 05:23:05.914039 systemd[1]: Created slice system-sshd.slice. Oct 31 05:23:05.917113 systemd-logind[1187]: New seat seat0. Oct 31 05:23:05.923759 systemd[1]: Started systemd-logind.service. Oct 31 05:23:05.963921 env[1193]: time="2025-10-31T05:23:05.963803688Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 31 05:23:05.968739 dbus-daemon[1168]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 31 05:23:05.968922 systemd[1]: Started systemd-hostnamed.service. Oct 31 05:23:05.970850 dbus-daemon[1168]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1224 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 31 05:23:05.974400 systemd[1]: Starting polkit.service... Oct 31 05:23:05.992352 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Oct 31 05:23:06.001196 polkitd[1230]: Started polkitd version 121 Oct 31 05:23:06.021924 extend-filesystems[1217]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 31 05:23:06.021924 extend-filesystems[1217]: old_desc_blocks = 1, new_desc_blocks = 8 Oct 31 05:23:06.021924 extend-filesystems[1217]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Oct 31 05:23:06.027098 extend-filesystems[1172]: Resized filesystem in /dev/vda9 Oct 31 05:23:06.022488 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 31 05:23:06.022756 systemd[1]: Finished extend-filesystems.service. Oct 31 05:23:06.052494 polkitd[1230]: Loading rules from directory /etc/polkit-1/rules.d Oct 31 05:23:06.052620 polkitd[1230]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 31 05:23:06.065713 polkitd[1230]: Finished loading, compiling and executing 2 rules Oct 31 05:23:06.066388 dbus-daemon[1168]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 31 05:23:06.066600 systemd[1]: Started polkit.service. Oct 31 05:23:06.068494 polkitd[1230]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 31 05:23:06.096782 env[1193]: time="2025-10-31T05:23:06.096051831Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 31 05:23:06.096782 env[1193]: time="2025-10-31T05:23:06.096318288Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 31 05:23:06.106837 env[1193]: time="2025-10-31T05:23:06.106425609Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 31 05:23:06.106837 env[1193]: time="2025-10-31T05:23:06.106478504Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 31 05:23:06.106837 env[1193]: time="2025-10-31T05:23:06.106804464Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 05:23:06.106837 env[1193]: time="2025-10-31T05:23:06.106832828Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 31 05:23:06.107184 env[1193]: time="2025-10-31T05:23:06.106862149Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 31 05:23:06.107184 env[1193]: time="2025-10-31T05:23:06.106879179Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 31 05:23:06.107184 env[1193]: time="2025-10-31T05:23:06.107022996Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 31 05:23:06.107873 env[1193]: time="2025-10-31T05:23:06.107830508Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 31 05:23:06.108148 env[1193]: time="2025-10-31T05:23:06.108069297Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 31 05:23:06.108148 env[1193]: time="2025-10-31T05:23:06.108115208Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 31 05:23:06.108318 env[1193]: time="2025-10-31T05:23:06.108210706Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 31 05:23:06.108318 env[1193]: time="2025-10-31T05:23:06.108234427Z" level=info msg="metadata content store policy set" policy=shared Oct 31 05:23:06.111561 systemd-hostnamed[1224]: Hostname set to (static) Oct 31 05:23:06.123197 env[1193]: time="2025-10-31T05:23:06.123110614Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 31 05:23:06.123366 env[1193]: time="2025-10-31T05:23:06.123217861Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 31 05:23:06.123366 env[1193]: time="2025-10-31T05:23:06.123247815Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 31 05:23:06.123480 env[1193]: time="2025-10-31T05:23:06.123361202Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 31 05:23:06.124437 env[1193]: time="2025-10-31T05:23:06.123560992Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 31 05:23:06.124437 env[1193]: time="2025-10-31T05:23:06.123620113Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 31 05:23:06.124437 env[1193]: time="2025-10-31T05:23:06.123644423Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 31 05:23:06.124437 env[1193]: time="2025-10-31T05:23:06.123666145Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 31 05:23:06.124437 env[1193]: time="2025-10-31T05:23:06.123704045Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 31 05:23:06.124437 env[1193]: time="2025-10-31T05:23:06.123726946Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 31 05:23:06.124437 env[1193]: time="2025-10-31T05:23:06.123749455Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 31 05:23:06.124437 env[1193]: time="2025-10-31T05:23:06.123797266Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 31 05:23:06.124437 env[1193]: time="2025-10-31T05:23:06.124069313Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 31 05:23:06.124437 env[1193]: time="2025-10-31T05:23:06.124350466Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 31 05:23:06.124894 env[1193]: time="2025-10-31T05:23:06.124860623Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 31 05:23:06.124982 env[1193]: time="2025-10-31T05:23:06.124940621Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.125051 env[1193]: time="2025-10-31T05:23:06.124977231Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 31 05:23:06.125146 env[1193]: time="2025-10-31T05:23:06.125117664Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.125295 env[1193]: time="2025-10-31T05:23:06.125265718Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.125381 env[1193]: time="2025-10-31T05:23:06.125303702Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.125381 env[1193]: time="2025-10-31T05:23:06.125359478Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.125480 env[1193]: time="2025-10-31T05:23:06.125384320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.125480 env[1193]: time="2025-10-31T05:23:06.125407315Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.125480 env[1193]: time="2025-10-31T05:23:06.125449103Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.125629 env[1193]: time="2025-10-31T05:23:06.125478607Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.125629 env[1193]: time="2025-10-31T05:23:06.125518379Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 31 05:23:06.125884 env[1193]: time="2025-10-31T05:23:06.125852160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.125970 env[1193]: time="2025-10-31T05:23:06.125898480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.125970 env[1193]: time="2025-10-31T05:23:06.125945685Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.125970 env[1193]: time="2025-10-31T05:23:06.125967301Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 31 05:23:06.126120 env[1193]: time="2025-10-31T05:23:06.126007984Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 31 05:23:06.126120 env[1193]: time="2025-10-31T05:23:06.126030561Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 31 05:23:06.126120 env[1193]: time="2025-10-31T05:23:06.126078632Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 31 05:23:06.126271 env[1193]: time="2025-10-31T05:23:06.126187264Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 31 05:23:06.127372 env[1193]: time="2025-10-31T05:23:06.126525286Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 31 05:23:06.127372 env[1193]: time="2025-10-31T05:23:06.126627321Z" level=info msg="Connect containerd service" Oct 31 05:23:06.127372 env[1193]: time="2025-10-31T05:23:06.126692057Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 31 05:23:06.131253 env[1193]: time="2025-10-31T05:23:06.131208299Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 05:23:06.133692 env[1193]: time="2025-10-31T05:23:06.133349967Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 31 05:23:06.133692 env[1193]: time="2025-10-31T05:23:06.133458867Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 31 05:23:06.133744 systemd[1]: Started containerd.service. Oct 31 05:23:06.135424 env[1193]: time="2025-10-31T05:23:06.135375327Z" level=info msg="containerd successfully booted in 0.172713s" Oct 31 05:23:06.145867 env[1193]: time="2025-10-31T05:23:06.145676608Z" level=info msg="Start subscribing containerd event" Oct 31 05:23:06.146896 env[1193]: time="2025-10-31T05:23:06.146845722Z" level=info msg="Start recovering state" Oct 31 05:23:06.147111 env[1193]: time="2025-10-31T05:23:06.147077912Z" level=info msg="Start event monitor" Oct 31 05:23:06.147206 env[1193]: time="2025-10-31T05:23:06.147141322Z" level=info msg="Start snapshots syncer" Oct 31 05:23:06.147206 env[1193]: time="2025-10-31T05:23:06.147185454Z" level=info msg="Start cni network conf syncer for default" Oct 31 05:23:06.147307 env[1193]: time="2025-10-31T05:23:06.147203799Z" level=info msg="Start streaming server" Oct 31 05:23:06.981857 tar[1191]: linux-amd64/README.md Oct 31 05:23:06.990016 systemd[1]: Finished prepare-helm.service. Oct 31 05:23:07.008691 locksmithd[1225]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 31 05:23:07.186102 systemd-networkd[1013]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8919:24:19ff:fee6:2466/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8919:24:19ff:fee6:2466/64 assigned by NDisc. Oct 31 05:23:07.186116 systemd-networkd[1013]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Oct 31 05:23:07.350728 systemd[1]: Started kubelet.service. Oct 31 05:23:07.935830 kubelet[1249]: E1031 05:23:07.935746 1249 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:23:07.937474 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:23:07.937712 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:23:07.938125 systemd[1]: kubelet.service: Consumed 1.072s CPU time. Oct 31 05:23:09.262300 sshd_keygen[1200]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 31 05:23:09.289176 systemd[1]: Finished sshd-keygen.service. Oct 31 05:23:09.294031 systemd[1]: Starting issuegen.service... Oct 31 05:23:09.296647 systemd[1]: Started sshd@0-10.230.36.102:22-139.178.68.195:40262.service. Oct 31 05:23:09.303469 systemd[1]: issuegen.service: Deactivated successfully. Oct 31 05:23:09.303712 systemd[1]: Finished issuegen.service. Oct 31 05:23:09.307285 systemd[1]: Starting systemd-user-sessions.service... Oct 31 05:23:09.319140 systemd[1]: Finished systemd-user-sessions.service. Oct 31 05:23:09.322377 systemd[1]: Started getty@tty1.service. Oct 31 05:23:09.325365 systemd[1]: Started serial-getty@ttyS0.service. Oct 31 05:23:09.326635 systemd[1]: Reached target getty.target. Oct 31 05:23:10.222004 sshd[1264]: Accepted publickey for core from 139.178.68.195 port 40262 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:23:10.225323 sshd[1264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:23:10.243355 systemd[1]: Created slice user-500.slice. Oct 31 05:23:10.247114 systemd[1]: Starting user-runtime-dir@500.service... Oct 31 05:23:10.255501 systemd-logind[1187]: New session 1 of user core. Oct 31 05:23:10.265336 systemd[1]: Finished user-runtime-dir@500.service. Oct 31 05:23:10.269707 systemd[1]: Starting user@500.service... Oct 31 05:23:10.275507 (systemd)[1272]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:23:10.396595 systemd[1272]: Queued start job for default target default.target. Oct 31 05:23:10.398014 systemd[1272]: Reached target paths.target. Oct 31 05:23:10.398231 systemd[1272]: Reached target sockets.target. Oct 31 05:23:10.398432 systemd[1272]: Reached target timers.target. Oct 31 05:23:10.398667 systemd[1272]: Reached target basic.target. Oct 31 05:23:10.398901 systemd[1272]: Reached target default.target. Oct 31 05:23:10.398984 systemd[1]: Started user@500.service. Oct 31 05:23:10.399424 systemd[1272]: Startup finished in 113ms. Oct 31 05:23:10.403435 systemd[1]: Started session-1.scope. Oct 31 05:23:11.042135 systemd[1]: Started sshd@1-10.230.36.102:22-139.178.68.195:40272.service. Oct 31 05:23:11.945358 sshd[1281]: Accepted publickey for core from 139.178.68.195 port 40272 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:23:11.947364 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:23:11.954418 systemd-logind[1187]: New session 2 of user core. Oct 31 05:23:11.955280 systemd[1]: Started session-2.scope. Oct 31 05:23:12.572925 sshd[1281]: pam_unix(sshd:session): session closed for user core Oct 31 05:23:12.576686 systemd-logind[1187]: Session 2 logged out. Waiting for processes to exit. Oct 31 05:23:12.577197 systemd[1]: sshd@1-10.230.36.102:22-139.178.68.195:40272.service: Deactivated successfully. Oct 31 05:23:12.578398 systemd[1]: session-2.scope: Deactivated successfully. Oct 31 05:23:12.579468 systemd-logind[1187]: Removed session 2. Oct 31 05:23:12.691884 coreos-metadata[1167]: Oct 31 05:23:12.691 WARN failed to locate config-drive, using the metadata service API instead Oct 31 05:23:12.729486 systemd[1]: Started sshd@2-10.230.36.102:22-139.178.68.195:40286.service. Oct 31 05:23:12.754752 coreos-metadata[1167]: Oct 31 05:23:12.754 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Oct 31 05:23:12.849895 coreos-metadata[1167]: Oct 31 05:23:12.849 INFO Fetch successful Oct 31 05:23:12.850545 coreos-metadata[1167]: Oct 31 05:23:12.850 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 31 05:23:12.898563 coreos-metadata[1167]: Oct 31 05:23:12.898 INFO Fetch successful Oct 31 05:23:12.900401 unknown[1167]: wrote ssh authorized keys file for user: core Oct 31 05:23:12.912319 update-ssh-keys[1291]: Updated "/home/core/.ssh/authorized_keys" Oct 31 05:23:12.913407 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 31 05:23:12.914721 systemd[1]: Reached target multi-user.target. Oct 31 05:23:12.917526 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 31 05:23:12.928694 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 31 05:23:12.929014 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 31 05:23:12.932454 systemd[1]: Startup finished in 1.148s (kernel) + 7.244s (initrd) + 13.788s (userspace) = 22.182s. Oct 31 05:23:13.668085 sshd[1289]: Accepted publickey for core from 139.178.68.195 port 40286 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:23:13.670258 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:23:13.678861 systemd[1]: Started session-3.scope. Oct 31 05:23:13.679852 systemd-logind[1187]: New session 3 of user core. Oct 31 05:23:14.309450 sshd[1289]: pam_unix(sshd:session): session closed for user core Oct 31 05:23:14.313518 systemd-logind[1187]: Session 3 logged out. Waiting for processes to exit. Oct 31 05:23:14.314183 systemd[1]: sshd@2-10.230.36.102:22-139.178.68.195:40286.service: Deactivated successfully. Oct 31 05:23:14.315206 systemd[1]: session-3.scope: Deactivated successfully. Oct 31 05:23:14.316304 systemd-logind[1187]: Removed session 3. Oct 31 05:23:18.164708 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 31 05:23:18.165044 systemd[1]: Stopped kubelet.service. Oct 31 05:23:18.165116 systemd[1]: kubelet.service: Consumed 1.072s CPU time. Oct 31 05:23:18.167442 systemd[1]: Starting kubelet.service... Oct 31 05:23:18.347212 systemd[1]: Started kubelet.service. Oct 31 05:23:18.499271 kubelet[1300]: E1031 05:23:18.499108 1300 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:23:18.503320 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:23:18.503582 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:23:24.461683 systemd[1]: Started sshd@3-10.230.36.102:22-139.178.68.195:58234.service. Oct 31 05:23:25.387736 sshd[1307]: Accepted publickey for core from 139.178.68.195 port 58234 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:23:25.391450 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:23:25.400572 systemd-logind[1187]: New session 4 of user core. Oct 31 05:23:25.401693 systemd[1]: Started session-4.scope. Oct 31 05:23:26.018780 sshd[1307]: pam_unix(sshd:session): session closed for user core Oct 31 05:23:26.023304 systemd-logind[1187]: Session 4 logged out. Waiting for processes to exit. Oct 31 05:23:26.023940 systemd[1]: sshd@3-10.230.36.102:22-139.178.68.195:58234.service: Deactivated successfully. Oct 31 05:23:26.025156 systemd[1]: session-4.scope: Deactivated successfully. Oct 31 05:23:26.026399 systemd-logind[1187]: Removed session 4. Oct 31 05:23:26.168492 systemd[1]: Started sshd@4-10.230.36.102:22-139.178.68.195:58244.service. Oct 31 05:23:27.085661 sshd[1313]: Accepted publickey for core from 139.178.68.195 port 58244 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:23:27.088470 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:23:27.095418 systemd-logind[1187]: New session 5 of user core. Oct 31 05:23:27.096594 systemd[1]: Started session-5.scope. Oct 31 05:23:27.726268 sshd[1313]: pam_unix(sshd:session): session closed for user core Oct 31 05:23:27.730106 systemd[1]: sshd@4-10.230.36.102:22-139.178.68.195:58244.service: Deactivated successfully. Oct 31 05:23:27.731101 systemd[1]: session-5.scope: Deactivated successfully. Oct 31 05:23:27.731985 systemd-logind[1187]: Session 5 logged out. Waiting for processes to exit. Oct 31 05:23:27.733683 systemd-logind[1187]: Removed session 5. Oct 31 05:23:27.876278 systemd[1]: Started sshd@5-10.230.36.102:22-139.178.68.195:58256.service. Oct 31 05:23:28.627948 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 31 05:23:28.628665 systemd[1]: Stopped kubelet.service. Oct 31 05:23:28.632246 systemd[1]: Starting kubelet.service... Oct 31 05:23:28.786054 sshd[1319]: Accepted publickey for core from 139.178.68.195 port 58256 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:23:28.789762 sshd[1319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:23:28.800034 systemd-logind[1187]: New session 6 of user core. Oct 31 05:23:28.801037 systemd[1]: Started session-6.scope. Oct 31 05:23:28.823154 systemd[1]: Started kubelet.service. Oct 31 05:23:28.907087 kubelet[1326]: E1031 05:23:28.906380 1326 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:23:28.909999 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:23:28.910235 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:23:29.418007 sshd[1319]: pam_unix(sshd:session): session closed for user core Oct 31 05:23:29.422847 systemd-logind[1187]: Session 6 logged out. Waiting for processes to exit. Oct 31 05:23:29.423725 systemd[1]: sshd@5-10.230.36.102:22-139.178.68.195:58256.service: Deactivated successfully. Oct 31 05:23:29.424894 systemd[1]: session-6.scope: Deactivated successfully. Oct 31 05:23:29.425978 systemd-logind[1187]: Removed session 6. Oct 31 05:23:29.567618 systemd[1]: Started sshd@6-10.230.36.102:22-139.178.68.195:58262.service. Oct 31 05:23:30.469441 sshd[1335]: Accepted publickey for core from 139.178.68.195 port 58262 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:23:30.471856 sshd[1335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:23:30.479335 systemd-logind[1187]: New session 7 of user core. Oct 31 05:23:30.480384 systemd[1]: Started session-7.scope. Oct 31 05:23:30.962282 sudo[1338]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 31 05:23:30.963546 sudo[1338]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 05:23:30.976584 dbus-daemon[1168]: \xd0m\\x85\x9fU: received setenforce notice (enforcing=-2009576400) Oct 31 05:23:30.976856 sudo[1338]: pam_unix(sudo:session): session closed for user root Oct 31 05:23:31.123037 sshd[1335]: pam_unix(sshd:session): session closed for user core Oct 31 05:23:31.128498 systemd-logind[1187]: Session 7 logged out. Waiting for processes to exit. Oct 31 05:23:31.130153 systemd[1]: sshd@6-10.230.36.102:22-139.178.68.195:58262.service: Deactivated successfully. Oct 31 05:23:31.131481 systemd[1]: session-7.scope: Deactivated successfully. Oct 31 05:23:31.132228 systemd-logind[1187]: Removed session 7. Oct 31 05:23:31.274108 systemd[1]: Started sshd@7-10.230.36.102:22-139.178.68.195:58266.service. Oct 31 05:23:32.180897 sshd[1342]: Accepted publickey for core from 139.178.68.195 port 58266 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:23:32.183957 sshd[1342]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:23:32.190888 systemd-logind[1187]: New session 8 of user core. Oct 31 05:23:32.192016 systemd[1]: Started session-8.scope. Oct 31 05:23:32.666211 sudo[1346]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 31 05:23:32.667253 sudo[1346]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 05:23:32.673043 sudo[1346]: pam_unix(sudo:session): session closed for user root Oct 31 05:23:32.680986 sudo[1345]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 31 05:23:32.681441 sudo[1345]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 05:23:32.701103 kernel: kauditd_printk_skb: 176 callbacks suppressed Oct 31 05:23:32.701274 kernel: audit: type=1305 audit(1761888212.696:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 05:23:32.696000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 31 05:23:32.699626 systemd[1]: Stopping audit-rules.service... Oct 31 05:23:32.704358 auditctl[1349]: No rules Oct 31 05:23:32.696000 audit[1349]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcba0ae3d0 a2=420 a3=0 items=0 ppid=1 pid=1349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:32.711387 kernel: audit: type=1300 audit(1761888212.696:205): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcba0ae3d0 a2=420 a3=0 items=0 ppid=1 pid=1349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:32.705525 systemd[1]: audit-rules.service: Deactivated successfully. Oct 31 05:23:32.705800 systemd[1]: Stopped audit-rules.service. Oct 31 05:23:32.696000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 31 05:23:32.712951 systemd[1]: Starting audit-rules.service... Oct 31 05:23:32.714053 kernel: audit: type=1327 audit(1761888212.696:205): proctitle=2F7362696E2F617564697463746C002D44 Oct 31 05:23:32.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:32.720364 kernel: audit: type=1131 audit(1761888212.703:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:32.742941 augenrules[1366]: No rules Oct 31 05:23:32.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:32.746273 sudo[1345]: pam_unix(sudo:session): session closed for user root Oct 31 05:23:32.751411 kernel: audit: type=1130 audit(1761888212.743:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:32.751493 kernel: audit: type=1106 audit(1761888212.744:208): pid=1345 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:23:32.744000 audit[1345]: USER_END pid=1345 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:23:32.744545 systemd[1]: Finished audit-rules.service. Oct 31 05:23:32.744000 audit[1345]: CRED_DISP pid=1345 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:23:32.763460 kernel: audit: type=1104 audit(1761888212.744:209): pid=1345 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:23:32.895613 sshd[1342]: pam_unix(sshd:session): session closed for user core Oct 31 05:23:32.895000 audit[1342]: USER_END pid=1342 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:23:32.899937 systemd-logind[1187]: Session 8 logged out. Waiting for processes to exit. Oct 31 05:23:32.901160 systemd[1]: sshd@7-10.230.36.102:22-139.178.68.195:58266.service: Deactivated successfully. Oct 31 05:23:32.902304 systemd[1]: session-8.scope: Deactivated successfully. Oct 31 05:23:32.903803 systemd-logind[1187]: Removed session 8. Oct 31 05:23:32.905508 kernel: audit: type=1106 audit(1761888212.895:210): pid=1342 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:23:32.905578 kernel: audit: type=1104 audit(1761888212.896:211): pid=1342 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:23:32.896000 audit[1342]: CRED_DISP pid=1342 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:23:32.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.36.102:22-139.178.68.195:58266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:32.917708 kernel: audit: type=1131 audit(1761888212.896:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.36.102:22-139.178.68.195:58266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:33.045861 systemd[1]: Started sshd@8-10.230.36.102:22-139.178.68.195:58278.service. Oct 31 05:23:33.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.36.102:22-139.178.68.195:58278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:33.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.36.102:22-193.46.255.217:61482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:33.785969 systemd[1]: Started sshd@9-10.230.36.102:22-193.46.255.217:61482.service. Oct 31 05:23:33.951000 audit[1372]: USER_ACCT pid=1372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:23:33.953782 sshd[1372]: Accepted publickey for core from 139.178.68.195 port 58278 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:23:33.953000 audit[1372]: CRED_ACQ pid=1372 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:23:33.954000 audit[1372]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfc866500 a2=3 a3=0 items=0 ppid=1 pid=1372 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:33.954000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:23:33.956488 sshd[1372]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:23:33.964267 systemd-logind[1187]: New session 9 of user core. Oct 31 05:23:33.965520 systemd[1]: Started session-9.scope. Oct 31 05:23:33.972000 audit[1372]: USER_START pid=1372 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:23:33.974000 audit[1377]: CRED_ACQ pid=1377 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:23:34.144527 sshd[1375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.217 user=root Oct 31 05:23:34.144000 audit[1375]: USER_AUTH pid=1375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:34.435000 audit[1378]: USER_ACCT pid=1378 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:23:34.436842 sudo[1378]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 31 05:23:34.436000 audit[1378]: CRED_REFR pid=1378 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:23:34.437900 sudo[1378]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 31 05:23:34.439000 audit[1378]: USER_START pid=1378 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:23:34.489526 systemd[1]: Starting docker.service... Oct 31 05:23:34.554715 env[1388]: time="2025-10-31T05:23:34.554593801Z" level=info msg="Starting up" Oct 31 05:23:34.557933 env[1388]: time="2025-10-31T05:23:34.557890899Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 31 05:23:34.558057 env[1388]: time="2025-10-31T05:23:34.558021281Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 31 05:23:34.558290 env[1388]: time="2025-10-31T05:23:34.558254342Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 31 05:23:34.559224 env[1388]: time="2025-10-31T05:23:34.559192828Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 31 05:23:34.564067 env[1388]: time="2025-10-31T05:23:34.564014696Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 31 05:23:34.564067 env[1388]: time="2025-10-31T05:23:34.564052522Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 31 05:23:34.564240 env[1388]: time="2025-10-31T05:23:34.564082136Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 31 05:23:34.564240 env[1388]: time="2025-10-31T05:23:34.564119732Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 31 05:23:34.597751 env[1388]: time="2025-10-31T05:23:34.597647325Z" level=info msg="Loading containers: start." Oct 31 05:23:34.700000 audit[1421]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.700000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdb5cc38a0 a2=0 a3=7ffdb5cc388c items=0 ppid=1388 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 31 05:23:34.704000 audit[1423]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.704000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff734e7a20 a2=0 a3=7fff734e7a0c items=0 ppid=1388 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.704000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 31 05:23:34.707000 audit[1425]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.707000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd98889850 a2=0 a3=7ffd9888983c items=0 ppid=1388 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.707000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 31 05:23:34.711000 audit[1427]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.711000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc72bb5030 a2=0 a3=7ffc72bb501c items=0 ppid=1388 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.711000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 31 05:23:34.715000 audit[1429]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.715000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffbfcba0a0 a2=0 a3=7fffbfcba08c items=0 ppid=1388 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.715000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 31 05:23:34.737000 audit[1434]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.737000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffde292e440 a2=0 a3=7ffde292e42c items=0 ppid=1388 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.737000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 31 05:23:34.752000 audit[1436]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.752000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff36a22200 a2=0 a3=7fff36a221ec items=0 ppid=1388 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.752000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 31 05:23:34.755000 audit[1438]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.755000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffe55c88a0 a2=0 a3=7fffe55c888c items=0 ppid=1388 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 31 05:23:34.759000 audit[1440]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.759000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc4e49ed80 a2=0 a3=7ffc4e49ed6c items=0 ppid=1388 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:23:34.771000 audit[1444]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.771000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff7b45e870 a2=0 a3=7fff7b45e85c items=0 ppid=1388 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.771000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:23:34.776000 audit[1445]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.776000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe110c1e10 a2=0 a3=7ffe110c1dfc items=0 ppid=1388 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.776000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:23:34.794387 kernel: Initializing XFRM netlink socket Oct 31 05:23:34.843944 env[1388]: time="2025-10-31T05:23:34.843854520Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 31 05:23:34.889000 audit[1453]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.889000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff8f7882a0 a2=0 a3=7fff8f78828c items=0 ppid=1388 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.889000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 31 05:23:34.904000 audit[1456]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.904000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc955ce340 a2=0 a3=7ffc955ce32c items=0 ppid=1388 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.904000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 31 05:23:34.908000 audit[1459]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.908000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdfc4a4fa0 a2=0 a3=7ffdfc4a4f8c items=0 ppid=1388 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.908000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 31 05:23:34.912000 audit[1461]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.912000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff2ab336d0 a2=0 a3=7fff2ab336bc items=0 ppid=1388 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.912000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 31 05:23:34.915000 audit[1463]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.915000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffbe158010 a2=0 a3=7fffbe157ffc items=0 ppid=1388 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.915000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 31 05:23:34.919000 audit[1465]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.919000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe3fb65890 a2=0 a3=7ffe3fb6587c items=0 ppid=1388 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.919000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 31 05:23:34.922000 audit[1467]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.922000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc713f4f30 a2=0 a3=7ffc713f4f1c items=0 ppid=1388 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.922000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 31 05:23:34.934000 audit[1470]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.934000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdc8ca4f30 a2=0 a3=7ffdc8ca4f1c items=0 ppid=1388 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.934000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 31 05:23:34.937000 audit[1472]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.937000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffebed2ea0 a2=0 a3=7fffebed2e8c items=0 ppid=1388 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.937000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 31 05:23:34.941000 audit[1474]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.941000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe9927c050 a2=0 a3=7ffe9927c03c items=0 ppid=1388 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 31 05:23:34.944000 audit[1476]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1476 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.944000 audit[1476]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff6f031f90 a2=0 a3=7fff6f031f7c items=0 ppid=1388 pid=1476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 31 05:23:34.947184 systemd-networkd[1013]: docker0: Link UP Oct 31 05:23:34.958000 audit[1480]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1480 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.958000 audit[1480]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd4c03d1e0 a2=0 a3=7ffd4c03d1cc items=0 ppid=1388 pid=1480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.958000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:23:34.964000 audit[1481]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:23:34.964000 audit[1481]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd91a4eea0 a2=0 a3=7ffd91a4ee8c items=0 ppid=1388 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:23:34.964000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 31 05:23:34.966646 env[1388]: time="2025-10-31T05:23:34.966572765Z" level=info msg="Loading containers: done." Oct 31 05:23:34.987467 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2435401564-merged.mount: Deactivated successfully. Oct 31 05:23:34.998625 env[1388]: time="2025-10-31T05:23:34.998559877Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 31 05:23:34.999208 env[1388]: time="2025-10-31T05:23:34.999175850Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 31 05:23:34.999565 env[1388]: time="2025-10-31T05:23:34.999535864Z" level=info msg="Daemon has completed initialization" Oct 31 05:23:35.017774 systemd[1]: Started docker.service. Oct 31 05:23:35.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:35.025257 env[1388]: time="2025-10-31T05:23:35.025196777Z" level=info msg="API listen on /run/docker.sock" Oct 31 05:23:36.033584 sshd[1375]: Failed password for root from 193.46.255.217 port 61482 ssh2 Oct 31 05:23:36.103941 env[1193]: time="2025-10-31T05:23:36.103786077Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.34.1\"" Oct 31 05:23:36.486000 audit[1375]: USER_AUTH pid=1375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:37.202402 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2646478407.mount: Deactivated successfully. Oct 31 05:23:37.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:37.229217 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 31 05:23:37.249000 audit: BPF prog-id=40 op=UNLOAD Oct 31 05:23:37.249000 audit: BPF prog-id=39 op=UNLOAD Oct 31 05:23:37.249000 audit: BPF prog-id=38 op=UNLOAD Oct 31 05:23:38.650725 sshd[1375]: Failed password for root from 193.46.255.217 port 61482 ssh2 Oct 31 05:23:38.839036 kernel: kauditd_printk_skb: 91 callbacks suppressed Oct 31 05:23:38.839402 kernel: audit: type=1100 audit(1761888218.829:254): pid=1375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:38.829000 audit[1375]: USER_AUTH pid=1375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:38.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:38.927449 kernel: audit: type=1130 audit(1761888218.914:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:38.915314 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Oct 31 05:23:38.915726 systemd[1]: Stopped kubelet.service. Oct 31 05:23:38.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:38.919267 systemd[1]: Starting kubelet.service... Oct 31 05:23:38.935441 kernel: audit: type=1131 audit(1761888218.914:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:39.131703 kernel: audit: type=1130 audit(1761888219.124:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:39.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:39.124877 systemd[1]: Started kubelet.service. Oct 31 05:23:39.276171 kubelet[1524]: E1031 05:23:39.276015 1524 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:23:39.285922 kernel: audit: type=1131 audit(1761888219.278:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:23:39.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:23:39.278885 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:23:39.279134 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:23:39.647675 env[1193]: time="2025-10-31T05:23:39.647365189Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:39.650677 env[1193]: time="2025-10-31T05:23:39.650601122Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c3994bc6961024917ec0aeee02e62828108c21a52d87648e30f3080d9cbadc97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:39.655277 env[1193]: time="2025-10-31T05:23:39.655216221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:39.658482 env[1193]: time="2025-10-31T05:23:39.658413519Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:b9d7c117f8ac52bed4b13aeed973dc5198f9d93a926e6fe9e0b384f155baa902,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:39.658796 env[1193]: time="2025-10-31T05:23:39.658720617Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.34.1\" returns image reference \"sha256:c3994bc6961024917ec0aeee02e62828108c21a52d87648e30f3080d9cbadc97\"" Oct 31 05:23:39.661547 env[1193]: time="2025-10-31T05:23:39.661496967Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.34.1\"" Oct 31 05:23:40.266907 sshd[1375]: Failed password for root from 193.46.255.217 port 61482 ssh2 Oct 31 05:23:41.172439 sshd[1375]: Received disconnect from 193.46.255.217 port 61482:11: [preauth] Oct 31 05:23:41.172439 sshd[1375]: Disconnected from authenticating user root 193.46.255.217 port 61482 [preauth] Oct 31 05:23:41.172950 sshd[1375]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.217 user=root Oct 31 05:23:41.175102 systemd[1]: sshd@9-10.230.36.102:22-193.46.255.217:61482.service: Deactivated successfully. Oct 31 05:23:41.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.36.102:22-193.46.255.217:61482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:41.182363 kernel: audit: type=1131 audit(1761888221.174:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.36.102:22-193.46.255.217:61482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:41.216900 systemd[1]: Started sshd@10-10.230.36.102:22-193.46.255.217:61496.service. Oct 31 05:23:41.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.36.102:22-193.46.255.217:61496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:41.223671 kernel: audit: type=1130 audit(1761888221.215:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.36.102:22-193.46.255.217:61496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:41.562000 audit[1532]: USER_AUTH pid=1532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:41.563526 sshd[1532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.217 user=root Oct 31 05:23:41.570359 kernel: audit: type=1100 audit(1761888221.562:261): pid=1532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:42.149940 env[1193]: time="2025-10-31T05:23:42.149841007Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:42.152589 env[1193]: time="2025-10-31T05:23:42.152541760Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c80c8dbafe7dd71fc21527912a6dd20ccd1b71f3e561a5c28337388d0619538f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:42.155153 env[1193]: time="2025-10-31T05:23:42.155107319Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:42.157729 env[1193]: time="2025-10-31T05:23:42.157682171Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:2bf47c1b01f51e8963bf2327390883c9fa4ed03ea1b284500a2cba17ce303e89,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:42.158998 env[1193]: time="2025-10-31T05:23:42.158958380Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.34.1\" returns image reference \"sha256:c80c8dbafe7dd71fc21527912a6dd20ccd1b71f3e561a5c28337388d0619538f\"" Oct 31 05:23:42.160430 env[1193]: time="2025-10-31T05:23:42.160381422Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.34.1\"" Oct 31 05:23:43.410651 sshd[1532]: Failed password for root from 193.46.255.217 port 61496 ssh2 Oct 31 05:23:43.902000 audit[1532]: ANOM_LOGIN_FAILURES pid=1532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:43.906882 sshd[1532]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Oct 31 05:23:43.903000 audit[1532]: USER_AUTH pid=1532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:43.918132 kernel: audit: type=2100 audit(1761888223.902:262): pid=1532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:43.918315 kernel: audit: type=1100 audit(1761888223.903:263): pid=1532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:44.351535 env[1193]: time="2025-10-31T05:23:44.351415487Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:44.354187 env[1193]: time="2025-10-31T05:23:44.354137382Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6aaa1717ab7eaae4578503e4c4d9965fcf5a249e8155fe16379ee9b6cb813,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:44.357369 env[1193]: time="2025-10-31T05:23:44.357301994Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:44.360286 env[1193]: time="2025-10-31T05:23:44.360202086Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6e9fbc4e25a576483e6a233976353a66e4d77eb5d0530e9118e94b7d46fb3500,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:44.362520 env[1193]: time="2025-10-31T05:23:44.362415093Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.34.1\" returns image reference \"sha256:7dd6aaa1717ab7eaae4578503e4c4d9965fcf5a249e8155fe16379ee9b6cb813\"" Oct 31 05:23:44.365861 env[1193]: time="2025-10-31T05:23:44.365753583Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.34.1\"" Oct 31 05:23:46.029852 sshd[1532]: Failed password for root from 193.46.255.217 port 61496 ssh2 Oct 31 05:23:46.244000 audit[1532]: USER_AUTH pid=1532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:46.252369 kernel: audit: type=1100 audit(1761888226.244:264): pid=1532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:46.411778 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2231029186.mount: Deactivated successfully. Oct 31 05:23:47.212526 env[1193]: time="2025-10-31T05:23:47.212263131Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:47.216590 env[1193]: time="2025-10-31T05:23:47.216542839Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fc25172553d79197ecd840ec8dba1fba68330079355e974b04c1a441e6a4a0b7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:47.218791 env[1193]: time="2025-10-31T05:23:47.218754317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.34.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:47.221561 env[1193]: time="2025-10-31T05:23:47.221524878Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:913cc83ca0b5588a81d86ce8eedeb3ed1e9c1326e81852a1ea4f622b74ff749a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:47.222745 env[1193]: time="2025-10-31T05:23:47.222693476Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.34.1\" returns image reference \"sha256:fc25172553d79197ecd840ec8dba1fba68330079355e974b04c1a441e6a4a0b7\"" Oct 31 05:23:47.224367 env[1193]: time="2025-10-31T05:23:47.224309976Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.1\"" Oct 31 05:23:47.998205 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount663563824.mount: Deactivated successfully. Oct 31 05:23:48.449642 sshd[1532]: Failed password for root from 193.46.255.217 port 61496 ssh2 Oct 31 05:23:48.587380 sshd[1532]: Received disconnect from 193.46.255.217 port 61496:11: [preauth] Oct 31 05:23:48.587380 sshd[1532]: Disconnected from authenticating user root 193.46.255.217 port 61496 [preauth] Oct 31 05:23:48.587061 sshd[1532]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.217 user=root Oct 31 05:23:48.590526 systemd[1]: sshd@10-10.230.36.102:22-193.46.255.217:61496.service: Deactivated successfully. Oct 31 05:23:48.598536 kernel: audit: type=1131 audit(1761888228.589:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.36.102:22-193.46.255.217:61496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:48.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.36.102:22-193.46.255.217:61496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:48.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.36.102:22-193.46.255.217:31428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:48.638815 systemd[1]: Started sshd@11-10.230.36.102:22-193.46.255.217:31428.service. Oct 31 05:23:48.645552 kernel: audit: type=1130 audit(1761888228.637:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.36.102:22-193.46.255.217:31428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:49.004638 sshd[1536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.217 user=root Oct 31 05:23:49.004000 audit[1536]: USER_AUTH pid=1536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:49.012364 kernel: audit: type=1100 audit(1761888229.004:267): pid=1536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:49.415276 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Oct 31 05:23:49.415890 systemd[1]: Stopped kubelet.service. Oct 31 05:23:49.429872 kernel: audit: type=1130 audit(1761888229.414:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:49.429999 kernel: audit: type=1131 audit(1761888229.414:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:49.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:49.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:49.423102 systemd[1]: Starting kubelet.service... Oct 31 05:23:49.646270 systemd[1]: Started kubelet.service. Oct 31 05:23:49.653669 kernel: audit: type=1130 audit(1761888229.645:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:49.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:49.800745 kubelet[1542]: E1031 05:23:49.799900 1542 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:23:49.803500 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:23:49.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:23:49.803753 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:23:49.812416 kernel: audit: type=1131 audit(1761888229.802:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:23:49.930903 env[1193]: time="2025-10-31T05:23:49.930753275Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:49.934298 env[1193]: time="2025-10-31T05:23:49.934246409Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:52546a367cc9e0d924aa3b190596a9167fa6e53245023b5b5baf0f07e5443969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:49.940460 env[1193]: time="2025-10-31T05:23:49.940392955Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:49.942999 env[1193]: time="2025-10-31T05:23:49.942951226Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:e8c262566636e6bc340ece6473b0eed193cad045384401529721ddbe6463d31c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:49.944568 env[1193]: time="2025-10-31T05:23:49.944398046Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.1\" returns image reference \"sha256:52546a367cc9e0d924aa3b190596a9167fa6e53245023b5b5baf0f07e5443969\"" Oct 31 05:23:49.946334 env[1193]: time="2025-10-31T05:23:49.946292518Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10.1\"" Oct 31 05:23:50.633638 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1373760122.mount: Deactivated successfully. Oct 31 05:23:50.640315 env[1193]: time="2025-10-31T05:23:50.640230212Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:50.641942 env[1193]: time="2025-10-31T05:23:50.641897361Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cd073f4c5f6a8e9dc6f3125ba00cf60819cae95c1ec84a1f146ee4a9cf9e803f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:50.643921 env[1193]: time="2025-10-31T05:23:50.643882124Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:50.645748 env[1193]: time="2025-10-31T05:23:50.645710397Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:278fb9dbcca9518083ad1e11276933a2e96f23de604a3a08cc3c80002767d24c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:50.646733 env[1193]: time="2025-10-31T05:23:50.646680321Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10.1\" returns image reference \"sha256:cd073f4c5f6a8e9dc6f3125ba00cf60819cae95c1ec84a1f146ee4a9cf9e803f\"" Oct 31 05:23:50.647662 env[1193]: time="2025-10-31T05:23:50.647625507Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.6.4-0\"" Oct 31 05:23:50.763054 update_engine[1188]: I1031 05:23:50.762835 1188 update_attempter.cc:509] Updating boot flags... Oct 31 05:23:50.954920 sshd[1536]: Failed password for root from 193.46.255.217 port 31428 ssh2 Oct 31 05:23:51.346000 audit[1536]: USER_AUTH pid=1536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:51.354367 kernel: audit: type=1100 audit(1761888231.346:272): pid=1536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:53.235226 sshd[1536]: Failed password for root from 193.46.255.217 port 31428 ssh2 Oct 31 05:23:53.690000 audit[1536]: USER_AUTH pid=1536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:53.698369 kernel: audit: type=1100 audit(1761888233.690:273): pid=1536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=193.46.255.217 addr=193.46.255.217 terminal=ssh res=failed' Oct 31 05:23:55.519178 sshd[1536]: Failed password for root from 193.46.255.217 port 31428 ssh2 Oct 31 05:23:56.038169 sshd[1536]: Received disconnect from 193.46.255.217 port 31428:11: [preauth] Oct 31 05:23:56.038169 sshd[1536]: Disconnected from authenticating user root 193.46.255.217 port 31428 [preauth] Oct 31 05:23:56.036625 sshd[1536]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.217 user=root Oct 31 05:23:56.047969 kernel: audit: type=1131 audit(1761888236.040:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.36.102:22-193.46.255.217:31428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:56.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.36.102:22-193.46.255.217:31428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:56.040440 systemd[1]: sshd@11-10.230.36.102:22-193.46.255.217:31428.service: Deactivated successfully. Oct 31 05:23:56.819277 env[1193]: time="2025-10-31T05:23:56.819115853Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.6.4-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:56.824468 env[1193]: time="2025-10-31T05:23:56.824410333Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5f1f5298c888daa46c4409ff4cefe5ca9d16e479419f94cdb5f5d5563dac0115,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:56.827175 env[1193]: time="2025-10-31T05:23:56.827134760Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.6.4-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:56.830595 env[1193]: time="2025-10-31T05:23:56.830546398Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e36c081683425b5b3bc1425bc508b37e7107bb65dfa9367bf5a80125d431fa19,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:23:56.834011 env[1193]: time="2025-10-31T05:23:56.833924809Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.6.4-0\" returns image reference \"sha256:5f1f5298c888daa46c4409ff4cefe5ca9d16e479419f94cdb5f5d5563dac0115\"" Oct 31 05:23:59.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:59.915578 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Oct 31 05:23:59.916228 systemd[1]: Stopped kubelet.service. Oct 31 05:23:59.923380 kernel: audit: type=1130 audit(1761888239.916:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:59.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:59.931633 kernel: audit: type=1131 audit(1761888239.916:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:23:59.930428 systemd[1]: Starting kubelet.service... Oct 31 05:24:00.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:00.305178 systemd[1]: Started kubelet.service. Oct 31 05:24:00.311921 kernel: audit: type=1130 audit(1761888240.305:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:00.458704 kubelet[1585]: E1031 05:24:00.458580 1585 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 31 05:24:00.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:24:00.460705 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 31 05:24:00.461041 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 31 05:24:00.467378 kernel: audit: type=1131 audit(1761888240.461:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 31 05:24:04.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.36.102:22-91.215.85.45:44022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:04.224716 systemd[1]: Started sshd@12-10.230.36.102:22-91.215.85.45:44022.service. Oct 31 05:24:04.234374 kernel: audit: type=1130 audit(1761888244.224:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.36.102:22-91.215.85.45:44022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:04.627413 systemd[1]: Stopped kubelet.service. Oct 31 05:24:04.635383 kernel: audit: type=1130 audit(1761888244.628:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:04.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:04.634229 systemd[1]: Starting kubelet.service... Oct 31 05:24:04.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:04.642458 kernel: audit: type=1131 audit(1761888244.628:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:04.686420 systemd[1]: Reloading. Oct 31 05:24:04.850920 /usr/lib/systemd/system-generators/torcx-generator[1623]: time="2025-10-31T05:24:04Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 05:24:04.851005 /usr/lib/systemd/system-generators/torcx-generator[1623]: time="2025-10-31T05:24:04Z" level=info msg="torcx already run" Oct 31 05:24:04.966995 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 05:24:04.967473 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 05:24:04.998321 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 05:24:05.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.113894 kernel: audit: type=1400 audit(1761888245.103:282): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.114010 kernel: audit: type=1400 audit(1761888245.103:283): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.120451 kernel: audit: type=1400 audit(1761888245.113:284): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130633 kernel: audit: type=1400 audit(1761888245.113:285): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130759 kernel: audit: type=1400 audit(1761888245.113:286): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.135882 kernel: audit: type=1400 audit(1761888245.113:287): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.141030 kernel: audit: type=1400 audit(1761888245.113:288): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.113000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.114000 audit: BPF prog-id=43 op=LOAD Oct 31 05:24:05.114000 audit: BPF prog-id=33 op=UNLOAD Oct 31 05:24:05.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.119000 audit: BPF prog-id=44 op=LOAD Oct 31 05:24:05.120000 audit: BPF prog-id=24 op=UNLOAD Oct 31 05:24:05.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.125000 audit: BPF prog-id=45 op=LOAD Oct 31 05:24:05.125000 audit: BPF prog-id=25 op=UNLOAD Oct 31 05:24:05.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130000 audit: BPF prog-id=46 op=LOAD Oct 31 05:24:05.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.130000 audit: BPF prog-id=47 op=LOAD Oct 31 05:24:05.130000 audit: BPF prog-id=26 op=UNLOAD Oct 31 05:24:05.130000 audit: BPF prog-id=27 op=UNLOAD Oct 31 05:24:05.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.135000 audit: BPF prog-id=48 op=LOAD Oct 31 05:24:05.135000 audit: BPF prog-id=35 op=UNLOAD Oct 31 05:24:05.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.142000 audit: BPF prog-id=51 op=LOAD Oct 31 05:24:05.142000 audit: BPF prog-id=41 op=UNLOAD Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit: BPF prog-id=52 op=LOAD Oct 31 05:24:05.143000 audit: BPF prog-id=28 op=UNLOAD Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.144000 audit: BPF prog-id=53 op=LOAD Oct 31 05:24:05.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit: BPF prog-id=55 op=LOAD Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.148000 audit: BPF prog-id=56 op=LOAD Oct 31 05:24:05.148000 audit: BPF prog-id=31 op=UNLOAD Oct 31 05:24:05.148000 audit: BPF prog-id=32 op=UNLOAD Oct 31 05:24:05.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:05.150000 audit: BPF prog-id=57 op=LOAD Oct 31 05:24:05.150000 audit: BPF prog-id=34 op=UNLOAD Oct 31 05:24:05.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:05.184436 systemd[1]: Started kubelet.service. Oct 31 05:24:05.191526 systemd[1]: Stopping kubelet.service... Oct 31 05:24:05.192832 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 05:24:05.193150 systemd[1]: Stopped kubelet.service. Oct 31 05:24:05.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:05.196157 systemd[1]: Starting kubelet.service... Oct 31 05:24:05.487652 systemd[1]: Started kubelet.service. Oct 31 05:24:05.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:05.576531 kubelet[1674]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 05:24:05.577237 kubelet[1674]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 05:24:05.577526 kubelet[1674]: I1031 05:24:05.577473 1674 server.go:213] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 05:24:06.060851 kubelet[1674]: I1031 05:24:06.060802 1674 server.go:529] "Kubelet version" kubeletVersion="v1.34.1" Oct 31 05:24:06.061215 kubelet[1674]: I1031 05:24:06.061190 1674 server.go:531] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 05:24:06.064178 kubelet[1674]: I1031 05:24:06.064149 1674 watchdog_linux.go:95] "Systemd watchdog is not enabled" Oct 31 05:24:06.064360 kubelet[1674]: I1031 05:24:06.064320 1674 watchdog_linux.go:137] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 05:24:06.064778 kubelet[1674]: I1031 05:24:06.064751 1674 server.go:956] "Client rotation is on, will bootstrap in background" Oct 31 05:24:06.073049 kubelet[1674]: I1031 05:24:06.073021 1674 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 05:24:06.073446 kubelet[1674]: E1031 05:24:06.073398 1674 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.230.36.102:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.230.36.102:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Oct 31 05:24:06.080258 kubelet[1674]: E1031 05:24:06.080191 1674 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 05:24:06.080376 kubelet[1674]: I1031 05:24:06.080289 1674 server.go:1400] "CRI implementation should be updated to support RuntimeConfig. Falling back to using cgroupDriver from kubelet config." Oct 31 05:24:06.089167 kubelet[1674]: I1031 05:24:06.089126 1674 server.go:781] "--cgroups-per-qos enabled, but --cgroup-root was not specified. Defaulting to /" Oct 31 05:24:06.089637 kubelet[1674]: I1031 05:24:06.089593 1674 container_manager_linux.go:270] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 05:24:06.089903 kubelet[1674]: I1031 05:24:06.089634 1674 container_manager_linux.go:275] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-clgmo.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 05:24:06.090180 kubelet[1674]: I1031 05:24:06.089927 1674 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 05:24:06.090180 kubelet[1674]: I1031 05:24:06.089945 1674 container_manager_linux.go:306] "Creating device plugin manager" Oct 31 05:24:06.090180 kubelet[1674]: I1031 05:24:06.090083 1674 container_manager_linux.go:315] "Creating Dynamic Resource Allocation (DRA) manager" Oct 31 05:24:06.092421 kubelet[1674]: I1031 05:24:06.092393 1674 state_mem.go:36] "Initialized new in-memory state store" Oct 31 05:24:06.094460 kubelet[1674]: I1031 05:24:06.094424 1674 kubelet.go:475] "Attempting to sync node with API server" Oct 31 05:24:06.095123 kubelet[1674]: I1031 05:24:06.095097 1674 kubelet.go:376] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 05:24:06.095405 kubelet[1674]: I1031 05:24:06.095380 1674 kubelet.go:387] "Adding apiserver pod source" Oct 31 05:24:06.096469 kubelet[1674]: I1031 05:24:06.096435 1674 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 05:24:06.099067 kubelet[1674]: E1031 05:24:06.095733 1674 reflector.go:205] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.230.36.102:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-clgmo.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.230.36.102:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Oct 31 05:24:06.100363 kubelet[1674]: I1031 05:24:06.100304 1674 kuberuntime_manager.go:291] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 05:24:06.101671 kubelet[1674]: I1031 05:24:06.101624 1674 kubelet.go:940] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Oct 31 05:24:06.101768 kubelet[1674]: I1031 05:24:06.101679 1674 kubelet.go:964] "Not starting PodCertificateRequest manager because we are in static kubelet mode or the PodCertificateProjection feature gate is disabled" Oct 31 05:24:06.101861 kubelet[1674]: W1031 05:24:06.101801 1674 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 31 05:24:06.107296 kubelet[1674]: E1031 05:24:06.107254 1674 reflector.go:205] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.230.36.102:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.230.36.102:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Oct 31 05:24:06.108904 kubelet[1674]: I1031 05:24:06.108875 1674 server.go:1262] "Started kubelet" Oct 31 05:24:06.111000 audit[1674]: AVC avc: denied { mac_admin } for pid=1674 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:06.111000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:24:06.111000 audit[1674]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bbc5a0 a1=c000bce708 a2=c000bbc570 a3=25 items=0 ppid=1 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.111000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:24:06.111000 audit[1674]: AVC avc: denied { mac_admin } for pid=1674 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:06.111000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:24:06.111000 audit[1674]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bc74a0 a1=c000bce720 a2=c000bbc630 a3=25 items=0 ppid=1 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.111000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:24:06.112519 kubelet[1674]: I1031 05:24:06.111642 1674 kubelet.go:1567] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 05:24:06.112519 kubelet[1674]: I1031 05:24:06.111784 1674 kubelet.go:1571] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 05:24:06.112519 kubelet[1674]: I1031 05:24:06.111993 1674 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 05:24:06.113387 kubelet[1674]: I1031 05:24:06.113146 1674 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 05:24:06.114619 kubelet[1674]: I1031 05:24:06.114569 1674 server.go:310] "Adding debug handlers to kubelet server" Oct 31 05:24:06.117220 kubelet[1674]: E1031 05:24:06.115623 1674 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.230.36.102:6443/api/v1/namespaces/default/events\": dial tcp 10.230.36.102:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-clgmo.gb1.brightbox.com.18737c0663403204 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-clgmo.gb1.brightbox.com,UID:srv-clgmo.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-clgmo.gb1.brightbox.com,},FirstTimestamp:2025-10-31 05:24:06.108795396 +0000 UTC m=+0.609127973,LastTimestamp:2025-10-31 05:24:06.108795396 +0000 UTC m=+0.609127973,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-clgmo.gb1.brightbox.com,}" Oct 31 05:24:06.127767 kubelet[1674]: I1031 05:24:06.127720 1674 ratelimit.go:56] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 05:24:06.128013 kubelet[1674]: I1031 05:24:06.127969 1674 server_v1.go:49] "podresources" method="list" useActivePods=true Oct 31 05:24:06.128395 kubelet[1674]: E1031 05:24:06.127785 1674 kubelet.go:1615] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 31 05:24:06.128546 kubelet[1674]: I1031 05:24:06.128452 1674 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 05:24:06.130944 kubelet[1674]: I1031 05:24:06.130922 1674 volume_manager.go:313] "Starting Kubelet Volume Manager" Oct 31 05:24:06.131247 kubelet[1674]: I1031 05:24:06.131198 1674 reconciler.go:29] "Reconciler: start to sync state" Oct 31 05:24:06.133678 kubelet[1674]: I1031 05:24:06.131445 1674 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Oct 31 05:24:06.134652 kubelet[1674]: I1031 05:24:06.132254 1674 server.go:249] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 05:24:06.134965 kubelet[1674]: E1031 05:24:06.133083 1674 kubelet_node_status.go:404] "Error getting the current node from lister" err="node \"srv-clgmo.gb1.brightbox.com\" not found" Oct 31 05:24:06.135105 kubelet[1674]: E1031 05:24:06.134569 1674 reflector.go:205] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.230.36.102:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.230.36.102:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Oct 31 05:24:06.135875 kubelet[1674]: E1031 05:24:06.135818 1674 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.36.102:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-clgmo.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.36.102:6443: connect: connection refused" interval="200ms" Oct 31 05:24:06.136198 kubelet[1674]: I1031 05:24:06.136175 1674 factory.go:223] Registration of the systemd container factory successfully Oct 31 05:24:06.136561 kubelet[1674]: I1031 05:24:06.136526 1674 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 05:24:06.138366 kubelet[1674]: I1031 05:24:06.138310 1674 factory.go:223] Registration of the containerd container factory successfully Oct 31 05:24:06.140000 audit[1690]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:06.140000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffebca0e4f0 a2=0 a3=7ffebca0e4dc items=0 ppid=1674 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 05:24:06.145000 audit[1692]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:06.145000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddd535e70 a2=0 a3=7ffddd535e5c items=0 ppid=1674 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 05:24:06.153000 audit[1695]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:06.153000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe11d7650 a2=0 a3=7fffe11d763c items=0 ppid=1674 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.153000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 05:24:06.157000 audit[1697]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:06.157000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe572293f0 a2=0 a3=7ffe572293dc items=0 ppid=1674 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 05:24:06.165965 kubelet[1674]: I1031 05:24:06.165933 1674 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 05:24:06.165965 kubelet[1674]: I1031 05:24:06.165960 1674 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 05:24:06.166142 kubelet[1674]: I1031 05:24:06.165990 1674 state_mem.go:36] "Initialized new in-memory state store" Oct 31 05:24:06.168088 kubelet[1674]: I1031 05:24:06.168058 1674 policy_none.go:49] "None policy: Start" Oct 31 05:24:06.168176 kubelet[1674]: I1031 05:24:06.168097 1674 memory_manager.go:187] "Starting memorymanager" policy="None" Oct 31 05:24:06.168176 kubelet[1674]: I1031 05:24:06.168130 1674 state_mem.go:36] "Initializing new in-memory state store" logger="Memory Manager state checkpoint" Oct 31 05:24:06.169000 audit[1591]: USER_AUTH pid=1591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=91.215.85.45 addr=91.215.85.45 terminal=ssh res=failed' Oct 31 05:24:06.169467 sshd[1591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.215.85.45 user=root Oct 31 05:24:06.170434 kubelet[1674]: I1031 05:24:06.169838 1674 policy_none.go:47] "Start" Oct 31 05:24:06.183529 systemd[1]: Created slice kubepods.slice. Oct 31 05:24:06.188000 audit[1705]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:06.188000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd066c25c0 a2=0 a3=7ffd066c25ac items=0 ppid=1674 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F380000002D2D737263003132372E Oct 31 05:24:06.191081 kubelet[1674]: I1031 05:24:06.188750 1674 kubelet_network_linux.go:54] "Initialized iptables rules." protocol="IPv4" Oct 31 05:24:06.190500 systemd[1]: Created slice kubepods-burstable.slice. Oct 31 05:24:06.195000 audit[1707]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:06.195000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd491a0650 a2=0 a3=7ffd491a063c items=0 ppid=1674 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.197000 audit[1706]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:06.198023 systemd[1]: Created slice kubepods-besteffort.slice. Oct 31 05:24:06.195000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 05:24:06.197000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc677a7e00 a2=0 a3=7ffc677a7dec items=0 ppid=1674 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.197000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 31 05:24:06.200132 kubelet[1674]: I1031 05:24:06.200105 1674 kubelet_network_linux.go:54] "Initialized iptables rules." protocol="IPv6" Oct 31 05:24:06.200301 kubelet[1674]: I1031 05:24:06.200276 1674 status_manager.go:244] "Starting to sync pod status with apiserver" Oct 31 05:24:06.200485 kubelet[1674]: I1031 05:24:06.200461 1674 kubelet.go:2427] "Starting kubelet main sync loop" Oct 31 05:24:06.200652 kubelet[1674]: E1031 05:24:06.200625 1674 kubelet.go:2451] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 31 05:24:06.201733 kubelet[1674]: E1031 05:24:06.201681 1674 reflector.go:205] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.230.36.102:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.230.36.102:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Oct 31 05:24:06.203000 audit[1708]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:06.203000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc654cc300 a2=0 a3=7ffc654cc2ec items=0 ppid=1674 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.203000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 31 05:24:06.204000 audit[1709]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:06.204000 audit[1709]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd71c1f2d0 a2=0 a3=7ffd71c1f2bc items=0 ppid=1674 pid=1709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 05:24:06.205000 audit[1674]: AVC avc: denied { mac_admin } for pid=1674 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:06.205000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:24:06.205000 audit[1674]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e5e060 a1=c00096b950 a2=c000e5e030 a3=25 items=0 ppid=1 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.205000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:24:06.206516 kubelet[1674]: E1031 05:24:06.205405 1674 manager.go:513] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Oct 31 05:24:06.206516 kubelet[1674]: E1031 05:24:06.205486 1674 server.go:96] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Oct 31 05:24:06.206516 kubelet[1674]: I1031 05:24:06.205664 1674 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 05:24:06.206516 kubelet[1674]: I1031 05:24:06.205688 1674 container_log_manager.go:146] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 05:24:06.208275 kubelet[1674]: I1031 05:24:06.207109 1674 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 05:24:06.209653 kubelet[1674]: E1031 05:24:06.209359 1674 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 05:24:06.209653 kubelet[1674]: E1031 05:24:06.209429 1674 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-clgmo.gb1.brightbox.com\" not found" Oct 31 05:24:06.211000 audit[1710]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:06.211000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffc0d1e2a0 a2=0 a3=7fffc0d1e28c items=0 ppid=1674 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.211000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 31 05:24:06.212000 audit[1711]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:06.212000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffee02220 a2=0 a3=7ffffee0220c items=0 ppid=1674 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.212000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 05:24:06.214000 audit[1712]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:06.214000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc2887c890 a2=0 a3=7ffc2887c87c items=0 ppid=1674 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:06.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 31 05:24:06.308499 kubelet[1674]: I1031 05:24:06.308448 1674 kubelet_node_status.go:75] "Attempting to register node" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.308954 kubelet[1674]: E1031 05:24:06.308906 1674 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.230.36.102:6443/api/v1/nodes\": dial tcp 10.230.36.102:6443: connect: connection refused" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.317265 systemd[1]: Created slice kubepods-burstable-pod5dce4731761e02ce04bb61dde05c0201.slice. Oct 31 05:24:06.330791 kubelet[1674]: E1031 05:24:06.330751 1674 kubelet.go:3215] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-clgmo.gb1.brightbox.com\" not found" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.334298 systemd[1]: Created slice kubepods-burstable-podfc3f7ed6e3417d183bc4054cc02cbd51.slice. Oct 31 05:24:06.336605 kubelet[1674]: I1031 05:24:06.336573 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5dce4731761e02ce04bb61dde05c0201-k8s-certs\") pod \"kube-apiserver-srv-clgmo.gb1.brightbox.com\" (UID: \"5dce4731761e02ce04bb61dde05c0201\") " pod="kube-system/kube-apiserver-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.338130 kubelet[1674]: E1031 05:24:06.337892 1674 kubelet.go:3215] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-clgmo.gb1.brightbox.com\" not found" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.338311 kubelet[1674]: E1031 05:24:06.337570 1674 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.36.102:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-clgmo.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.36.102:6443: connect: connection refused" interval="400ms" Oct 31 05:24:06.338872 kubelet[1674]: I1031 05:24:06.338815 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5dce4731761e02ce04bb61dde05c0201-usr-share-ca-certificates\") pod \"kube-apiserver-srv-clgmo.gb1.brightbox.com\" (UID: \"5dce4731761e02ce04bb61dde05c0201\") " pod="kube-system/kube-apiserver-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.339552 kubelet[1674]: I1031 05:24:06.339022 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fc3f7ed6e3417d183bc4054cc02cbd51-ca-certs\") pod \"kube-controller-manager-srv-clgmo.gb1.brightbox.com\" (UID: \"fc3f7ed6e3417d183bc4054cc02cbd51\") " pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.339552 kubelet[1674]: I1031 05:24:06.339099 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fc3f7ed6e3417d183bc4054cc02cbd51-kubeconfig\") pod \"kube-controller-manager-srv-clgmo.gb1.brightbox.com\" (UID: \"fc3f7ed6e3417d183bc4054cc02cbd51\") " pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.339552 kubelet[1674]: I1031 05:24:06.339148 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fc3f7ed6e3417d183bc4054cc02cbd51-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-clgmo.gb1.brightbox.com\" (UID: \"fc3f7ed6e3417d183bc4054cc02cbd51\") " pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.339552 kubelet[1674]: I1031 05:24:06.339178 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5dce4731761e02ce04bb61dde05c0201-ca-certs\") pod \"kube-apiserver-srv-clgmo.gb1.brightbox.com\" (UID: \"5dce4731761e02ce04bb61dde05c0201\") " pod="kube-system/kube-apiserver-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.339552 kubelet[1674]: I1031 05:24:06.339229 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/fc3f7ed6e3417d183bc4054cc02cbd51-flexvolume-dir\") pod \"kube-controller-manager-srv-clgmo.gb1.brightbox.com\" (UID: \"fc3f7ed6e3417d183bc4054cc02cbd51\") " pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.339863 kubelet[1674]: I1031 05:24:06.339271 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fc3f7ed6e3417d183bc4054cc02cbd51-k8s-certs\") pod \"kube-controller-manager-srv-clgmo.gb1.brightbox.com\" (UID: \"fc3f7ed6e3417d183bc4054cc02cbd51\") " pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.339863 kubelet[1674]: I1031 05:24:06.339322 1674 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/72eeb0167fd788773bcdca14a1a95f5f-kubeconfig\") pod \"kube-scheduler-srv-clgmo.gb1.brightbox.com\" (UID: \"72eeb0167fd788773bcdca14a1a95f5f\") " pod="kube-system/kube-scheduler-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.341474 systemd[1]: Created slice kubepods-burstable-pod72eeb0167fd788773bcdca14a1a95f5f.slice. Oct 31 05:24:06.344138 kubelet[1674]: E1031 05:24:06.344114 1674 kubelet.go:3215] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-clgmo.gb1.brightbox.com\" not found" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.513623 kubelet[1674]: I1031 05:24:06.513588 1674 kubelet_node_status.go:75] "Attempting to register node" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.514284 kubelet[1674]: E1031 05:24:06.514248 1674 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.230.36.102:6443/api/v1/nodes\": dial tcp 10.230.36.102:6443: connect: connection refused" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.636443 env[1193]: time="2025-10-31T05:24:06.635531380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-clgmo.gb1.brightbox.com,Uid:5dce4731761e02ce04bb61dde05c0201,Namespace:kube-system,Attempt:0,}" Oct 31 05:24:06.640787 env[1193]: time="2025-10-31T05:24:06.640545161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-clgmo.gb1.brightbox.com,Uid:fc3f7ed6e3417d183bc4054cc02cbd51,Namespace:kube-system,Attempt:0,}" Oct 31 05:24:06.647372 env[1193]: time="2025-10-31T05:24:06.647276318Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-clgmo.gb1.brightbox.com,Uid:72eeb0167fd788773bcdca14a1a95f5f,Namespace:kube-system,Attempt:0,}" Oct 31 05:24:06.738936 kubelet[1674]: E1031 05:24:06.738839 1674 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.36.102:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-clgmo.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.36.102:6443: connect: connection refused" interval="800ms" Oct 31 05:24:06.917682 kubelet[1674]: I1031 05:24:06.917643 1674 kubelet_node_status.go:75] "Attempting to register node" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:06.918346 kubelet[1674]: E1031 05:24:06.918281 1674 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.230.36.102:6443/api/v1/nodes\": dial tcp 10.230.36.102:6443: connect: connection refused" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:07.146774 kubelet[1674]: E1031 05:24:07.146711 1674 reflector.go:205] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.230.36.102:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.230.36.102:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Oct 31 05:24:07.353017 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1786709797.mount: Deactivated successfully. Oct 31 05:24:07.370388 env[1193]: time="2025-10-31T05:24:07.370315358Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:07.371695 env[1193]: time="2025-10-31T05:24:07.371635415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:07.374256 env[1193]: time="2025-10-31T05:24:07.374173742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:07.375858 env[1193]: time="2025-10-31T05:24:07.375818690Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:07.377484 env[1193]: time="2025-10-31T05:24:07.377447791Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:07.378477 env[1193]: time="2025-10-31T05:24:07.378435581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:07.379535 env[1193]: time="2025-10-31T05:24:07.379498503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:07.383526 env[1193]: time="2025-10-31T05:24:07.383487433Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:07.387917 env[1193]: time="2025-10-31T05:24:07.387880928Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:07.389301 env[1193]: time="2025-10-31T05:24:07.389265857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:07.393783 env[1193]: time="2025-10-31T05:24:07.393716130Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:07.395050 env[1193]: time="2025-10-31T05:24:07.395015619Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:07.429636 env[1193]: time="2025-10-31T05:24:07.429481841Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:24:07.429850 env[1193]: time="2025-10-31T05:24:07.429695125Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:24:07.430655 env[1193]: time="2025-10-31T05:24:07.430584407Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:24:07.431121 env[1193]: time="2025-10-31T05:24:07.431058053Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0d24c1b1f9085fbe07896b336164c602ee7cc000168ffc1688d7c4bb2af5e767 pid=1721 runtime=io.containerd.runc.v2 Oct 31 05:24:07.436972 env[1193]: time="2025-10-31T05:24:07.436889349Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:24:07.437108 env[1193]: time="2025-10-31T05:24:07.436984741Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:24:07.437108 env[1193]: time="2025-10-31T05:24:07.437044216Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:24:07.437321 env[1193]: time="2025-10-31T05:24:07.437257370Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c6b057269b8e1f10b91ec0edf1cc15bf654017e76c6472f2e1cc60026e71c896 pid=1745 runtime=io.containerd.runc.v2 Oct 31 05:24:07.443067 env[1193]: time="2025-10-31T05:24:07.442983310Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:24:07.443295 env[1193]: time="2025-10-31T05:24:07.443030512Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:24:07.443489 env[1193]: time="2025-10-31T05:24:07.443259392Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:24:07.443821 env[1193]: time="2025-10-31T05:24:07.443761512Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/729b2490d639db476c39038bc637a277719ee7827d1ececbb907ba9c31eb2ffa pid=1747 runtime=io.containerd.runc.v2 Oct 31 05:24:07.465461 systemd[1]: Started cri-containerd-0d24c1b1f9085fbe07896b336164c602ee7cc000168ffc1688d7c4bb2af5e767.scope. Oct 31 05:24:07.483467 kubelet[1674]: E1031 05:24:07.483405 1674 reflector.go:205] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.230.36.102:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.230.36.102:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Oct 31 05:24:07.491025 systemd[1]: Started cri-containerd-729b2490d639db476c39038bc637a277719ee7827d1ececbb907ba9c31eb2ffa.scope. Oct 31 05:24:07.524009 systemd[1]: Started cri-containerd-c6b057269b8e1f10b91ec0edf1cc15bf654017e76c6472f2e1cc60026e71c896.scope. Oct 31 05:24:07.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.533000 audit: BPF prog-id=58 op=LOAD Oct 31 05:24:07.534000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.534000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1747 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732396232343930643633396462343736633339303338626336333761 Oct 31 05:24:07.535000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.535000 audit: BPF prog-id=59 op=LOAD Oct 31 05:24:07.536000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.536000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1721 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323463316231663930383566626530373839366233333631363463 Oct 31 05:24:07.535000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1747 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.537000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732396232343930643633396462343736633339303338626336333761 Oct 31 05:24:07.537000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1721 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323463316231663930383566626530373839366233333631363463 Oct 31 05:24:07.538000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.540551 kubelet[1674]: E1031 05:24:07.540484 1674 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.36.102:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-clgmo.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.36.102:6443: connect: connection refused" interval="1.6s" Oct 31 05:24:07.538000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit: BPF prog-id=60 op=LOAD Oct 31 05:24:07.538000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit: BPF prog-id=61 op=LOAD Oct 31 05:24:07.538000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000322870 items=0 ppid=1747 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732396232343930643633396462343736633339303338626336333761 Oct 31 05:24:07.541000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.538000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003552e0 items=0 ppid=1721 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323463316231663930383566626530373839366233333631363463 Oct 31 05:24:07.542000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.541000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.541000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.541000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.541000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.541000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.541000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.541000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.541000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.541000 audit: BPF prog-id=62 op=LOAD Oct 31 05:24:07.542000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.542000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.542000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.542000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.542000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.542000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.542000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.542000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.542000 audit: BPF prog-id=63 op=LOAD Oct 31 05:24:07.541000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003228b8 items=0 ppid=1747 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732396232343930643633396462343736633339303338626336333761 Oct 31 05:24:07.544000 audit: BPF prog-id=62 op=UNLOAD Oct 31 05:24:07.544000 audit: BPF prog-id=60 op=UNLOAD Oct 31 05:24:07.542000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000355328 items=0 ppid=1721 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.542000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323463316231663930383566626530373839366233333631363463 Oct 31 05:24:07.545000 audit: BPF prog-id=63 op=UNLOAD Oct 31 05:24:07.545000 audit: BPF prog-id=61 op=UNLOAD Oct 31 05:24:07.545000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit: BPF prog-id=64 op=LOAD Oct 31 05:24:07.545000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.545000 audit: BPF prog-id=65 op=LOAD Oct 31 05:24:07.545000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000355738 items=0 ppid=1721 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064323463316231663930383566626530373839366233333631363463 Oct 31 05:24:07.545000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000322cc8 items=0 ppid=1747 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732396232343930643633396462343736633339303338626336333761 Oct 31 05:24:07.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.565000 audit: BPF prog-id=66 op=LOAD Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1745 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336623035373236396238653166313062393165633065646631636331 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1745 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336623035373236396238653166313062393165633065646631636331 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit: BPF prog-id=67 op=LOAD Oct 31 05:24:07.567000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002315f0 items=0 ppid=1745 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336623035373236396238653166313062393165633065646631636331 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit: BPF prog-id=68 op=LOAD Oct 31 05:24:07.567000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000231638 items=0 ppid=1745 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336623035373236396238653166313062393165633065646631636331 Oct 31 05:24:07.567000 audit: BPF prog-id=68 op=UNLOAD Oct 31 05:24:07.567000 audit: BPF prog-id=67 op=UNLOAD Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { perfmon } for pid=1774 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit[1774]: AVC avc: denied { bpf } for pid=1774 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.567000 audit: BPF prog-id=69 op=LOAD Oct 31 05:24:07.567000 audit[1774]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000231a48 items=0 ppid=1745 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336623035373236396238653166313062393165633065646631636331 Oct 31 05:24:07.575688 kubelet[1674]: E1031 05:24:07.575609 1674 reflector.go:205] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.230.36.102:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-clgmo.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.230.36.102:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Oct 31 05:24:07.642474 env[1193]: time="2025-10-31T05:24:07.635899256Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-clgmo.gb1.brightbox.com,Uid:5dce4731761e02ce04bb61dde05c0201,Namespace:kube-system,Attempt:0,} returns sandbox id \"0d24c1b1f9085fbe07896b336164c602ee7cc000168ffc1688d7c4bb2af5e767\"" Oct 31 05:24:07.649503 env[1193]: time="2025-10-31T05:24:07.649450887Z" level=info msg="CreateContainer within sandbox \"0d24c1b1f9085fbe07896b336164c602ee7cc000168ffc1688d7c4bb2af5e767\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 31 05:24:07.656909 kubelet[1674]: E1031 05:24:07.656837 1674 reflector.go:205] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.230.36.102:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.230.36.102:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Oct 31 05:24:07.663544 env[1193]: time="2025-10-31T05:24:07.663489256Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-clgmo.gb1.brightbox.com,Uid:fc3f7ed6e3417d183bc4054cc02cbd51,Namespace:kube-system,Attempt:0,} returns sandbox id \"729b2490d639db476c39038bc637a277719ee7827d1ececbb907ba9c31eb2ffa\"" Oct 31 05:24:07.668658 env[1193]: time="2025-10-31T05:24:07.668565231Z" level=info msg="CreateContainer within sandbox \"729b2490d639db476c39038bc637a277719ee7827d1ececbb907ba9c31eb2ffa\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 31 05:24:07.669863 env[1193]: time="2025-10-31T05:24:07.669817427Z" level=info msg="CreateContainer within sandbox \"0d24c1b1f9085fbe07896b336164c602ee7cc000168ffc1688d7c4bb2af5e767\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"3a5b4191e875e6cbc51d912a07881abe962411225dbbfdfd8a0be9401fba5e47\"" Oct 31 05:24:07.671967 env[1193]: time="2025-10-31T05:24:07.671928060Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-clgmo.gb1.brightbox.com,Uid:72eeb0167fd788773bcdca14a1a95f5f,Namespace:kube-system,Attempt:0,} returns sandbox id \"c6b057269b8e1f10b91ec0edf1cc15bf654017e76c6472f2e1cc60026e71c896\"" Oct 31 05:24:07.673284 env[1193]: time="2025-10-31T05:24:07.673242325Z" level=info msg="StartContainer for \"3a5b4191e875e6cbc51d912a07881abe962411225dbbfdfd8a0be9401fba5e47\"" Oct 31 05:24:07.679826 env[1193]: time="2025-10-31T05:24:07.679782613Z" level=info msg="CreateContainer within sandbox \"c6b057269b8e1f10b91ec0edf1cc15bf654017e76c6472f2e1cc60026e71c896\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 31 05:24:07.692314 env[1193]: time="2025-10-31T05:24:07.692257798Z" level=info msg="CreateContainer within sandbox \"729b2490d639db476c39038bc637a277719ee7827d1ececbb907ba9c31eb2ffa\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"cc6e391d4825f4114e30310c291bfef531a633d4a96721fc0ff2b05d6b575023\"" Oct 31 05:24:07.693979 env[1193]: time="2025-10-31T05:24:07.693943158Z" level=info msg="StartContainer for \"cc6e391d4825f4114e30310c291bfef531a633d4a96721fc0ff2b05d6b575023\"" Oct 31 05:24:07.704764 env[1193]: time="2025-10-31T05:24:07.704720901Z" level=info msg="CreateContainer within sandbox \"c6b057269b8e1f10b91ec0edf1cc15bf654017e76c6472f2e1cc60026e71c896\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3137647f713aadf5e5035fb611c3a3aa84b23483c9d085ffbcb6c2942b27f8ef\"" Oct 31 05:24:07.707358 env[1193]: time="2025-10-31T05:24:07.707303735Z" level=info msg="StartContainer for \"3137647f713aadf5e5035fb611c3a3aa84b23483c9d085ffbcb6c2942b27f8ef\"" Oct 31 05:24:07.723149 kubelet[1674]: I1031 05:24:07.722593 1674 kubelet_node_status.go:75] "Attempting to register node" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:07.723149 kubelet[1674]: E1031 05:24:07.723094 1674 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.230.36.102:6443/api/v1/nodes\": dial tcp 10.230.36.102:6443: connect: connection refused" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:07.730417 systemd[1]: Started cri-containerd-3a5b4191e875e6cbc51d912a07881abe962411225dbbfdfd8a0be9401fba5e47.scope. Oct 31 05:24:07.753562 systemd[1]: Started cri-containerd-cc6e391d4825f4114e30310c291bfef531a633d4a96721fc0ff2b05d6b575023.scope. Oct 31 05:24:07.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.767000 audit: BPF prog-id=70 op=LOAD Oct 31 05:24:07.768000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.768000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1721 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361356234313931653837356536636263353164393132613037383831 Oct 31 05:24:07.768000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.768000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1721 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.768000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361356234313931653837356536636263353164393132613037383831 Oct 31 05:24:07.769000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.769000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.769000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.769000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.769000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.769000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.769000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.769000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.769000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.769000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.769000 audit: BPF prog-id=71 op=LOAD Oct 31 05:24:07.769000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000287d40 items=0 ppid=1721 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361356234313931653837356536636263353164393132613037383831 Oct 31 05:24:07.771000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.771000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.771000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.771000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.771000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.771000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.771000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.771000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.771000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.771000 audit: BPF prog-id=72 op=LOAD Oct 31 05:24:07.771000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000287d88 items=0 ppid=1721 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361356234313931653837356536636263353164393132613037383831 Oct 31 05:24:07.773000 audit: BPF prog-id=72 op=UNLOAD Oct 31 05:24:07.773000 audit: BPF prog-id=71 op=UNLOAD Oct 31 05:24:07.773000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.773000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.773000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.773000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.773000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.773000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.773000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.773000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.773000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.773000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.773000 audit: BPF prog-id=73 op=LOAD Oct 31 05:24:07.773000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000408198 items=0 ppid=1721 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361356234313931653837356536636263353164393132613037383831 Oct 31 05:24:07.792487 systemd[1]: Started cri-containerd-3137647f713aadf5e5035fb611c3a3aa84b23483c9d085ffbcb6c2942b27f8ef.scope. Oct 31 05:24:07.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.815000 audit: BPF prog-id=74 op=LOAD Oct 31 05:24:07.816000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.816000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1747 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366533393164343832356634313134653330333130633239316266 Oct 31 05:24:07.817000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.817000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1747 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366533393164343832356634313134653330333130633239316266 Oct 31 05:24:07.818000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.818000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.818000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.818000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.818000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.818000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.818000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.818000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.818000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.818000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.818000 audit: BPF prog-id=75 op=LOAD Oct 31 05:24:07.818000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00040e010 items=0 ppid=1747 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.818000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366533393164343832356634313134653330333130633239316266 Oct 31 05:24:07.819000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.819000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.819000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.819000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.819000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.819000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.819000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.819000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.819000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.819000 audit: BPF prog-id=76 op=LOAD Oct 31 05:24:07.819000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00040e058 items=0 ppid=1747 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366533393164343832356634313134653330333130633239316266 Oct 31 05:24:07.821000 audit: BPF prog-id=76 op=UNLOAD Oct 31 05:24:07.821000 audit: BPF prog-id=75 op=UNLOAD Oct 31 05:24:07.821000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.821000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.821000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.821000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.821000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.821000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.821000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.821000 audit[1861]: AVC avc: denied { perfmon } for pid=1861 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.821000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.821000 audit[1861]: AVC avc: denied { bpf } for pid=1861 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.821000 audit: BPF prog-id=77 op=LOAD Oct 31 05:24:07.821000 audit[1861]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00040e468 items=0 ppid=1747 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363366533393164343832356634313134653330333130633239316266 Oct 31 05:24:07.843443 env[1193]: time="2025-10-31T05:24:07.843382956Z" level=info msg="StartContainer for \"3a5b4191e875e6cbc51d912a07881abe962411225dbbfdfd8a0be9401fba5e47\" returns successfully" Oct 31 05:24:07.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.856000 audit: BPF prog-id=78 op=LOAD Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1745 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331333736343766373133616164663565353033356662363131633361 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1745 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331333736343766373133616164663565353033356662363131633361 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit: BPF prog-id=79 op=LOAD Oct 31 05:24:07.857000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000354720 items=0 ppid=1745 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331333736343766373133616164663565353033356662363131633361 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit: BPF prog-id=80 op=LOAD Oct 31 05:24:07.857000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000354768 items=0 ppid=1745 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331333736343766373133616164663565353033356662363131633361 Oct 31 05:24:07.857000 audit: BPF prog-id=80 op=UNLOAD Oct 31 05:24:07.857000 audit: BPF prog-id=79 op=UNLOAD Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:07.857000 audit: BPF prog-id=81 op=LOAD Oct 31 05:24:07.857000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000354b78 items=0 ppid=1745 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:07.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331333736343766373133616164663565353033356662363131633361 Oct 31 05:24:07.892218 env[1193]: time="2025-10-31T05:24:07.892143271Z" level=info msg="StartContainer for \"cc6e391d4825f4114e30310c291bfef531a633d4a96721fc0ff2b05d6b575023\" returns successfully" Oct 31 05:24:07.919150 env[1193]: time="2025-10-31T05:24:07.919088385Z" level=info msg="StartContainer for \"3137647f713aadf5e5035fb611c3a3aa84b23483c9d085ffbcb6c2942b27f8ef\" returns successfully" Oct 31 05:24:08.106114 kubelet[1674]: E1031 05:24:08.105991 1674 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.230.36.102:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.230.36.102:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Oct 31 05:24:08.213368 kubelet[1674]: E1031 05:24:08.213176 1674 kubelet.go:3215] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-clgmo.gb1.brightbox.com\" not found" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:08.219723 kubelet[1674]: E1031 05:24:08.219682 1674 kubelet.go:3215] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-clgmo.gb1.brightbox.com\" not found" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:08.222686 kubelet[1674]: E1031 05:24:08.222648 1674 kubelet.go:3215] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-clgmo.gb1.brightbox.com\" not found" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:08.448433 sshd[1591]: Failed password for root from 91.215.85.45 port 44022 ssh2 Oct 31 05:24:09.191000 audit[1948]: USER_AUTH pid=1948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=91.215.85.45 addr=91.215.85.45 terminal=ssh res=failed' Oct 31 05:24:09.227639 kubelet[1674]: E1031 05:24:09.227380 1674 kubelet.go:3215] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-clgmo.gb1.brightbox.com\" not found" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:09.227639 kubelet[1674]: E1031 05:24:09.227460 1674 kubelet.go:3215] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-clgmo.gb1.brightbox.com\" not found" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:09.327454 kubelet[1674]: I1031 05:24:09.326424 1674 kubelet_node_status.go:75] "Attempting to register node" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:10.231582 kubelet[1674]: E1031 05:24:10.231513 1674 kubelet.go:3215] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-clgmo.gb1.brightbox.com\" not found" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:10.693172 kubelet[1674]: E1031 05:24:10.693094 1674 kubelet.go:3215] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-clgmo.gb1.brightbox.com\" not found" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:10.747618 sshd[1591]: PAM: Permission denied for root from 91.215.85.45 Oct 31 05:24:11.016000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=522574 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:11.019364 kernel: kauditd_printk_skb: 620 callbacks suppressed Oct 31 05:24:11.019533 kernel: audit: type=1400 audit(1761888251.016:552): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=522574 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:11.016000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000974db0 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:24:11.048358 kernel: audit: type=1300 audit(1761888251.016:552): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000974db0 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:24:11.016000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:24:11.071683 kernel: audit: type=1327 audit(1761888251.016:552): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:24:11.039000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:11.086355 kernel: audit: type=1400 audit(1761888251.039:553): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:11.039000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000396ac0 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:24:11.101358 kernel: audit: type=1300 audit(1761888251.039:553): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000396ac0 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:24:11.039000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:24:11.117368 kernel: audit: type=1327 audit(1761888251.039:553): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:24:11.137047 sshd[1591]: Connection reset by authenticating user root 91.215.85.45 port 44022 [preauth] Oct 31 05:24:11.139271 systemd[1]: sshd@12-10.230.36.102:22-91.215.85.45:44022.service: Deactivated successfully. Oct 31 05:24:11.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.36.102:22-91.215.85.45:44022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:11.147357 kernel: audit: type=1131 audit(1761888251.139:554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.36.102:22-91.215.85.45:44022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:11.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.36.102:22-91.215.85.45:37006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:11.271057 systemd[1]: Started sshd@13-10.230.36.102:22-91.215.85.45:37006.service. Oct 31 05:24:11.278550 kernel: audit: type=1130 audit(1761888251.271:555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.36.102:22-91.215.85.45:37006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:11.796000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=522574 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:11.812494 kernel: audit: type=1400 audit(1761888251.796:556): avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=522574 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:11.812610 kernel: audit: type=1300 audit(1761888251.796:556): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0035a1770 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:24:11.796000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0035a1770 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:24:11.796000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:24:11.797000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=522570 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:11.797000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0035a1800 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:24:11.797000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:24:11.802000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:11.802000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c0067f7580 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:24:11.802000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:24:11.803000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:11.803000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c0067f7780 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:24:11.803000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:24:11.803000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=522574 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:11.803000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c006a00270 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:24:11.803000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:24:11.813000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=522576 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:11.813000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=53 a1=c00699e150 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:24:11.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:24:12.084734 kubelet[1674]: E1031 05:24:12.084418 1674 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-clgmo.gb1.brightbox.com\" not found" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:12.102570 kubelet[1674]: I1031 05:24:12.102534 1674 apiserver.go:52] "Watching apiserver" Oct 31 05:24:12.135813 kubelet[1674]: I1031 05:24:12.135751 1674 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Oct 31 05:24:12.142969 kubelet[1674]: E1031 05:24:12.142713 1674 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{srv-clgmo.gb1.brightbox.com.18737c0663403204 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-clgmo.gb1.brightbox.com,UID:srv-clgmo.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-clgmo.gb1.brightbox.com,},FirstTimestamp:2025-10-31 05:24:06.108795396 +0000 UTC m=+0.609127973,LastTimestamp:2025-10-31 05:24:06.108795396 +0000 UTC m=+0.609127973,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-clgmo.gb1.brightbox.com,}" Oct 31 05:24:12.200418 kubelet[1674]: I1031 05:24:12.200372 1674 kubelet_node_status.go:78] "Successfully registered node" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:12.200784 kubelet[1674]: E1031 05:24:12.200752 1674 kubelet_node_status.go:486] "Error updating node status, will retry" err="error getting node \"srv-clgmo.gb1.brightbox.com\": node \"srv-clgmo.gb1.brightbox.com\" not found" Oct 31 05:24:12.208366 kubelet[1674]: E1031 05:24:12.208159 1674 event.go:359] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{srv-clgmo.gb1.brightbox.com.18737c0664619cd8 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-clgmo.gb1.brightbox.com,UID:srv-clgmo.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:InvalidDiskCapacity,Message:invalid capacity 0 on image filesystem,Source:EventSource{Component:kubelet,Host:srv-clgmo.gb1.brightbox.com,},FirstTimestamp:2025-10-31 05:24:06.127762648 +0000 UTC m=+0.628095231,LastTimestamp:2025-10-31 05:24:06.127762648 +0000 UTC m=+0.628095231,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-clgmo.gb1.brightbox.com,}" Oct 31 05:24:12.234587 kubelet[1674]: I1031 05:24:12.234539 1674 kubelet.go:3219] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:12.248043 kubelet[1674]: E1031 05:24:12.247989 1674 kubelet.go:3221] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-clgmo.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:12.248300 kubelet[1674]: I1031 05:24:12.248274 1674 kubelet.go:3219] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:12.251608 kubelet[1674]: E1031 05:24:12.251555 1674 kubelet.go:3221] "Failed creating a mirror pod" err="pods \"kube-controller-manager-srv-clgmo.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:12.251900 kubelet[1674]: I1031 05:24:12.251836 1674 kubelet.go:3219] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:12.254297 kubelet[1674]: E1031 05:24:12.254267 1674 kubelet.go:3221] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-clgmo.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:13.414590 sshd[1954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.215.85.45 user=root Oct 31 05:24:13.414000 audit[1954]: USER_AUTH pid=1954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=91.215.85.45 addr=91.215.85.45 terminal=ssh res=failed' Oct 31 05:24:13.574461 kubelet[1674]: I1031 05:24:13.574402 1674 kubelet.go:3219] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:13.595029 kubelet[1674]: I1031 05:24:13.594983 1674 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 31 05:24:14.495136 systemd[1]: Reloading. Oct 31 05:24:14.627273 /usr/lib/systemd/system-generators/torcx-generator[1982]: time="2025-10-31T05:24:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 31 05:24:14.627370 /usr/lib/systemd/system-generators/torcx-generator[1982]: time="2025-10-31T05:24:14Z" level=info msg="torcx already run" Oct 31 05:24:14.741280 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 31 05:24:14.741313 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 31 05:24:14.774441 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 31 05:24:14.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.914000 audit: BPF prog-id=82 op=LOAD Oct 31 05:24:14.914000 audit: BPF prog-id=43 op=UNLOAD Oct 31 05:24:14.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.915000 audit: BPF prog-id=83 op=LOAD Oct 31 05:24:14.915000 audit: BPF prog-id=44 op=UNLOAD Oct 31 05:24:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.918000 audit: BPF prog-id=84 op=LOAD Oct 31 05:24:14.918000 audit: BPF prog-id=66 op=UNLOAD Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit: BPF prog-id=85 op=LOAD Oct 31 05:24:14.924000 audit: BPF prog-id=45 op=UNLOAD Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit: BPF prog-id=86 op=LOAD Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.925000 audit: BPF prog-id=87 op=LOAD Oct 31 05:24:14.925000 audit: BPF prog-id=46 op=UNLOAD Oct 31 05:24:14.925000 audit: BPF prog-id=47 op=UNLOAD Oct 31 05:24:14.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.929000 audit: BPF prog-id=88 op=LOAD Oct 31 05:24:14.929000 audit: BPF prog-id=74 op=UNLOAD Oct 31 05:24:14.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit: BPF prog-id=89 op=LOAD Oct 31 05:24:14.932000 audit: BPF prog-id=48 op=UNLOAD Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit: BPF prog-id=90 op=LOAD Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.932000 audit: BPF prog-id=91 op=LOAD Oct 31 05:24:14.932000 audit: BPF prog-id=49 op=UNLOAD Oct 31 05:24:14.932000 audit: BPF prog-id=50 op=UNLOAD Oct 31 05:24:14.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.935000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.935000 audit: BPF prog-id=92 op=LOAD Oct 31 05:24:14.936000 audit: BPF prog-id=51 op=UNLOAD Oct 31 05:24:14.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit: BPF prog-id=93 op=LOAD Oct 31 05:24:14.937000 audit: BPF prog-id=52 op=UNLOAD Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit: BPF prog-id=94 op=LOAD Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.937000 audit: BPF prog-id=95 op=LOAD Oct 31 05:24:14.937000 audit: BPF prog-id=53 op=UNLOAD Oct 31 05:24:14.937000 audit: BPF prog-id=54 op=UNLOAD Oct 31 05:24:14.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.938000 audit: BPF prog-id=96 op=LOAD Oct 31 05:24:14.938000 audit: BPF prog-id=59 op=UNLOAD Oct 31 05:24:14.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.939000 audit: BPF prog-id=97 op=LOAD Oct 31 05:24:14.939000 audit: BPF prog-id=70 op=UNLOAD Oct 31 05:24:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.941000 audit: BPF prog-id=98 op=LOAD Oct 31 05:24:14.941000 audit: BPF prog-id=58 op=UNLOAD Oct 31 05:24:14.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit: BPF prog-id=99 op=LOAD Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.944000 audit: BPF prog-id=100 op=LOAD Oct 31 05:24:14.944000 audit: BPF prog-id=55 op=UNLOAD Oct 31 05:24:14.944000 audit: BPF prog-id=56 op=UNLOAD Oct 31 05:24:14.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.946000 audit: BPF prog-id=101 op=LOAD Oct 31 05:24:14.946000 audit: BPF prog-id=57 op=UNLOAD Oct 31 05:24:14.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:14.952000 audit: BPF prog-id=102 op=LOAD Oct 31 05:24:14.952000 audit: BPF prog-id=78 op=UNLOAD Oct 31 05:24:14.980387 systemd[1]: Stopping kubelet.service... Oct 31 05:24:14.995307 systemd[1]: kubelet.service: Deactivated successfully. Oct 31 05:24:14.995757 systemd[1]: Stopped kubelet.service. Oct 31 05:24:14.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:14.995919 systemd[1]: kubelet.service: Consumed 1.236s CPU time. Oct 31 05:24:14.999765 systemd[1]: Starting kubelet.service... Oct 31 05:24:15.321732 sshd[1954]: Failed password for root from 91.215.85.45 port 37006 ssh2 Oct 31 05:24:16.485623 kernel: kauditd_printk_skb: 262 callbacks suppressed Oct 31 05:24:16.486013 kernel: audit: type=1130 audit(1761888256.481:808): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:16.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:16.481211 systemd[1]: Started kubelet.service. Oct 31 05:24:16.531000 audit[2028]: USER_AUTH pid=2028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=91.215.85.45 addr=91.215.85.45 terminal=ssh res=failed' Oct 31 05:24:16.551384 kernel: audit: type=1100 audit(1761888256.531:809): pid=2028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=91.215.85.45 addr=91.215.85.45 terminal=ssh res=failed' Oct 31 05:24:16.645137 kubelet[2031]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 31 05:24:16.645872 kubelet[2031]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 31 05:24:16.646159 kubelet[2031]: I1031 05:24:16.646105 2031 server.go:213] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 31 05:24:16.658526 kubelet[2031]: I1031 05:24:16.658490 2031 server.go:529] "Kubelet version" kubeletVersion="v1.34.1" Oct 31 05:24:16.658766 kubelet[2031]: I1031 05:24:16.658733 2031 server.go:531] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 31 05:24:16.666809 kubelet[2031]: I1031 05:24:16.666767 2031 watchdog_linux.go:95] "Systemd watchdog is not enabled" Oct 31 05:24:16.666981 kubelet[2031]: I1031 05:24:16.666955 2031 watchdog_linux.go:137] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 31 05:24:16.667608 kubelet[2031]: I1031 05:24:16.667570 2031 server.go:956] "Client rotation is on, will bootstrap in background" Oct 31 05:24:16.670064 kubelet[2031]: I1031 05:24:16.670039 2031 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" Oct 31 05:24:16.674962 kubelet[2031]: I1031 05:24:16.674891 2031 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 31 05:24:16.690472 kubelet[2031]: E1031 05:24:16.690422 2031 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 31 05:24:16.690775 kubelet[2031]: I1031 05:24:16.690748 2031 server.go:1400] "CRI implementation should be updated to support RuntimeConfig. Falling back to using cgroupDriver from kubelet config." Oct 31 05:24:16.696629 kubelet[2031]: I1031 05:24:16.696603 2031 server.go:781] "--cgroups-per-qos enabled, but --cgroup-root was not specified. Defaulting to /" Oct 31 05:24:16.697646 kubelet[2031]: I1031 05:24:16.697587 2031 container_manager_linux.go:270] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 31 05:24:16.698039 kubelet[2031]: I1031 05:24:16.697780 2031 container_manager_linux.go:275] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-clgmo.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 31 05:24:16.698423 kubelet[2031]: I1031 05:24:16.698382 2031 topology_manager.go:138] "Creating topology manager with none policy" Oct 31 05:24:16.698576 kubelet[2031]: I1031 05:24:16.698556 2031 container_manager_linux.go:306] "Creating device plugin manager" Oct 31 05:24:16.698746 kubelet[2031]: I1031 05:24:16.698712 2031 container_manager_linux.go:315] "Creating Dynamic Resource Allocation (DRA) manager" Oct 31 05:24:16.700697 kubelet[2031]: I1031 05:24:16.700673 2031 state_mem.go:36] "Initialized new in-memory state store" Oct 31 05:24:16.701242 kubelet[2031]: I1031 05:24:16.701219 2031 kubelet.go:475] "Attempting to sync node with API server" Oct 31 05:24:16.702806 kubelet[2031]: I1031 05:24:16.702783 2031 kubelet.go:376] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 31 05:24:16.703037 kubelet[2031]: I1031 05:24:16.702997 2031 kubelet.go:387] "Adding apiserver pod source" Oct 31 05:24:16.715579 kubelet[2031]: I1031 05:24:16.715547 2031 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 31 05:24:16.726904 kubelet[2031]: I1031 05:24:16.726876 2031 kuberuntime_manager.go:291] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 31 05:24:16.731176 kubelet[2031]: I1031 05:24:16.731145 2031 kubelet.go:940] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Oct 31 05:24:16.732052 kubelet[2031]: I1031 05:24:16.731312 2031 kubelet.go:964] "Not starting PodCertificateRequest manager because we are in static kubelet mode or the PodCertificateProjection feature gate is disabled" Oct 31 05:24:16.751831 kubelet[2031]: I1031 05:24:16.750943 2031 server.go:1262] "Started kubelet" Oct 31 05:24:16.759000 audit[2031]: AVC avc: denied { mac_admin } for pid=2031 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:16.769786 kernel: audit: type=1400 audit(1761888256.759:810): avc: denied { mac_admin } for pid=2031 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:16.770088 kernel: audit: type=1401 audit(1761888256.759:810): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:24:16.759000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:24:16.770357 kubelet[2031]: I1031 05:24:16.762755 2031 ratelimit.go:56] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 31 05:24:16.770357 kubelet[2031]: I1031 05:24:16.768007 2031 server_v1.go:49] "podresources" method="list" useActivePods=true Oct 31 05:24:16.770357 kubelet[2031]: I1031 05:24:16.768864 2031 server.go:249] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 31 05:24:16.770357 kubelet[2031]: I1031 05:24:16.767763 2031 kubelet.go:1567] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 31 05:24:16.770357 kubelet[2031]: I1031 05:24:16.769068 2031 kubelet.go:1571] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 31 05:24:16.773401 kubelet[2031]: I1031 05:24:16.772354 2031 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 31 05:24:16.759000 audit[2031]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00088f920 a1=c0009679f8 a2=c00088f8f0 a3=25 items=0 ppid=1 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:16.775289 kubelet[2031]: I1031 05:24:16.762873 2031 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Oct 31 05:24:16.778818 kubelet[2031]: I1031 05:24:16.778793 2031 server.go:310] "Adding debug handlers to kubelet server" Oct 31 05:24:16.780851 kubelet[2031]: E1031 05:24:16.766005 2031 kubelet.go:1615] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 31 05:24:16.781448 kubelet[2031]: I1031 05:24:16.781419 2031 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 31 05:24:16.783441 kernel: audit: type=1300 audit(1761888256.759:810): arch=c000003e syscall=188 success=no exit=-22 a0=c00088f920 a1=c0009679f8 a2=c00088f8f0 a3=25 items=0 ppid=1 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:16.787574 kubelet[2031]: I1031 05:24:16.787530 2031 volume_manager.go:313] "Starting Kubelet Volume Manager" Oct 31 05:24:16.789064 kubelet[2031]: I1031 05:24:16.789000 2031 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Oct 31 05:24:16.789324 kubelet[2031]: I1031 05:24:16.789286 2031 reconciler.go:29] "Reconciler: start to sync state" Oct 31 05:24:16.759000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:24:16.802800 kernel: audit: type=1327 audit(1761888256.759:810): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:24:16.768000 audit[2031]: AVC avc: denied { mac_admin } for pid=2031 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:16.809372 kernel: audit: type=1400 audit(1761888256.768:811): avc: denied { mac_admin } for pid=2031 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:16.768000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:24:16.817501 kubelet[2031]: I1031 05:24:16.815342 2031 factory.go:223] Registration of the systemd container factory successfully Oct 31 05:24:16.817501 kubelet[2031]: I1031 05:24:16.815514 2031 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 31 05:24:16.819370 kernel: audit: type=1401 audit(1761888256.768:811): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:24:16.768000 audit[2031]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000aeac20 a1=c000aab428 a2=c000afeb40 a3=25 items=0 ppid=1 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:16.823230 kubelet[2031]: I1031 05:24:16.823199 2031 factory.go:223] Registration of the containerd container factory successfully Oct 31 05:24:16.828361 kernel: audit: type=1300 audit(1761888256.768:811): arch=c000003e syscall=188 success=no exit=-22 a0=c000aeac20 a1=c000aab428 a2=c000afeb40 a3=25 items=0 ppid=1 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:16.768000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:24:16.839902 kernel: audit: type=1327 audit(1761888256.768:811): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:24:16.936724 kubelet[2031]: I1031 05:24:16.936121 2031 kubelet_network_linux.go:54] "Initialized iptables rules." protocol="IPv4" Oct 31 05:24:16.942991 kubelet[2031]: I1031 05:24:16.942945 2031 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 31 05:24:16.942991 kubelet[2031]: I1031 05:24:16.942971 2031 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 31 05:24:16.944646 kubelet[2031]: I1031 05:24:16.944617 2031 state_mem.go:36] "Initialized new in-memory state store" Oct 31 05:24:16.947491 kubelet[2031]: I1031 05:24:16.946978 2031 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 31 05:24:16.947491 kubelet[2031]: I1031 05:24:16.947069 2031 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 31 05:24:16.947491 kubelet[2031]: I1031 05:24:16.947213 2031 policy_none.go:49] "None policy: Start" Oct 31 05:24:16.947491 kubelet[2031]: I1031 05:24:16.947378 2031 memory_manager.go:187] "Starting memorymanager" policy="None" Oct 31 05:24:16.947491 kubelet[2031]: I1031 05:24:16.947488 2031 state_mem.go:36] "Initializing new in-memory state store" logger="Memory Manager state checkpoint" Oct 31 05:24:16.949196 kubelet[2031]: I1031 05:24:16.947733 2031 state_mem.go:77] "Updated machine memory state" logger="Memory Manager state checkpoint" Oct 31 05:24:16.949196 kubelet[2031]: I1031 05:24:16.947815 2031 policy_none.go:47] "Start" Oct 31 05:24:16.950496 kubelet[2031]: I1031 05:24:16.949693 2031 kubelet_network_linux.go:54] "Initialized iptables rules." protocol="IPv6" Oct 31 05:24:16.950496 kubelet[2031]: I1031 05:24:16.949745 2031 status_manager.go:244] "Starting to sync pod status with apiserver" Oct 31 05:24:16.950496 kubelet[2031]: I1031 05:24:16.949825 2031 kubelet.go:2427] "Starting kubelet main sync loop" Oct 31 05:24:16.950496 kubelet[2031]: E1031 05:24:16.949938 2031 kubelet.go:2451] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 31 05:24:16.966000 audit[2031]: AVC avc: denied { mac_admin } for pid=2031 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:16.966000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 31 05:24:16.968857 kubelet[2031]: E1031 05:24:16.967107 2031 manager.go:513] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Oct 31 05:24:16.966000 audit[2031]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c72c90 a1=c000dab608 a2=c000c72c60 a3=25 items=0 ppid=1 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:16.966000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 31 05:24:16.971903 kubelet[2031]: E1031 05:24:16.971164 2031 server.go:96] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Oct 31 05:24:16.976247 kubelet[2031]: I1031 05:24:16.973514 2031 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 31 05:24:16.976247 kubelet[2031]: I1031 05:24:16.973551 2031 container_log_manager.go:146] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 31 05:24:16.976520 kubelet[2031]: I1031 05:24:16.976485 2031 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 31 05:24:16.992833 kubelet[2031]: E1031 05:24:16.992216 2031 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 31 05:24:17.052825 kubelet[2031]: I1031 05:24:17.052128 2031 kubelet.go:3219] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.053668 kubelet[2031]: I1031 05:24:17.053642 2031 kubelet.go:3219] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.054155 kubelet[2031]: I1031 05:24:17.054130 2031 kubelet.go:3219] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.071480 kubelet[2031]: I1031 05:24:17.071417 2031 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 31 05:24:17.073087 kubelet[2031]: I1031 05:24:17.072621 2031 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 31 05:24:17.074700 kubelet[2031]: I1031 05:24:17.074669 2031 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 31 05:24:17.074806 kubelet[2031]: E1031 05:24:17.074738 2031 kubelet.go:3221] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-clgmo.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.116088 kubelet[2031]: I1031 05:24:17.116002 2031 kubelet_node_status.go:75] "Attempting to register node" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.136394 kubelet[2031]: I1031 05:24:17.136307 2031 kubelet_node_status.go:124] "Node was previously registered" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.136668 kubelet[2031]: I1031 05:24:17.136529 2031 kubelet_node_status.go:78] "Successfully registered node" node="srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.191815 kubelet[2031]: I1031 05:24:17.191674 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5dce4731761e02ce04bb61dde05c0201-usr-share-ca-certificates\") pod \"kube-apiserver-srv-clgmo.gb1.brightbox.com\" (UID: \"5dce4731761e02ce04bb61dde05c0201\") " pod="kube-system/kube-apiserver-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.191815 kubelet[2031]: I1031 05:24:17.191788 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fc3f7ed6e3417d183bc4054cc02cbd51-ca-certs\") pod \"kube-controller-manager-srv-clgmo.gb1.brightbox.com\" (UID: \"fc3f7ed6e3417d183bc4054cc02cbd51\") " pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.191815 kubelet[2031]: I1031 05:24:17.191844 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/fc3f7ed6e3417d183bc4054cc02cbd51-flexvolume-dir\") pod \"kube-controller-manager-srv-clgmo.gb1.brightbox.com\" (UID: \"fc3f7ed6e3417d183bc4054cc02cbd51\") " pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.192360 kubelet[2031]: I1031 05:24:17.191881 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fc3f7ed6e3417d183bc4054cc02cbd51-kubeconfig\") pod \"kube-controller-manager-srv-clgmo.gb1.brightbox.com\" (UID: \"fc3f7ed6e3417d183bc4054cc02cbd51\") " pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.192360 kubelet[2031]: I1031 05:24:17.191929 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/72eeb0167fd788773bcdca14a1a95f5f-kubeconfig\") pod \"kube-scheduler-srv-clgmo.gb1.brightbox.com\" (UID: \"72eeb0167fd788773bcdca14a1a95f5f\") " pod="kube-system/kube-scheduler-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.192360 kubelet[2031]: I1031 05:24:17.191989 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5dce4731761e02ce04bb61dde05c0201-ca-certs\") pod \"kube-apiserver-srv-clgmo.gb1.brightbox.com\" (UID: \"5dce4731761e02ce04bb61dde05c0201\") " pod="kube-system/kube-apiserver-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.192360 kubelet[2031]: I1031 05:24:17.192062 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5dce4731761e02ce04bb61dde05c0201-k8s-certs\") pod \"kube-apiserver-srv-clgmo.gb1.brightbox.com\" (UID: \"5dce4731761e02ce04bb61dde05c0201\") " pod="kube-system/kube-apiserver-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.192360 kubelet[2031]: I1031 05:24:17.192111 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fc3f7ed6e3417d183bc4054cc02cbd51-k8s-certs\") pod \"kube-controller-manager-srv-clgmo.gb1.brightbox.com\" (UID: \"fc3f7ed6e3417d183bc4054cc02cbd51\") " pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.192682 kubelet[2031]: I1031 05:24:17.192147 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fc3f7ed6e3417d183bc4054cc02cbd51-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-clgmo.gb1.brightbox.com\" (UID: \"fc3f7ed6e3417d183bc4054cc02cbd51\") " pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:17.633000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=522603 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 31 05:24:17.633000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aba900 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:24:17.633000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:24:17.717385 kubelet[2031]: I1031 05:24:17.717271 2031 apiserver.go:52] "Watching apiserver" Oct 31 05:24:17.790329 kubelet[2031]: I1031 05:24:17.790243 2031 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Oct 31 05:24:17.984917 kubelet[2031]: I1031 05:24:17.984841 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-clgmo.gb1.brightbox.com" podStartSLOduration=4.984789517 podStartE2EDuration="4.984789517s" podCreationTimestamp="2025-10-31 05:24:13 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:24:17.958238943 +0000 UTC m=+1.450973199" watchObservedRunningTime="2025-10-31 05:24:17.984789517 +0000 UTC m=+1.477523773" Oct 31 05:24:17.985437 kubelet[2031]: I1031 05:24:17.985384 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-clgmo.gb1.brightbox.com" podStartSLOduration=0.985373919 podStartE2EDuration="985.373919ms" podCreationTimestamp="2025-10-31 05:24:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:24:17.984239427 +0000 UTC m=+1.476973691" watchObservedRunningTime="2025-10-31 05:24:17.985373919 +0000 UTC m=+1.478108174" Oct 31 05:24:17.993294 kubelet[2031]: I1031 05:24:17.993250 2031 kubelet.go:3219] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:18.009770 kubelet[2031]: I1031 05:24:18.009718 2031 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Oct 31 05:24:18.009975 kubelet[2031]: E1031 05:24:18.009824 2031 kubelet.go:3221] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-clgmo.gb1.brightbox.com\" already exists" pod="kube-system/kube-scheduler-srv-clgmo.gb1.brightbox.com" Oct 31 05:24:18.036941 kubelet[2031]: I1031 05:24:18.036859 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-clgmo.gb1.brightbox.com" podStartSLOduration=1.036836921 podStartE2EDuration="1.036836921s" podCreationTimestamp="2025-10-31 05:24:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:24:18.015165466 +0000 UTC m=+1.507899736" watchObservedRunningTime="2025-10-31 05:24:18.036836921 +0000 UTC m=+1.529571176" Oct 31 05:24:18.131000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:18.131000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bb5c00 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:24:18.131000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:24:18.132000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:18.132000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bb5e20 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:24:18.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:24:18.133000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:18.133000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bb5fe0 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:24:18.133000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:24:18.135000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:24:18.135000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0000a4600 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:24:18.135000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:24:18.182709 sshd[1954]: PAM: Permission denied for root from 91.215.85.45 Oct 31 05:24:18.637407 sshd[1954]: Connection reset by authenticating user root 91.215.85.45 port 37006 [preauth] Oct 31 05:24:18.639099 systemd[1]: sshd@13-10.230.36.102:22-91.215.85.45:37006.service: Deactivated successfully. Oct 31 05:24:18.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.36.102:22-91.215.85.45:37006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:18.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.36.102:22-91.215.85.45:21730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:18.689123 systemd[1]: Started sshd@14-10.230.36.102:22-91.215.85.45:21730.service. Oct 31 05:24:19.252151 kubelet[2031]: I1031 05:24:19.252086 2031 kuberuntime_manager.go:1828] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 31 05:24:19.253719 env[1193]: time="2025-10-31T05:24:19.253569988Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 31 05:24:19.254777 kubelet[2031]: I1031 05:24:19.254748 2031 kubelet_network.go:47] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 31 05:24:20.137799 systemd[1]: Created slice kubepods-besteffort-podfbf8adc4_a2e4_4d94_8785_945a7c91dfde.slice. Oct 31 05:24:20.210998 kubelet[2031]: I1031 05:24:20.210940 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/fbf8adc4-a2e4-4d94-8785-945a7c91dfde-xtables-lock\") pod \"kube-proxy-d2n4t\" (UID: \"fbf8adc4-a2e4-4d94-8785-945a7c91dfde\") " pod="kube-system/kube-proxy-d2n4t" Oct 31 05:24:20.211275 kubelet[2031]: I1031 05:24:20.211245 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/fbf8adc4-a2e4-4d94-8785-945a7c91dfde-kube-proxy\") pod \"kube-proxy-d2n4t\" (UID: \"fbf8adc4-a2e4-4d94-8785-945a7c91dfde\") " pod="kube-system/kube-proxy-d2n4t" Oct 31 05:24:20.211443 kubelet[2031]: I1031 05:24:20.211414 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/fbf8adc4-a2e4-4d94-8785-945a7c91dfde-lib-modules\") pod \"kube-proxy-d2n4t\" (UID: \"fbf8adc4-a2e4-4d94-8785-945a7c91dfde\") " pod="kube-system/kube-proxy-d2n4t" Oct 31 05:24:20.211635 kubelet[2031]: I1031 05:24:20.211604 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tg9dk\" (UniqueName: \"kubernetes.io/projected/fbf8adc4-a2e4-4d94-8785-945a7c91dfde-kube-api-access-tg9dk\") pod \"kube-proxy-d2n4t\" (UID: \"fbf8adc4-a2e4-4d94-8785-945a7c91dfde\") " pod="kube-system/kube-proxy-d2n4t" Oct 31 05:24:20.327394 kubelet[2031]: I1031 05:24:20.327316 2031 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 31 05:24:20.411155 systemd[1]: Created slice kubepods-besteffort-podceeeb8fc_9ebc_4718_9002_21aa51004bd4.slice. Oct 31 05:24:20.412301 kubelet[2031]: I1031 05:24:20.412251 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ceeeb8fc-9ebc-4718-9002-21aa51004bd4-var-lib-calico\") pod \"tigera-operator-65cdcdfd6d-ll87b\" (UID: \"ceeeb8fc-9ebc-4718-9002-21aa51004bd4\") " pod="tigera-operator/tigera-operator-65cdcdfd6d-ll87b" Oct 31 05:24:20.412458 kubelet[2031]: I1031 05:24:20.412304 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9whxx\" (UniqueName: \"kubernetes.io/projected/ceeeb8fc-9ebc-4718-9002-21aa51004bd4-kube-api-access-9whxx\") pod \"tigera-operator-65cdcdfd6d-ll87b\" (UID: \"ceeeb8fc-9ebc-4718-9002-21aa51004bd4\") " pod="tigera-operator/tigera-operator-65cdcdfd6d-ll87b" Oct 31 05:24:20.420246 kubelet[2031]: E1031 05:24:20.420204 2031 reflector.go:205] "Failed to watch" err="failed to list *v1.ConfigMap: configmaps \"kubernetes-services-endpoint\" is forbidden: User \"system:node:srv-clgmo.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'srv-clgmo.gb1.brightbox.com' and this object" logger="UnhandledError" reflector="object-\"tigera-operator\"/\"kubernetes-services-endpoint\"" type="*v1.ConfigMap" Oct 31 05:24:20.420396 kubelet[2031]: E1031 05:24:20.420306 2031 status_manager.go:1018] "Failed to get status for pod" err="pods \"tigera-operator-65cdcdfd6d-ll87b\" is forbidden: User \"system:node:srv-clgmo.gb1.brightbox.com\" cannot get resource \"pods\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'srv-clgmo.gb1.brightbox.com' and this object" podUID="ceeeb8fc-9ebc-4718-9002-21aa51004bd4" pod="tigera-operator/tigera-operator-65cdcdfd6d-ll87b" Oct 31 05:24:20.420512 kubelet[2031]: E1031 05:24:20.420217 2031 reflector.go:205] "Failed to watch" err="failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:srv-clgmo.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"tigera-operator\": no relationship found between node 'srv-clgmo.gb1.brightbox.com' and this object" logger="UnhandledError" reflector="object-\"tigera-operator\"/\"kube-root-ca.crt\"" type="*v1.ConfigMap" Oct 31 05:24:20.450264 env[1193]: time="2025-10-31T05:24:20.450170550Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d2n4t,Uid:fbf8adc4-a2e4-4d94-8785-945a7c91dfde,Namespace:kube-system,Attempt:0,}" Oct 31 05:24:20.496679 env[1193]: time="2025-10-31T05:24:20.496510805Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:24:20.497001 env[1193]: time="2025-10-31T05:24:20.496647966Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:24:20.497001 env[1193]: time="2025-10-31T05:24:20.496667206Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:24:20.497499 env[1193]: time="2025-10-31T05:24:20.497241944Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f9ca93460be18ab49b42bb77f9c40474f60cc7d625d0ba5fd10ab9de21a587b pid=2096 runtime=io.containerd.runc.v2 Oct 31 05:24:20.551978 systemd[1]: Started cri-containerd-8f9ca93460be18ab49b42bb77f9c40474f60cc7d625d0ba5fd10ab9de21a587b.scope. Oct 31 05:24:20.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.594000 audit: BPF prog-id=103 op=LOAD Oct 31 05:24:20.595000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.595000 audit[2107]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000215c48 a2=10 a3=1c items=0 ppid=2096 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:20.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396361393334363062653138616234396234326262373766396334 Oct 31 05:24:20.595000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.595000 audit[2107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0002156b0 a2=3c a3=c items=0 ppid=2096 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:20.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396361393334363062653138616234396234326262373766396334 Oct 31 05:24:20.595000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.595000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.595000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.595000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.595000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.595000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.595000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.595000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.595000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.595000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.595000 audit: BPF prog-id=104 op=LOAD Oct 31 05:24:20.595000 audit[2107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0002159d8 a2=78 a3=c0002c9ce0 items=0 ppid=2096 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:20.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396361393334363062653138616234396234326262373766396334 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit: BPF prog-id=105 op=LOAD Oct 31 05:24:20.596000 audit[2107]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000215770 a2=78 a3=c0002c9d28 items=0 ppid=2096 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:20.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396361393334363062653138616234396234326262373766396334 Oct 31 05:24:20.596000 audit: BPF prog-id=105 op=UNLOAD Oct 31 05:24:20.596000 audit: BPF prog-id=104 op=UNLOAD Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.596000 audit: BPF prog-id=106 op=LOAD Oct 31 05:24:20.596000 audit[2107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000215c30 a2=78 a3=c0003b4138 items=0 ppid=2096 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:20.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866396361393334363062653138616234396234326262373766396334 Oct 31 05:24:20.616818 env[1193]: time="2025-10-31T05:24:20.616761337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d2n4t,Uid:fbf8adc4-a2e4-4d94-8785-945a7c91dfde,Namespace:kube-system,Attempt:0,} returns sandbox id \"8f9ca93460be18ab49b42bb77f9c40474f60cc7d625d0ba5fd10ab9de21a587b\"" Oct 31 05:24:20.624900 env[1193]: time="2025-10-31T05:24:20.624852133Z" level=info msg="CreateContainer within sandbox \"8f9ca93460be18ab49b42bb77f9c40474f60cc7d625d0ba5fd10ab9de21a587b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 31 05:24:20.643098 env[1193]: time="2025-10-31T05:24:20.643041073Z" level=info msg="CreateContainer within sandbox \"8f9ca93460be18ab49b42bb77f9c40474f60cc7d625d0ba5fd10ab9de21a587b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"70a640fe99f30712702780d3fdc2bf3dc9ca3a9ab30fe47bc4279ba6caf0f619\"" Oct 31 05:24:20.644419 env[1193]: time="2025-10-31T05:24:20.644302544Z" level=info msg="StartContainer for \"70a640fe99f30712702780d3fdc2bf3dc9ca3a9ab30fe47bc4279ba6caf0f619\"" Oct 31 05:24:20.673390 systemd[1]: Started cri-containerd-70a640fe99f30712702780d3fdc2bf3dc9ca3a9ab30fe47bc4279ba6caf0f619.scope. Oct 31 05:24:20.710000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.710000 audit[2139]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f49d36b6c38 items=0 ppid=2096 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:20.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730613634306665393966333037313237303237383064336664633262 Oct 31 05:24:20.710000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.710000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.710000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.710000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.710000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.710000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.710000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.710000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.710000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.710000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.710000 audit: BPF prog-id=107 op=LOAD Oct 31 05:24:20.710000 audit[2139]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000380768 items=0 ppid=2096 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:20.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730613634306665393966333037313237303237383064336664633262 Oct 31 05:24:20.712000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.712000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.712000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.712000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.712000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.712000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.712000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.712000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.712000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.712000 audit: BPF prog-id=108 op=LOAD Oct 31 05:24:20.712000 audit[2139]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003807b8 items=0 ppid=2096 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:20.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730613634306665393966333037313237303237383064336664633262 Oct 31 05:24:20.713000 audit: BPF prog-id=108 op=UNLOAD Oct 31 05:24:20.713000 audit: BPF prog-id=107 op=UNLOAD Oct 31 05:24:20.713000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.713000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.713000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.713000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.713000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.713000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.713000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.713000 audit[2139]: AVC avc: denied { perfmon } for pid=2139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.713000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.713000 audit[2139]: AVC avc: denied { bpf } for pid=2139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:20.713000 audit: BPF prog-id=109 op=LOAD Oct 31 05:24:20.713000 audit[2139]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000380848 items=0 ppid=2096 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:20.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730613634306665393966333037313237303237383064336664633262 Oct 31 05:24:20.737790 env[1193]: time="2025-10-31T05:24:20.737732372Z" level=info msg="StartContainer for \"70a640fe99f30712702780d3fdc2bf3dc9ca3a9ab30fe47bc4279ba6caf0f619\" returns successfully" Oct 31 05:24:21.017000 audit[2085]: USER_AUTH pid=2085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=91.215.85.45 addr=91.215.85.45 terminal=ssh res=failed' Oct 31 05:24:21.017205 sshd[2085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.215.85.45 user=root Oct 31 05:24:21.061219 kubelet[2031]: I1031 05:24:21.061135 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-d2n4t" podStartSLOduration=1.054550005 podStartE2EDuration="1.054550005s" podCreationTimestamp="2025-10-31 05:24:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:24:21.054001443 +0000 UTC m=+4.546735703" watchObservedRunningTime="2025-10-31 05:24:21.054550005 +0000 UTC m=+4.547284259" Oct 31 05:24:21.231000 audit[2201]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.231000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe61469750 a2=0 a3=7ffe6146973c items=0 ppid=2149 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 05:24:21.233000 audit[2200]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.233000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca2f75440 a2=0 a3=7ffca2f7542c items=0 ppid=2149 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 31 05:24:21.236000 audit[2203]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.236000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee5394830 a2=0 a3=7ffee539481c items=0 ppid=2149 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 05:24:21.242000 audit[2205]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.242000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc1a5ce00 a2=0 a3=7ffcc1a5cdec items=0 ppid=2149 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 05:24:21.243000 audit[2206]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.243000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb1955870 a2=0 a3=7ffdb195585c items=0 ppid=2149 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 31 05:24:21.245000 audit[2207]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.245000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe14a41640 a2=0 a3=7ffe14a4162c items=0 ppid=2149 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.245000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 31 05:24:21.325807 env[1193]: time="2025-10-31T05:24:21.325170570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-65cdcdfd6d-ll87b,Uid:ceeeb8fc-9ebc-4718-9002-21aa51004bd4,Namespace:tigera-operator,Attempt:0,}" Oct 31 05:24:21.329000 audit[2209]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.329000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdadbd7e10 a2=0 a3=7ffdadbd7dfc items=0 ppid=2149 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 05:24:21.340000 audit[2211]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.340000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffec083160 a2=0 a3=7fffec08314c items=0 ppid=2149 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73002D Oct 31 05:24:21.337310 systemd[1]: run-containerd-runc-k8s.io-8f9ca93460be18ab49b42bb77f9c40474f60cc7d625d0ba5fd10ab9de21a587b-runc.F99Epm.mount: Deactivated successfully. Oct 31 05:24:21.353000 audit[2215]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.353000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc09cb0ea0 a2=0 a3=7ffc09cb0e8c items=0 ppid=2149 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73 Oct 31 05:24:21.356000 audit[2224]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.356000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8c12e110 a2=0 a3=7fff8c12e0fc items=0 ppid=2149 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 05:24:21.359007 env[1193]: time="2025-10-31T05:24:21.358884939Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:24:21.359212 env[1193]: time="2025-10-31T05:24:21.359156103Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:24:21.359439 env[1193]: time="2025-10-31T05:24:21.359382507Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:24:21.359908 env[1193]: time="2025-10-31T05:24:21.359838868Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fda582a9f4cf984a4971bd0d37d5868ae4cdfa46ef60e1fa0f7960fd1b80d12e pid=2223 runtime=io.containerd.runc.v2 Oct 31 05:24:21.366000 audit[2233]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.366000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd0aafe30 a2=0 a3=7ffdd0aafe1c items=0 ppid=2149 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 05:24:21.370000 audit[2236]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.370000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc5aa1910 a2=0 a3=7ffcc5aa18fc items=0 ppid=2149 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 05:24:21.376000 audit[2244]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.376000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea030c8c0 a2=0 a3=7ffea030c8ac items=0 ppid=2149 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:24:21.386000 audit[2249]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.386000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff59183060 a2=0 a3=7fff5918304c items=0 ppid=2149 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.386000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:24:21.388838 systemd[1]: Started cri-containerd-fda582a9f4cf984a4971bd0d37d5868ae4cdfa46ef60e1fa0f7960fd1b80d12e.scope. Oct 31 05:24:21.395000 audit[2250]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.395000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0cb29f70 a2=0 a3=7ffd0cb29f5c items=0 ppid=2149 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 05:24:21.411000 audit[2252]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.411000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed0110690 a2=0 a3=7ffed011067c items=0 ppid=2149 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 05:24:21.415000 audit[2253]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.415000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb7c10b80 a2=0 a3=7ffcb7c10b6c items=0 ppid=2149 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.415000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 05:24:21.424000 audit[2255]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.424000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd8de7ec30 a2=0 a3=7ffd8de7ec1c items=0 ppid=2149 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F5859 Oct 31 05:24:21.435000 audit[2265]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.435000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd4b349f40 a2=0 a3=7ffd4b349f2c items=0 ppid=2149 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F58 Oct 31 05:24:21.444000 audit[2268]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.444000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd048b310 a2=0 a3=7ffcd048b2fc items=0 ppid=2149 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F Oct 31 05:24:21.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.447000 audit: BPF prog-id=110 op=LOAD Oct 31 05:24:21.447000 audit[2269]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.447000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdb0a954b0 a2=0 a3=7ffdb0a9549c items=0 ppid=2149 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2223 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613538326139663463663938346134393731626430643337643538 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2223 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613538326139663463663938346134393731626430643337643538 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit: BPF prog-id=111 op=LOAD Oct 31 05:24:21.448000 audit[2235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d0bc0 items=0 ppid=2223 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613538326139663463663938346134393731626430643337643538 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit: BPF prog-id=112 op=LOAD Oct 31 05:24:21.448000 audit[2235]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d0c08 items=0 ppid=2223 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613538326139663463663938346134393731626430643337643538 Oct 31 05:24:21.448000 audit: BPF prog-id=112 op=UNLOAD Oct 31 05:24:21.448000 audit: BPF prog-id=111 op=UNLOAD Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { perfmon } for pid=2235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit[2235]: AVC avc: denied { bpf } for pid=2235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:21.448000 audit: BPF prog-id=113 op=LOAD Oct 31 05:24:21.448000 audit[2235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d1018 items=0 ppid=2223 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664613538326139663463663938346134393731626430643337643538 Oct 31 05:24:21.467000 audit[2271]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.467000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd46856ff0 a2=0 a3=7ffd46856fdc items=0 ppid=2149 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:24:21.477000 audit[2274]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.477000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd375d5b90 a2=0 a3=7ffd375d5b7c items=0 ppid=2149 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:24:21.484000 audit[2275]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.485988 kernel: kauditd_printk_skb: 248 callbacks suppressed Oct 31 05:24:21.486089 kernel: audit: type=1325 audit(1761888261.484:886): table=nat:61 family=2 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.484000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffad5d68c0 a2=0 a3=7fffad5d68ac items=0 ppid=2149 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 05:24:21.506545 kernel: audit: type=1300 audit(1761888261.484:886): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffad5d68c0 a2=0 a3=7fffad5d68ac items=0 ppid=2149 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.506758 kernel: audit: type=1327 audit(1761888261.484:886): proctitle=69707461626C6573002D770035002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 05:24:21.518000 audit[2277]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.523478 kernel: audit: type=1325 audit(1761888261.518:887): table=nat:62 family=2 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 31 05:24:21.518000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff8b5780d0 a2=0 a3=7fff8b5780bc items=0 ppid=2149 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.534473 kernel: audit: type=1300 audit(1761888261.518:887): arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff8b5780d0 a2=0 a3=7fff8b5780bc items=0 ppid=2149 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.518000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 05:24:21.541359 kernel: audit: type=1327 audit(1761888261.518:887): proctitle=69707461626C6573002D770035002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 05:24:21.543672 env[1193]: time="2025-10-31T05:24:21.543593137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-65cdcdfd6d-ll87b,Uid:ceeeb8fc-9ebc-4718-9002-21aa51004bd4,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"fda582a9f4cf984a4971bd0d37d5868ae4cdfa46ef60e1fa0f7960fd1b80d12e\"" Oct 31 05:24:21.558156 env[1193]: time="2025-10-31T05:24:21.558102034Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\"" Oct 31 05:24:21.594000 audit[2290]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:21.600642 kernel: audit: type=1325 audit(1761888261.594:888): table=filter:63 family=2 entries=8 op=nft_register_rule pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:21.594000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff706803e0 a2=0 a3=7fff706803cc items=0 ppid=2149 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.609458 kernel: audit: type=1300 audit(1761888261.594:888): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff706803e0 a2=0 a3=7fff706803cc items=0 ppid=2149 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.594000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:21.613435 kernel: audit: type=1327 audit(1761888261.594:888): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:21.620000 audit[2290]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:21.625352 kernel: audit: type=1325 audit(1761888261.620:889): table=nat:64 family=2 entries=14 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:21.620000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff706803e0 a2=0 a3=7fff706803cc items=0 ppid=2149 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.620000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:21.623000 audit[2295]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.623000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe806a2b70 a2=0 a3=7ffe806a2b5c items=0 ppid=2149 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.623000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 31 05:24:21.629000 audit[2297]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.629000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe94b658d0 a2=0 a3=7ffe94b658bc items=0 ppid=2149 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C73 Oct 31 05:24:21.635000 audit[2300]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.635000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe513274b0 a2=0 a3=7ffe5132749c items=0 ppid=2149 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.635000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669636520706F7274616C Oct 31 05:24:21.637000 audit[2301]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.637000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdec7ff4f0 a2=0 a3=7ffdec7ff4dc items=0 ppid=2149 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.637000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 31 05:24:21.642000 audit[2303]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.642000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd3310b70 a2=0 a3=7fffd3310b5c items=0 ppid=2149 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 31 05:24:21.643000 audit[2304]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.643000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6e2e99c0 a2=0 a3=7ffc6e2e99ac items=0 ppid=2149 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D5345525649434553002D740066696C746572 Oct 31 05:24:21.648000 audit[2306]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.648000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff6dd2e910 a2=0 a3=7fff6dd2e8fc items=0 ppid=2149 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:24:21.653000 audit[2309]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.653000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffb7b613c0 a2=0 a3=7fffb7b613ac items=0 ppid=2149 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:24:21.655000 audit[2310]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.655000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1ca01a60 a2=0 a3=7fff1ca01a4c items=0 ppid=2149 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D464F5257415244002D740066696C746572 Oct 31 05:24:21.659000 audit[2312]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.659000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdffc6c310 a2=0 a3=7ffdffc6c2fc items=0 ppid=2149 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 31 05:24:21.661000 audit[2313]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.661000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd35daa190 a2=0 a3=7ffd35daa17c items=0 ppid=2149 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.661000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 31 05:24:21.668000 audit[2315]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.668000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffccf048a40 a2=0 a3=7ffccf048a2c items=0 ppid=2149 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.668000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F58 Oct 31 05:24:21.675000 audit[2318]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.675000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe23b26520 a2=0 a3=7ffe23b2650c items=0 ppid=2149 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D50524F Oct 31 05:24:21.682000 audit[2321]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.682000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcaba39ee0 a2=0 a3=7ffcaba39ecc items=0 ppid=2149 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A004B5542452D5052 Oct 31 05:24:21.684000 audit[2322]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.684000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcfcb87310 a2=0 a3=7ffcfcb872fc items=0 ppid=2149 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D5345525649434553002D74006E6174 Oct 31 05:24:21.688000 audit[2324]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.688000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff3f9096b0 a2=0 a3=7fff3f90969c items=0 ppid=2149 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:24:21.696000 audit[2327]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.696000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd2ee7e620 a2=0 a3=7ffd2ee7e60c items=0 ppid=2149 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.696000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 31 05:24:21.698000 audit[2328]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.698000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb25fe0a0 a2=0 a3=7ffeb25fe08c items=0 ppid=2149 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.698000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 31 05:24:21.704000 audit[2330]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.704000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc80b64940 a2=0 a3=7ffc80b6492c items=0 ppid=2149 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.704000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 31 05:24:21.706000 audit[2331]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.706000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8a939530 a2=0 a3=7ffe8a93951c items=0 ppid=2149 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.706000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 31 05:24:21.710000 audit[2333]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.710000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff90b44400 a2=0 a3=7fff90b443ec items=0 ppid=2149 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.710000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 05:24:21.715000 audit[2336]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 31 05:24:21.715000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff0d435f10 a2=0 a3=7fff0d435efc items=0 ppid=2149 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.715000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 31 05:24:21.720000 audit[2338]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 05:24:21.720000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc99995ac0 a2=0 a3=7ffc99995aac items=0 ppid=2149 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.720000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:21.721000 audit[2338]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 31 05:24:21.721000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc99995ac0 a2=0 a3=7ffc99995aac items=0 ppid=2149 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:21.721000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:22.335820 systemd[1]: run-containerd-runc-k8s.io-fda582a9f4cf984a4971bd0d37d5868ae4cdfa46ef60e1fa0f7960fd1b80d12e-runc.bv179X.mount: Deactivated successfully. Oct 31 05:24:23.024270 sshd[2085]: Failed password for root from 91.215.85.45 port 21730 ssh2 Oct 31 05:24:23.817194 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1092933895.mount: Deactivated successfully. Oct 31 05:24:24.165000 audit[2339]: USER_AUTH pid=2339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=91.215.85.45 addr=91.215.85.45 terminal=ssh res=failed' Oct 31 05:24:25.456821 env[1193]: time="2025-10-31T05:24:25.456678248Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:25.459706 env[1193]: time="2025-10-31T05:24:25.459663508Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:25.461759 env[1193]: time="2025-10-31T05:24:25.461720211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:25.466467 env[1193]: time="2025-10-31T05:24:25.465987324Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:1b629a1403f5b6d7243f7dd523d04b8a50352a33c1d4d6970b6002a8733acf2e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:25.468452 env[1193]: time="2025-10-31T05:24:25.467570462Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\" returns image reference \"sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1\"" Oct 31 05:24:25.476020 env[1193]: time="2025-10-31T05:24:25.475949146Z" level=info msg="CreateContainer within sandbox \"fda582a9f4cf984a4971bd0d37d5868ae4cdfa46ef60e1fa0f7960fd1b80d12e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 31 05:24:25.489649 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3757590704.mount: Deactivated successfully. Oct 31 05:24:25.498263 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount143291617.mount: Deactivated successfully. Oct 31 05:24:25.506167 env[1193]: time="2025-10-31T05:24:25.506102827Z" level=info msg="CreateContainer within sandbox \"fda582a9f4cf984a4971bd0d37d5868ae4cdfa46ef60e1fa0f7960fd1b80d12e\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"b455fee16755b326892e6f6da8dd66a6fd20f10434f19efca066db4b4ab7dcf9\"" Oct 31 05:24:25.507749 env[1193]: time="2025-10-31T05:24:25.507713275Z" level=info msg="StartContainer for \"b455fee16755b326892e6f6da8dd66a6fd20f10434f19efca066db4b4ab7dcf9\"" Oct 31 05:24:25.545038 systemd[1]: Started cri-containerd-b455fee16755b326892e6f6da8dd66a6fd20f10434f19efca066db4b4ab7dcf9.scope. Oct 31 05:24:25.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.580000 audit: BPF prog-id=114 op=LOAD Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2223 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:25.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234353566656531363735356233323638393265366636646138646436 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2223 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:25.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234353566656531363735356233323638393265366636646138646436 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit: BPF prog-id=115 op=LOAD Oct 31 05:24:25.581000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00038d7e0 items=0 ppid=2223 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:25.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234353566656531363735356233323638393265366636646138646436 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.581000 audit: BPF prog-id=116 op=LOAD Oct 31 05:24:25.581000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00038d828 items=0 ppid=2223 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:25.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234353566656531363735356233323638393265366636646138646436 Oct 31 05:24:25.582000 audit: BPF prog-id=116 op=UNLOAD Oct 31 05:24:25.582000 audit: BPF prog-id=115 op=UNLOAD Oct 31 05:24:25.582000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.582000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.582000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.582000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.582000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.582000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.582000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.582000 audit[2347]: AVC avc: denied { perfmon } for pid=2347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.582000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.582000 audit[2347]: AVC avc: denied { bpf } for pid=2347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:25.582000 audit: BPF prog-id=117 op=LOAD Oct 31 05:24:25.582000 audit[2347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00038dc38 items=0 ppid=2223 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:25.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234353566656531363735356233323638393265366636646138646436 Oct 31 05:24:25.612952 env[1193]: time="2025-10-31T05:24:25.612881954Z" level=info msg="StartContainer for \"b455fee16755b326892e6f6da8dd66a6fd20f10434f19efca066db4b4ab7dcf9\" returns successfully" Oct 31 05:24:26.114446 sshd[2085]: PAM: Permission denied for root from 91.215.85.45 Oct 31 05:24:26.657024 sshd[2085]: Connection reset by authenticating user root 91.215.85.45 port 21730 [preauth] Oct 31 05:24:26.659264 systemd[1]: sshd@14-10.230.36.102:22-91.215.85.45:21730.service: Deactivated successfully. Oct 31 05:24:26.661949 kernel: kauditd_printk_skb: 132 callbacks suppressed Oct 31 05:24:26.662083 kernel: audit: type=1131 audit(1761888266.659:933): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.36.102:22-91.215.85.45:21730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:26.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.36.102:22-91.215.85.45:21730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:27.134570 kubelet[2031]: I1031 05:24:27.134435 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-65cdcdfd6d-ll87b" podStartSLOduration=3.219556381 podStartE2EDuration="7.134364809s" podCreationTimestamp="2025-10-31 05:24:20 +0000 UTC" firstStartedPulling="2025-10-31 05:24:21.554635196 +0000 UTC m=+5.047369443" lastFinishedPulling="2025-10-31 05:24:25.469443608 +0000 UTC m=+8.962177871" observedRunningTime="2025-10-31 05:24:26.026535318 +0000 UTC m=+9.519269589" watchObservedRunningTime="2025-10-31 05:24:27.134364809 +0000 UTC m=+10.627099066" Oct 31 05:24:33.129000 audit[1378]: USER_END pid=1378 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:24:33.129913 sudo[1378]: pam_unix(sudo:session): session closed for user root Oct 31 05:24:33.133000 audit[1378]: CRED_DISP pid=1378 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:24:33.145103 kernel: audit: type=1106 audit(1761888273.129:934): pid=1378 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:24:33.145289 kernel: audit: type=1104 audit(1761888273.133:935): pid=1378 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 31 05:24:33.290423 sshd[1372]: pam_unix(sshd:session): session closed for user core Oct 31 05:24:33.307347 kernel: audit: type=1106 audit(1761888273.298:936): pid=1372 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:24:33.298000 audit[1372]: USER_END pid=1372 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:24:33.303182 systemd[1]: sshd@8-10.230.36.102:22-139.178.68.195:58278.service: Deactivated successfully. Oct 31 05:24:33.298000 audit[1372]: CRED_DISP pid=1372 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:24:33.304958 systemd[1]: session-9.scope: Deactivated successfully. Oct 31 05:24:33.305304 systemd[1]: session-9.scope: Consumed 10.417s CPU time. Oct 31 05:24:33.306163 systemd-logind[1187]: Session 9 logged out. Waiting for processes to exit. Oct 31 05:24:33.311114 systemd-logind[1187]: Removed session 9. Oct 31 05:24:33.316604 kernel: audit: type=1104 audit(1761888273.298:937): pid=1372 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:24:33.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.36.102:22-139.178.68.195:58278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:33.326389 kernel: audit: type=1131 audit(1761888273.298:938): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.36.102:22-139.178.68.195:58278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:24:33.619000 audit[2427]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:33.619000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe1d0df560 a2=0 a3=7ffe1d0df54c items=0 ppid=2149 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:33.632605 kernel: audit: type=1325 audit(1761888273.619:939): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:33.632721 kernel: audit: type=1300 audit(1761888273.619:939): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe1d0df560 a2=0 a3=7ffe1d0df54c items=0 ppid=2149 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:33.619000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:33.636000 audit[2427]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:33.647845 kernel: audit: type=1327 audit(1761888273.619:939): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:33.647956 kernel: audit: type=1325 audit(1761888273.636:940): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:33.636000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe1d0df560 a2=0 a3=0 items=0 ppid=2149 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:33.636000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:33.659372 kernel: audit: type=1300 audit(1761888273.636:940): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe1d0df560 a2=0 a3=0 items=0 ppid=2149 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:34.668000 audit[2429]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:34.668000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe5bfcaf60 a2=0 a3=7ffe5bfcaf4c items=0 ppid=2149 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:34.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:34.672000 audit[2429]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:34.672000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe5bfcaf60 a2=0 a3=0 items=0 ppid=2149 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:34.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:38.594000 audit[2434]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:38.596848 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 31 05:24:38.597016 kernel: audit: type=1325 audit(1761888278.594:943): table=filter:93 family=2 entries=17 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:38.594000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff00e6ac30 a2=0 a3=7fff00e6ac1c items=0 ppid=2149 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:38.639369 kernel: audit: type=1300 audit(1761888278.594:943): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff00e6ac30 a2=0 a3=7fff00e6ac1c items=0 ppid=2149 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:38.594000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:38.646406 kernel: audit: type=1327 audit(1761888278.594:943): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:38.654000 audit[2434]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:38.660408 kernel: audit: type=1325 audit(1761888278.654:944): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:38.654000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff00e6ac30 a2=0 a3=0 items=0 ppid=2149 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:38.709419 kernel: audit: type=1300 audit(1761888278.654:944): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff00e6ac30 a2=0 a3=0 items=0 ppid=2149 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:38.654000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:38.714353 kernel: audit: type=1327 audit(1761888278.654:944): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:39.719000 audit[2436]: NETFILTER_CFG table=filter:95 family=2 entries=19 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:39.719000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd33de4860 a2=0 a3=7ffd33de484c items=0 ppid=2149 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:39.735224 kernel: audit: type=1325 audit(1761888279.719:945): table=filter:95 family=2 entries=19 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:39.735792 kernel: audit: type=1300 audit(1761888279.719:945): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd33de4860 a2=0 a3=7ffd33de484c items=0 ppid=2149 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:39.719000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:39.740384 kernel: audit: type=1327 audit(1761888279.719:945): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:39.742000 audit[2436]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:39.747363 kernel: audit: type=1325 audit(1761888279.742:946): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:39.742000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd33de4860 a2=0 a3=0 items=0 ppid=2149 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:39.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:40.124031 kubelet[2031]: E1031 05:24:40.123725 2031 status_manager.go:1018] "Failed to get status for pod" err="pods \"calico-typha-6b68f55d9c-hq6rl\" is forbidden: User \"system:node:srv-clgmo.gb1.brightbox.com\" cannot get resource \"pods\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-clgmo.gb1.brightbox.com' and this object" podUID="27976009-1ec7-4915-b22c-eae9204335c3" pod="calico-system/calico-typha-6b68f55d9c-hq6rl" Oct 31 05:24:40.130557 systemd[1]: Created slice kubepods-besteffort-pod27976009_1ec7_4915_b22c_eae9204335c3.slice. Oct 31 05:24:40.132097 kubelet[2031]: E1031 05:24:40.131266 2031 reflector.go:205] "Failed to watch" err="failed to list *v1.ConfigMap: configmaps \"tigera-ca-bundle\" is forbidden: User \"system:node:srv-clgmo.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-clgmo.gb1.brightbox.com' and this object" logger="UnhandledError" reflector="object-\"calico-system\"/\"tigera-ca-bundle\"" type="*v1.ConfigMap" Oct 31 05:24:40.160198 kubelet[2031]: I1031 05:24:40.160131 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fmhl8\" (UniqueName: \"kubernetes.io/projected/27976009-1ec7-4915-b22c-eae9204335c3-kube-api-access-fmhl8\") pod \"calico-typha-6b68f55d9c-hq6rl\" (UID: \"27976009-1ec7-4915-b22c-eae9204335c3\") " pod="calico-system/calico-typha-6b68f55d9c-hq6rl" Oct 31 05:24:40.160198 kubelet[2031]: I1031 05:24:40.160205 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/27976009-1ec7-4915-b22c-eae9204335c3-tigera-ca-bundle\") pod \"calico-typha-6b68f55d9c-hq6rl\" (UID: \"27976009-1ec7-4915-b22c-eae9204335c3\") " pod="calico-system/calico-typha-6b68f55d9c-hq6rl" Oct 31 05:24:40.160598 kubelet[2031]: I1031 05:24:40.160238 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/27976009-1ec7-4915-b22c-eae9204335c3-typha-certs\") pod \"calico-typha-6b68f55d9c-hq6rl\" (UID: \"27976009-1ec7-4915-b22c-eae9204335c3\") " pod="calico-system/calico-typha-6b68f55d9c-hq6rl" Oct 31 05:24:40.291100 systemd[1]: Created slice kubepods-besteffort-pod1415b22c_de63_43e0_ba69_56910fbd116f.slice. Oct 31 05:24:40.363176 kubelet[2031]: I1031 05:24:40.363048 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1415b22c-de63-43e0-ba69-56910fbd116f-cni-bin-dir\") pod \"calico-node-q86nh\" (UID: \"1415b22c-de63-43e0-ba69-56910fbd116f\") " pod="calico-system/calico-node-q86nh" Oct 31 05:24:40.363679 kubelet[2031]: I1031 05:24:40.363604 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1415b22c-de63-43e0-ba69-56910fbd116f-flexvol-driver-host\") pod \"calico-node-q86nh\" (UID: \"1415b22c-de63-43e0-ba69-56910fbd116f\") " pod="calico-system/calico-node-q86nh" Oct 31 05:24:40.363927 kubelet[2031]: I1031 05:24:40.363859 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1415b22c-de63-43e0-ba69-56910fbd116f-policysync\") pod \"calico-node-q86nh\" (UID: \"1415b22c-de63-43e0-ba69-56910fbd116f\") " pod="calico-system/calico-node-q86nh" Oct 31 05:24:40.364174 kubelet[2031]: I1031 05:24:40.364138 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1415b22c-de63-43e0-ba69-56910fbd116f-cni-log-dir\") pod \"calico-node-q86nh\" (UID: \"1415b22c-de63-43e0-ba69-56910fbd116f\") " pod="calico-system/calico-node-q86nh" Oct 31 05:24:40.364450 kubelet[2031]: I1031 05:24:40.364387 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1415b22c-de63-43e0-ba69-56910fbd116f-var-run-calico\") pod \"calico-node-q86nh\" (UID: \"1415b22c-de63-43e0-ba69-56910fbd116f\") " pod="calico-system/calico-node-q86nh" Oct 31 05:24:40.364658 kubelet[2031]: I1031 05:24:40.364623 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1415b22c-de63-43e0-ba69-56910fbd116f-lib-modules\") pod \"calico-node-q86nh\" (UID: \"1415b22c-de63-43e0-ba69-56910fbd116f\") " pod="calico-system/calico-node-q86nh" Oct 31 05:24:40.364903 kubelet[2031]: I1031 05:24:40.364876 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1415b22c-de63-43e0-ba69-56910fbd116f-cni-net-dir\") pod \"calico-node-q86nh\" (UID: \"1415b22c-de63-43e0-ba69-56910fbd116f\") " pod="calico-system/calico-node-q86nh" Oct 31 05:24:40.365107 kubelet[2031]: I1031 05:24:40.365071 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1415b22c-de63-43e0-ba69-56910fbd116f-xtables-lock\") pod \"calico-node-q86nh\" (UID: \"1415b22c-de63-43e0-ba69-56910fbd116f\") " pod="calico-system/calico-node-q86nh" Oct 31 05:24:40.365359 kubelet[2031]: I1031 05:24:40.365283 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1415b22c-de63-43e0-ba69-56910fbd116f-var-lib-calico\") pod \"calico-node-q86nh\" (UID: \"1415b22c-de63-43e0-ba69-56910fbd116f\") " pod="calico-system/calico-node-q86nh" Oct 31 05:24:40.365591 kubelet[2031]: I1031 05:24:40.365555 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4rllc\" (UniqueName: \"kubernetes.io/projected/1415b22c-de63-43e0-ba69-56910fbd116f-kube-api-access-4rllc\") pod \"calico-node-q86nh\" (UID: \"1415b22c-de63-43e0-ba69-56910fbd116f\") " pod="calico-system/calico-node-q86nh" Oct 31 05:24:40.365821 kubelet[2031]: I1031 05:24:40.365794 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1415b22c-de63-43e0-ba69-56910fbd116f-node-certs\") pod \"calico-node-q86nh\" (UID: \"1415b22c-de63-43e0-ba69-56910fbd116f\") " pod="calico-system/calico-node-q86nh" Oct 31 05:24:40.366060 kubelet[2031]: I1031 05:24:40.365988 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1415b22c-de63-43e0-ba69-56910fbd116f-tigera-ca-bundle\") pod \"calico-node-q86nh\" (UID: \"1415b22c-de63-43e0-ba69-56910fbd116f\") " pod="calico-system/calico-node-q86nh" Oct 31 05:24:40.413961 kubelet[2031]: E1031 05:24:40.413746 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:24:40.466907 kubelet[2031]: I1031 05:24:40.466771 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/a6a56ae4-0d29-4361-8d53-116b2173dd54-registration-dir\") pod \"csi-node-driver-cprzg\" (UID: \"a6a56ae4-0d29-4361-8d53-116b2173dd54\") " pod="calico-system/csi-node-driver-cprzg" Oct 31 05:24:40.467349 kubelet[2031]: I1031 05:24:40.467319 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/a6a56ae4-0d29-4361-8d53-116b2173dd54-socket-dir\") pod \"csi-node-driver-cprzg\" (UID: \"a6a56ae4-0d29-4361-8d53-116b2173dd54\") " pod="calico-system/csi-node-driver-cprzg" Oct 31 05:24:40.468829 kubelet[2031]: I1031 05:24:40.468097 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/a6a56ae4-0d29-4361-8d53-116b2173dd54-kubelet-dir\") pod \"csi-node-driver-cprzg\" (UID: \"a6a56ae4-0d29-4361-8d53-116b2173dd54\") " pod="calico-system/csi-node-driver-cprzg" Oct 31 05:24:40.469036 kubelet[2031]: I1031 05:24:40.468999 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tzv28\" (UniqueName: \"kubernetes.io/projected/a6a56ae4-0d29-4361-8d53-116b2173dd54-kube-api-access-tzv28\") pod \"csi-node-driver-cprzg\" (UID: \"a6a56ae4-0d29-4361-8d53-116b2173dd54\") " pod="calico-system/csi-node-driver-cprzg" Oct 31 05:24:40.469302 kubelet[2031]: I1031 05:24:40.469273 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/a6a56ae4-0d29-4361-8d53-116b2173dd54-varrun\") pod \"csi-node-driver-cprzg\" (UID: \"a6a56ae4-0d29-4361-8d53-116b2173dd54\") " pod="calico-system/csi-node-driver-cprzg" Oct 31 05:24:40.482296 kubelet[2031]: E1031 05:24:40.482199 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.482296 kubelet[2031]: W1031 05:24:40.482247 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.482763 kubelet[2031]: E1031 05:24:40.482308 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.503516 kubelet[2031]: E1031 05:24:40.502253 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.503516 kubelet[2031]: W1031 05:24:40.502300 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.503516 kubelet[2031]: E1031 05:24:40.502370 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.571404 kubelet[2031]: E1031 05:24:40.571314 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.571404 kubelet[2031]: W1031 05:24:40.571372 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.571404 kubelet[2031]: E1031 05:24:40.571408 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.571887 kubelet[2031]: E1031 05:24:40.571745 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.571887 kubelet[2031]: W1031 05:24:40.571760 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.571887 kubelet[2031]: E1031 05:24:40.571776 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.572101 kubelet[2031]: E1031 05:24:40.572084 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.572166 kubelet[2031]: W1031 05:24:40.572103 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.572166 kubelet[2031]: E1031 05:24:40.572119 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.572514 kubelet[2031]: E1031 05:24:40.572486 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.572514 kubelet[2031]: W1031 05:24:40.572508 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.572684 kubelet[2031]: E1031 05:24:40.572524 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.572837 kubelet[2031]: E1031 05:24:40.572811 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.572837 kubelet[2031]: W1031 05:24:40.572833 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.573034 kubelet[2031]: E1031 05:24:40.572849 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.573256 kubelet[2031]: E1031 05:24:40.573231 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.573256 kubelet[2031]: W1031 05:24:40.573253 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.573425 kubelet[2031]: E1031 05:24:40.573270 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.573619 kubelet[2031]: E1031 05:24:40.573584 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.573619 kubelet[2031]: W1031 05:24:40.573603 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.573619 kubelet[2031]: E1031 05:24:40.573620 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.573922 kubelet[2031]: E1031 05:24:40.573896 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.573922 kubelet[2031]: W1031 05:24:40.573916 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.573922 kubelet[2031]: E1031 05:24:40.573932 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.574246 kubelet[2031]: E1031 05:24:40.574223 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.574246 kubelet[2031]: W1031 05:24:40.574242 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.574422 kubelet[2031]: E1031 05:24:40.574257 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.574597 kubelet[2031]: E1031 05:24:40.574573 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.574597 kubelet[2031]: W1031 05:24:40.574592 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.574734 kubelet[2031]: E1031 05:24:40.574608 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.574909 kubelet[2031]: E1031 05:24:40.574873 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.574909 kubelet[2031]: W1031 05:24:40.574894 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.574909 kubelet[2031]: E1031 05:24:40.574910 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.575432 kubelet[2031]: E1031 05:24:40.575181 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.575432 kubelet[2031]: W1031 05:24:40.575200 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.575432 kubelet[2031]: E1031 05:24:40.575216 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.575652 kubelet[2031]: E1031 05:24:40.575516 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.575652 kubelet[2031]: W1031 05:24:40.575531 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.575652 kubelet[2031]: E1031 05:24:40.575547 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.575849 kubelet[2031]: E1031 05:24:40.575773 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.575849 kubelet[2031]: W1031 05:24:40.575788 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.575849 kubelet[2031]: E1031 05:24:40.575801 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.576516 kubelet[2031]: E1031 05:24:40.576058 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.576516 kubelet[2031]: W1031 05:24:40.576074 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.576516 kubelet[2031]: E1031 05:24:40.576088 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.577575 kubelet[2031]: E1031 05:24:40.577432 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.577575 kubelet[2031]: W1031 05:24:40.577481 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.577575 kubelet[2031]: E1031 05:24:40.577500 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.577796 kubelet[2031]: E1031 05:24:40.577756 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.577796 kubelet[2031]: W1031 05:24:40.577770 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.577796 kubelet[2031]: E1031 05:24:40.577784 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.579503 kubelet[2031]: E1031 05:24:40.579468 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.579614 kubelet[2031]: W1031 05:24:40.579516 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.579614 kubelet[2031]: E1031 05:24:40.579537 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.579893 kubelet[2031]: E1031 05:24:40.579870 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.579893 kubelet[2031]: W1031 05:24:40.579890 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.580052 kubelet[2031]: E1031 05:24:40.579918 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.580266 kubelet[2031]: E1031 05:24:40.580229 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.580266 kubelet[2031]: W1031 05:24:40.580248 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.580266 kubelet[2031]: E1031 05:24:40.580262 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.580700 kubelet[2031]: E1031 05:24:40.580671 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.580700 kubelet[2031]: W1031 05:24:40.580690 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.580869 kubelet[2031]: E1031 05:24:40.580706 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.581121 kubelet[2031]: E1031 05:24:40.581096 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.581121 kubelet[2031]: W1031 05:24:40.581116 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.581271 kubelet[2031]: E1031 05:24:40.581134 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.581488 kubelet[2031]: E1031 05:24:40.581445 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.581488 kubelet[2031]: W1031 05:24:40.581475 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.581488 kubelet[2031]: E1031 05:24:40.581493 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.581841 kubelet[2031]: E1031 05:24:40.581807 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.581841 kubelet[2031]: W1031 05:24:40.581826 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.581841 kubelet[2031]: E1031 05:24:40.581842 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.583279 kubelet[2031]: E1031 05:24:40.582611 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.583279 kubelet[2031]: W1031 05:24:40.582633 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.583279 kubelet[2031]: E1031 05:24:40.582649 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.611443 kubelet[2031]: E1031 05:24:40.611368 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:40.611443 kubelet[2031]: W1031 05:24:40.611419 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:40.611691 kubelet[2031]: E1031 05:24:40.611453 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:40.761000 audit[2471]: NETFILTER_CFG table=filter:97 family=2 entries=21 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:40.761000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffdff5518a0 a2=0 a3=7ffdff55188c items=0 ppid=2149 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:40.761000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:40.765000 audit[2471]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:40.765000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdff5518a0 a2=0 a3=0 items=0 ppid=2149 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:40.765000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:41.265928 kubelet[2031]: E1031 05:24:41.265855 2031 configmap.go:193] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Oct 31 05:24:41.266862 kubelet[2031]: E1031 05:24:41.266049 2031 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/27976009-1ec7-4915-b22c-eae9204335c3-tigera-ca-bundle podName:27976009-1ec7-4915-b22c-eae9204335c3 nodeName:}" failed. No retries permitted until 2025-10-31 05:24:41.765983005 +0000 UTC m=+25.258717253 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/27976009-1ec7-4915-b22c-eae9204335c3-tigera-ca-bundle") pod "calico-typha-6b68f55d9c-hq6rl" (UID: "27976009-1ec7-4915-b22c-eae9204335c3") : failed to sync configmap cache: timed out waiting for the condition Oct 31 05:24:41.278252 kubelet[2031]: E1031 05:24:41.278196 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:41.278252 kubelet[2031]: W1031 05:24:41.278232 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:41.278532 kubelet[2031]: E1031 05:24:41.278279 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:41.322986 kubelet[2031]: E1031 05:24:41.322933 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:41.323279 kubelet[2031]: W1031 05:24:41.323239 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:41.323500 kubelet[2031]: E1031 05:24:41.323458 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:41.379935 kubelet[2031]: E1031 05:24:41.379894 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:41.379935 kubelet[2031]: W1031 05:24:41.379924 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:41.380216 kubelet[2031]: E1031 05:24:41.379958 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:41.481562 kubelet[2031]: E1031 05:24:41.481515 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:41.481859 kubelet[2031]: W1031 05:24:41.481827 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:41.482101 kubelet[2031]: E1031 05:24:41.482060 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:41.518690 env[1193]: time="2025-10-31T05:24:41.518474446Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q86nh,Uid:1415b22c-de63-43e0-ba69-56910fbd116f,Namespace:calico-system,Attempt:0,}" Oct 31 05:24:41.549874 env[1193]: time="2025-10-31T05:24:41.549720629Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:24:41.550101 env[1193]: time="2025-10-31T05:24:41.549891461Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:24:41.550101 env[1193]: time="2025-10-31T05:24:41.549952053Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:24:41.550560 env[1193]: time="2025-10-31T05:24:41.550315190Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c9da8c930e6291495875fe9e1cf0053bce8728170c3c9a199699f4e22e20fa3f pid=2483 runtime=io.containerd.runc.v2 Oct 31 05:24:41.592125 systemd[1]: run-containerd-runc-k8s.io-c9da8c930e6291495875fe9e1cf0053bce8728170c3c9a199699f4e22e20fa3f-runc.M3ofit.mount: Deactivated successfully. Oct 31 05:24:41.600935 systemd[1]: Started cri-containerd-c9da8c930e6291495875fe9e1cf0053bce8728170c3c9a199699f4e22e20fa3f.scope. Oct 31 05:24:41.601959 kubelet[2031]: E1031 05:24:41.599689 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:41.601959 kubelet[2031]: W1031 05:24:41.599722 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:41.601959 kubelet[2031]: E1031 05:24:41.599760 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:41.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.637000 audit: BPF prog-id=118 op=LOAD Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2483 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:41.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339646138633933306536323931343935383735666539653163663030 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2483 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:41.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339646138633933306536323931343935383735666539653163663030 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit: BPF prog-id=119 op=LOAD Oct 31 05:24:41.638000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00029ac50 items=0 ppid=2483 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:41.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339646138633933306536323931343935383735666539653163663030 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit: BPF prog-id=120 op=LOAD Oct 31 05:24:41.638000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00029ac98 items=0 ppid=2483 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:41.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339646138633933306536323931343935383735666539653163663030 Oct 31 05:24:41.638000 audit: BPF prog-id=120 op=UNLOAD Oct 31 05:24:41.638000 audit: BPF prog-id=119 op=UNLOAD Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { perfmon } for pid=2492 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit[2492]: AVC avc: denied { bpf } for pid=2492 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:41.638000 audit: BPF prog-id=121 op=LOAD Oct 31 05:24:41.638000 audit[2492]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00029b0a8 items=0 ppid=2483 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:41.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339646138633933306536323931343935383735666539653163663030 Oct 31 05:24:41.673510 env[1193]: time="2025-10-31T05:24:41.672674728Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q86nh,Uid:1415b22c-de63-43e0-ba69-56910fbd116f,Namespace:calico-system,Attempt:0,} returns sandbox id \"c9da8c930e6291495875fe9e1cf0053bce8728170c3c9a199699f4e22e20fa3f\"" Oct 31 05:24:41.679021 env[1193]: time="2025-10-31T05:24:41.678191805Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 31 05:24:41.701369 kubelet[2031]: E1031 05:24:41.701295 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:41.701653 kubelet[2031]: W1031 05:24:41.701623 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:41.701823 kubelet[2031]: E1031 05:24:41.701781 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:41.803365 kubelet[2031]: E1031 05:24:41.803147 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:41.803681 kubelet[2031]: W1031 05:24:41.803650 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:41.803846 kubelet[2031]: E1031 05:24:41.803817 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:41.804395 kubelet[2031]: E1031 05:24:41.804368 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:41.804580 kubelet[2031]: W1031 05:24:41.804553 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:41.804720 kubelet[2031]: E1031 05:24:41.804694 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:41.805127 kubelet[2031]: E1031 05:24:41.805104 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:41.805269 kubelet[2031]: W1031 05:24:41.805234 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:41.805447 kubelet[2031]: E1031 05:24:41.805403 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:41.805830 kubelet[2031]: E1031 05:24:41.805808 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:41.805972 kubelet[2031]: W1031 05:24:41.805946 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:41.806104 kubelet[2031]: E1031 05:24:41.806079 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:41.806578 kubelet[2031]: E1031 05:24:41.806555 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:41.806716 kubelet[2031]: W1031 05:24:41.806690 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:41.806868 kubelet[2031]: E1031 05:24:41.806843 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:41.809106 kubelet[2031]: E1031 05:24:41.809081 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 31 05:24:41.809256 kubelet[2031]: W1031 05:24:41.809223 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 31 05:24:41.809438 kubelet[2031]: E1031 05:24:41.809400 2031 plugins.go:697] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 31 05:24:41.946499 env[1193]: time="2025-10-31T05:24:41.946401557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6b68f55d9c-hq6rl,Uid:27976009-1ec7-4915-b22c-eae9204335c3,Namespace:calico-system,Attempt:0,}" Oct 31 05:24:41.951508 kubelet[2031]: E1031 05:24:41.951404 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:24:41.975751 env[1193]: time="2025-10-31T05:24:41.975623116Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:24:41.976070 env[1193]: time="2025-10-31T05:24:41.976005659Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:24:41.976286 env[1193]: time="2025-10-31T05:24:41.976042165Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:24:41.976943 env[1193]: time="2025-10-31T05:24:41.976845701Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b907eef435be63a7cf25dacb71ad66af2eaa0182391a43fb49138ee64c0aecd pid=2532 runtime=io.containerd.runc.v2 Oct 31 05:24:42.007060 systemd[1]: Started cri-containerd-3b907eef435be63a7cf25dacb71ad66af2eaa0182391a43fb49138ee64c0aecd.scope. Oct 31 05:24:42.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.037000 audit: BPF prog-id=122 op=LOAD Oct 31 05:24:42.039000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.039000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2532 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:42.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393037656566343335626536336137636632356461636237316164 Oct 31 05:24:42.039000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.039000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2532 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:42.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393037656566343335626536336137636632356461636237316164 Oct 31 05:24:42.040000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.040000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.040000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.040000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.040000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.040000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.040000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.040000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.040000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.040000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.040000 audit: BPF prog-id=123 op=LOAD Oct 31 05:24:42.040000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038aa30 items=0 ppid=2532 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:42.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393037656566343335626536336137636632356461636237316164 Oct 31 05:24:42.042000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.042000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.042000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.042000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.042000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.042000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.042000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.042000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.042000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.042000 audit: BPF prog-id=124 op=LOAD Oct 31 05:24:42.042000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038aa78 items=0 ppid=2532 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:42.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393037656566343335626536336137636632356461636237316164 Oct 31 05:24:42.043000 audit: BPF prog-id=124 op=UNLOAD Oct 31 05:24:42.043000 audit: BPF prog-id=123 op=UNLOAD Oct 31 05:24:42.043000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.043000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.043000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.043000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.043000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.043000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.043000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.043000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.043000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.043000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:42.043000 audit: BPF prog-id=125 op=LOAD Oct 31 05:24:42.043000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038ae88 items=0 ppid=2532 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:42.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393037656566343335626536336137636632356461636237316164 Oct 31 05:24:42.109695 env[1193]: time="2025-10-31T05:24:42.109546755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6b68f55d9c-hq6rl,Uid:27976009-1ec7-4915-b22c-eae9204335c3,Namespace:calico-system,Attempt:0,} returns sandbox id \"3b907eef435be63a7cf25dacb71ad66af2eaa0182391a43fb49138ee64c0aecd\"" Oct 31 05:24:43.115778 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3221697962.mount: Deactivated successfully. Oct 31 05:24:43.315984 env[1193]: time="2025-10-31T05:24:43.315921640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:43.317862 env[1193]: time="2025-10-31T05:24:43.317827864Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:43.320146 env[1193]: time="2025-10-31T05:24:43.320040669Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:43.322056 env[1193]: time="2025-10-31T05:24:43.322019951Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:43.323049 env[1193]: time="2025-10-31T05:24:43.323008332Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 31 05:24:43.328478 env[1193]: time="2025-10-31T05:24:43.326812426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\"" Oct 31 05:24:43.329575 env[1193]: time="2025-10-31T05:24:43.329525075Z" level=info msg="CreateContainer within sandbox \"c9da8c930e6291495875fe9e1cf0053bce8728170c3c9a199699f4e22e20fa3f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 31 05:24:43.349085 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3555930426.mount: Deactivated successfully. Oct 31 05:24:43.354852 env[1193]: time="2025-10-31T05:24:43.354805001Z" level=info msg="CreateContainer within sandbox \"c9da8c930e6291495875fe9e1cf0053bce8728170c3c9a199699f4e22e20fa3f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"afde23d04115c5130dec96ffc89c674e40a463f7dfda9f716cb7a59e2c7de4dc\"" Oct 31 05:24:43.356925 env[1193]: time="2025-10-31T05:24:43.356857326Z" level=info msg="StartContainer for \"afde23d04115c5130dec96ffc89c674e40a463f7dfda9f716cb7a59e2c7de4dc\"" Oct 31 05:24:43.391904 systemd[1]: Started cri-containerd-afde23d04115c5130dec96ffc89c674e40a463f7dfda9f716cb7a59e2c7de4dc.scope. Oct 31 05:24:43.444000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.444000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f34c0931b48 items=0 ppid=2483 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:43.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166646532336430343131356335313330646563393666666338396336 Oct 31 05:24:43.444000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.444000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.444000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.444000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.444000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.444000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.444000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.444000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.444000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.444000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.444000 audit: BPF prog-id=126 op=LOAD Oct 31 05:24:43.444000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a8328 items=0 ppid=2483 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:43.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166646532336430343131356335313330646563393666666338396336 Oct 31 05:24:43.446000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.446000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.446000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.446000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.446000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.446000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.446000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.446000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.446000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.446000 audit: BPF prog-id=127 op=LOAD Oct 31 05:24:43.446000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a8378 items=0 ppid=2483 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:43.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166646532336430343131356335313330646563393666666338396336 Oct 31 05:24:43.447000 audit: BPF prog-id=127 op=UNLOAD Oct 31 05:24:43.447000 audit: BPF prog-id=126 op=UNLOAD Oct 31 05:24:43.447000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.447000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.447000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.447000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.447000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.447000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.447000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.447000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.447000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.447000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:43.447000 audit: BPF prog-id=128 op=LOAD Oct 31 05:24:43.447000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a8408 items=0 ppid=2483 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:43.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166646532336430343131356335313330646563393666666338396336 Oct 31 05:24:43.475777 env[1193]: time="2025-10-31T05:24:43.475699753Z" level=info msg="StartContainer for \"afde23d04115c5130dec96ffc89c674e40a463f7dfda9f716cb7a59e2c7de4dc\" returns successfully" Oct 31 05:24:43.509928 systemd[1]: cri-containerd-afde23d04115c5130dec96ffc89c674e40a463f7dfda9f716cb7a59e2c7de4dc.scope: Deactivated successfully. Oct 31 05:24:43.514000 audit: BPF prog-id=128 op=UNLOAD Oct 31 05:24:43.548415 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-afde23d04115c5130dec96ffc89c674e40a463f7dfda9f716cb7a59e2c7de4dc-rootfs.mount: Deactivated successfully. Oct 31 05:24:43.601687 env[1193]: time="2025-10-31T05:24:43.601604076Z" level=info msg="shim disconnected" id=afde23d04115c5130dec96ffc89c674e40a463f7dfda9f716cb7a59e2c7de4dc Oct 31 05:24:43.601939 env[1193]: time="2025-10-31T05:24:43.601699782Z" level=warning msg="cleaning up after shim disconnected" id=afde23d04115c5130dec96ffc89c674e40a463f7dfda9f716cb7a59e2c7de4dc namespace=k8s.io Oct 31 05:24:43.601939 env[1193]: time="2025-10-31T05:24:43.601719706Z" level=info msg="cleaning up dead shim" Oct 31 05:24:43.614536 env[1193]: time="2025-10-31T05:24:43.614481855Z" level=warning msg="cleanup warnings time=\"2025-10-31T05:24:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2615 runtime=io.containerd.runc.v2\n" Oct 31 05:24:43.951028 kubelet[2031]: E1031 05:24:43.950948 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:24:45.951003 kubelet[2031]: E1031 05:24:45.950883 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:24:47.503892 env[1193]: time="2025-10-31T05:24:47.503778417Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:47.508986 env[1193]: time="2025-10-31T05:24:47.508947662Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:47.512250 env[1193]: time="2025-10-31T05:24:47.512209777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:47.515530 env[1193]: time="2025-10-31T05:24:47.515491088Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:6f437220b5b3c627fb4a0fc8dc323363101f3c22a8f337612c2a1ddfb73b810c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:47.516787 env[1193]: time="2025-10-31T05:24:47.516731598Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\" returns image reference \"sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958\"" Oct 31 05:24:47.520408 env[1193]: time="2025-10-31T05:24:47.520370519Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 31 05:24:47.553412 env[1193]: time="2025-10-31T05:24:47.553004727Z" level=info msg="CreateContainer within sandbox \"3b907eef435be63a7cf25dacb71ad66af2eaa0182391a43fb49138ee64c0aecd\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 31 05:24:47.572972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount209323675.mount: Deactivated successfully. Oct 31 05:24:47.577111 env[1193]: time="2025-10-31T05:24:47.577054810Z" level=info msg="CreateContainer within sandbox \"3b907eef435be63a7cf25dacb71ad66af2eaa0182391a43fb49138ee64c0aecd\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"8e15f34da92adf3ede93de3b4aa7cfa6e7e926bc226157871e25c53f432bc78b\"" Oct 31 05:24:47.578143 env[1193]: time="2025-10-31T05:24:47.578107812Z" level=info msg="StartContainer for \"8e15f34da92adf3ede93de3b4aa7cfa6e7e926bc226157871e25c53f432bc78b\"" Oct 31 05:24:47.639647 systemd[1]: Started cri-containerd-8e15f34da92adf3ede93de3b4aa7cfa6e7e926bc226157871e25c53f432bc78b.scope. Oct 31 05:24:47.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.677827 kernel: kauditd_printk_skb: 166 callbacks suppressed Oct 31 05:24:47.677989 kernel: audit: type=1400 audit(1761888287.671:992): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.688444 kernel: audit: type=1400 audit(1761888287.671:993): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.688582 kernel: audit: type=1400 audit(1761888287.676:994): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.693606 kernel: audit: type=1400 audit(1761888287.676:995): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.698898 kernel: audit: type=1400 audit(1761888287.676:996): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.704076 kernel: audit: type=1400 audit(1761888287.676:997): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.709154 kernel: audit: type=1400 audit(1761888287.676:998): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.717385 kernel: audit: type=1400 audit(1761888287.676:999): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.724398 kernel: audit: type=1400 audit(1761888287.676:1000): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.724831 kernel: audit: type=1400 audit(1761888287.692:1001): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit: BPF prog-id=129 op=LOAD Oct 31 05:24:47.692000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2532 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:47.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865313566333464613932616466336564653933646533623461613763 Oct 31 05:24:47.692000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2532 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:47.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865313566333464613932616466336564653933646533623461613763 Oct 31 05:24:47.692000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.692000 audit: BPF prog-id=130 op=LOAD Oct 31 05:24:47.692000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cbd00 items=0 ppid=2532 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:47.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865313566333464613932616466336564653933646533623461613763 Oct 31 05:24:47.707000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.707000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.707000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.707000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.707000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.707000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.707000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.707000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.707000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.707000 audit: BPF prog-id=131 op=LOAD Oct 31 05:24:47.707000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002cbd48 items=0 ppid=2532 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:47.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865313566333464613932616466336564653933646533623461613763 Oct 31 05:24:47.737000 audit: BPF prog-id=131 op=UNLOAD Oct 31 05:24:47.738000 audit: BPF prog-id=130 op=UNLOAD Oct 31 05:24:47.738000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.738000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.738000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.738000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.738000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.738000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.738000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.738000 audit[2642]: AVC avc: denied { perfmon } for pid=2642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.738000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.738000 audit[2642]: AVC avc: denied { bpf } for pid=2642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:47.738000 audit: BPF prog-id=132 op=LOAD Oct 31 05:24:47.738000 audit[2642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ba158 items=0 ppid=2532 pid=2642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:47.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865313566333464613932616466336564653933646533623461613763 Oct 31 05:24:47.794875 env[1193]: time="2025-10-31T05:24:47.791998237Z" level=info msg="StartContainer for \"8e15f34da92adf3ede93de3b4aa7cfa6e7e926bc226157871e25c53f432bc78b\" returns successfully" Oct 31 05:24:47.950933 kubelet[2031]: E1031 05:24:47.950850 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:24:49.154698 kubelet[2031]: I1031 05:24:49.154535 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6b68f55d9c-hq6rl" podStartSLOduration=3.747419382 podStartE2EDuration="9.15445143s" podCreationTimestamp="2025-10-31 05:24:40 +0000 UTC" firstStartedPulling="2025-10-31 05:24:42.111885907 +0000 UTC m=+25.604620155" lastFinishedPulling="2025-10-31 05:24:47.518917961 +0000 UTC m=+31.011652203" observedRunningTime="2025-10-31 05:24:48.22910009 +0000 UTC m=+31.721834345" watchObservedRunningTime="2025-10-31 05:24:49.15445143 +0000 UTC m=+32.647185692" Oct 31 05:24:49.337000 audit[2674]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:49.337000 audit[2674]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffdbc95f40 a2=0 a3=7fffdbc95f2c items=0 ppid=2149 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:49.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:49.343000 audit[2674]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2674 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:24:49.343000 audit[2674]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fffdbc95f40 a2=0 a3=7fffdbc95f2c items=0 ppid=2149 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:49.343000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:24:49.950989 kubelet[2031]: E1031 05:24:49.950882 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:24:51.951487 kubelet[2031]: E1031 05:24:51.951405 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:24:53.137396 env[1193]: time="2025-10-31T05:24:53.137310129Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:53.139424 env[1193]: time="2025-10-31T05:24:53.139383086Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:53.141577 env[1193]: time="2025-10-31T05:24:53.141538989Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:53.143546 env[1193]: time="2025-10-31T05:24:53.143509344Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:24:53.144573 env[1193]: time="2025-10-31T05:24:53.144533853Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 31 05:24:53.152651 env[1193]: time="2025-10-31T05:24:53.152603288Z" level=info msg="CreateContainer within sandbox \"c9da8c930e6291495875fe9e1cf0053bce8728170c3c9a199699f4e22e20fa3f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 31 05:24:53.179649 env[1193]: time="2025-10-31T05:24:53.179581407Z" level=info msg="CreateContainer within sandbox \"c9da8c930e6291495875fe9e1cf0053bce8728170c3c9a199699f4e22e20fa3f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"47a7c97b61f1bb59e1959195e4ca6e2b4f68cd97dfce8a51961da1243a802ae0\"" Oct 31 05:24:53.183277 env[1193]: time="2025-10-31T05:24:53.183181622Z" level=info msg="StartContainer for \"47a7c97b61f1bb59e1959195e4ca6e2b4f68cd97dfce8a51961da1243a802ae0\"" Oct 31 05:24:53.231747 systemd[1]: Started cri-containerd-47a7c97b61f1bb59e1959195e4ca6e2b4f68cd97dfce8a51961da1243a802ae0.scope. Oct 31 05:24:53.270000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.273452 kernel: kauditd_printk_skb: 53 callbacks suppressed Oct 31 05:24:53.273553 kernel: audit: type=1400 audit(1761888293.270:1012): avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.270000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd94c3afa98 items=0 ppid=2483 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:53.299835 kernel: audit: type=1300 audit(1761888293.270:1012): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd94c3afa98 items=0 ppid=2483 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:53.299960 kernel: audit: type=1327 audit(1761888293.270:1012): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437613763393762363166316262353965313935393139356534636136 Oct 31 05:24:53.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437613763393762363166316262353965313935393139356534636136 Oct 31 05:24:53.311588 kernel: audit: type=1400 audit(1761888293.272:1013): avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.272000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.317069 kernel: audit: type=1400 audit(1761888293.272:1013): avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.272000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.322171 kernel: audit: type=1400 audit(1761888293.272:1013): avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.272000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.272000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.272000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.332529 kernel: audit: type=1400 audit(1761888293.272:1013): avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.332634 kernel: audit: type=1400 audit(1761888293.272:1013): avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.272000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.339442 kernel: audit: type=1400 audit(1761888293.272:1013): avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.272000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.272000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.272000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.346497 kernel: audit: type=1400 audit(1761888293.272:1013): avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.272000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.272000 audit: BPF prog-id=133 op=LOAD Oct 31 05:24:53.272000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002fc1c8 items=0 ppid=2483 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:53.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437613763393762363166316262353965313935393139356534636136 Oct 31 05:24:53.277000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.277000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.277000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.277000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.277000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.277000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.277000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.277000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.277000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.277000 audit: BPF prog-id=134 op=LOAD Oct 31 05:24:53.277000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002fc218 items=0 ppid=2483 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:53.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437613763393762363166316262353965313935393139356534636136 Oct 31 05:24:53.305000 audit: BPF prog-id=134 op=UNLOAD Oct 31 05:24:53.305000 audit: BPF prog-id=133 op=UNLOAD Oct 31 05:24:53.305000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.305000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.305000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.305000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.305000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.305000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.305000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.305000 audit[2685]: AVC avc: denied { perfmon } for pid=2685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.305000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.305000 audit[2685]: AVC avc: denied { bpf } for pid=2685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:24:53.305000 audit: BPF prog-id=135 op=LOAD Oct 31 05:24:53.305000 audit[2685]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002fc2a8 items=0 ppid=2483 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:24:53.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437613763393762363166316262353965313935393139356534636136 Oct 31 05:24:53.359365 env[1193]: time="2025-10-31T05:24:53.358972893Z" level=info msg="StartContainer for \"47a7c97b61f1bb59e1959195e4ca6e2b4f68cd97dfce8a51961da1243a802ae0\" returns successfully" Oct 31 05:24:53.950645 kubelet[2031]: E1031 05:24:53.950525 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:24:54.557909 env[1193]: time="2025-10-31T05:24:54.557504297Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 31 05:24:54.561198 systemd[1]: cri-containerd-47a7c97b61f1bb59e1959195e4ca6e2b4f68cd97dfce8a51961da1243a802ae0.scope: Deactivated successfully. Oct 31 05:24:54.566000 audit: BPF prog-id=135 op=UNLOAD Oct 31 05:24:54.597128 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-47a7c97b61f1bb59e1959195e4ca6e2b4f68cd97dfce8a51961da1243a802ae0-rootfs.mount: Deactivated successfully. Oct 31 05:24:54.603781 env[1193]: time="2025-10-31T05:24:54.603699039Z" level=info msg="shim disconnected" id=47a7c97b61f1bb59e1959195e4ca6e2b4f68cd97dfce8a51961da1243a802ae0 Oct 31 05:24:54.605567 env[1193]: time="2025-10-31T05:24:54.604066294Z" level=warning msg="cleaning up after shim disconnected" id=47a7c97b61f1bb59e1959195e4ca6e2b4f68cd97dfce8a51961da1243a802ae0 namespace=k8s.io Oct 31 05:24:54.605821 env[1193]: time="2025-10-31T05:24:54.605752912Z" level=info msg="cleaning up dead shim" Oct 31 05:24:54.606814 kubelet[2031]: I1031 05:24:54.606774 2031 kubelet_node_status.go:439] "Fast updating node status as it just became ready" Oct 31 05:24:54.629722 env[1193]: time="2025-10-31T05:24:54.629655678Z" level=warning msg="cleanup warnings time=\"2025-10-31T05:24:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2726 runtime=io.containerd.runc.v2\n" Oct 31 05:24:54.673976 systemd[1]: Created slice kubepods-burstable-podd9c3f104_ec6e_4a81_b201_05d6bbc995ee.slice. Oct 31 05:24:54.689792 systemd[1]: Created slice kubepods-besteffort-pod440bdb2f_ff72_44c2_b0bc_e953f311f252.slice. Oct 31 05:24:54.711557 systemd[1]: Created slice kubepods-besteffort-pod81bbb4a4_a415_4abc_a7fd_1a75817e45aa.slice. Oct 31 05:24:54.727491 systemd[1]: Created slice kubepods-burstable-pod0c9303bc_5dc8_420a_b98f_17f88112d207.slice. Oct 31 05:24:54.738423 systemd[1]: Created slice kubepods-besteffort-pod37d2878f_048f_4de4_a194_8da4edc34c5c.slice. Oct 31 05:24:54.749876 systemd[1]: Created slice kubepods-besteffort-podf505ca8a_1440_4ca4_ac04_92eb3b2080ce.slice. Oct 31 05:24:54.762357 systemd[1]: Created slice kubepods-besteffort-podbc04009c_ce79_4cda_91a6_dd78e1ed2ba7.slice. Oct 31 05:24:54.821532 kubelet[2031]: I1031 05:24:54.821380 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f5l77\" (UniqueName: \"kubernetes.io/projected/37d2878f-048f-4de4-a194-8da4edc34c5c-kube-api-access-f5l77\") pod \"whisker-6566988f9b-tzkgd\" (UID: \"37d2878f-048f-4de4-a194-8da4edc34c5c\") " pod="calico-system/whisker-6566988f9b-tzkgd" Oct 31 05:24:54.824062 kubelet[2031]: I1031 05:24:54.824018 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/bc04009c-ce79-4cda-91a6-dd78e1ed2ba7-goldmane-key-pair\") pod \"goldmane-7c778bb748-4spgj\" (UID: \"bc04009c-ce79-4cda-91a6-dd78e1ed2ba7\") " pod="calico-system/goldmane-7c778bb748-4spgj" Oct 31 05:24:54.824241 kubelet[2031]: I1031 05:24:54.824212 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-thmvf\" (UniqueName: \"kubernetes.io/projected/bc04009c-ce79-4cda-91a6-dd78e1ed2ba7-kube-api-access-thmvf\") pod \"goldmane-7c778bb748-4spgj\" (UID: \"bc04009c-ce79-4cda-91a6-dd78e1ed2ba7\") " pod="calico-system/goldmane-7c778bb748-4spgj" Oct 31 05:24:54.824453 kubelet[2031]: I1031 05:24:54.824411 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/37d2878f-048f-4de4-a194-8da4edc34c5c-whisker-ca-bundle\") pod \"whisker-6566988f9b-tzkgd\" (UID: \"37d2878f-048f-4de4-a194-8da4edc34c5c\") " pod="calico-system/whisker-6566988f9b-tzkgd" Oct 31 05:24:54.824650 kubelet[2031]: I1031 05:24:54.824602 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c7l29\" (UniqueName: \"kubernetes.io/projected/440bdb2f-ff72-44c2-b0bc-e953f311f252-kube-api-access-c7l29\") pod \"calico-kube-controllers-65f7799b87-47jbs\" (UID: \"440bdb2f-ff72-44c2-b0bc-e953f311f252\") " pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" Oct 31 05:24:54.824832 kubelet[2031]: I1031 05:24:54.824803 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0c9303bc-5dc8-420a-b98f-17f88112d207-config-volume\") pod \"coredns-66bc5c9577-4k4fh\" (UID: \"0c9303bc-5dc8-420a-b98f-17f88112d207\") " pod="kube-system/coredns-66bc5c9577-4k4fh" Oct 31 05:24:54.824993 kubelet[2031]: I1031 05:24:54.824964 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/37d2878f-048f-4de4-a194-8da4edc34c5c-whisker-backend-key-pair\") pod \"whisker-6566988f9b-tzkgd\" (UID: \"37d2878f-048f-4de4-a194-8da4edc34c5c\") " pod="calico-system/whisker-6566988f9b-tzkgd" Oct 31 05:24:54.825167 kubelet[2031]: I1031 05:24:54.825140 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d9c3f104-ec6e-4a81-b201-05d6bbc995ee-config-volume\") pod \"coredns-66bc5c9577-ngmnt\" (UID: \"d9c3f104-ec6e-4a81-b201-05d6bbc995ee\") " pod="kube-system/coredns-66bc5c9577-ngmnt" Oct 31 05:24:54.825317 kubelet[2031]: I1031 05:24:54.825291 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fbnlq\" (UniqueName: \"kubernetes.io/projected/d9c3f104-ec6e-4a81-b201-05d6bbc995ee-kube-api-access-fbnlq\") pod \"coredns-66bc5c9577-ngmnt\" (UID: \"d9c3f104-ec6e-4a81-b201-05d6bbc995ee\") " pod="kube-system/coredns-66bc5c9577-ngmnt" Oct 31 05:24:54.825497 kubelet[2031]: I1031 05:24:54.825471 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9k5fr\" (UniqueName: \"kubernetes.io/projected/81bbb4a4-a415-4abc-a7fd-1a75817e45aa-kube-api-access-9k5fr\") pod \"calico-apiserver-5cc6545496-bzmv2\" (UID: \"81bbb4a4-a415-4abc-a7fd-1a75817e45aa\") " pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" Oct 31 05:24:54.825667 kubelet[2031]: I1031 05:24:54.825629 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4f47s\" (UniqueName: \"kubernetes.io/projected/0c9303bc-5dc8-420a-b98f-17f88112d207-kube-api-access-4f47s\") pod \"coredns-66bc5c9577-4k4fh\" (UID: \"0c9303bc-5dc8-420a-b98f-17f88112d207\") " pod="kube-system/coredns-66bc5c9577-4k4fh" Oct 31 05:24:54.825874 kubelet[2031]: I1031 05:24:54.825826 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/81bbb4a4-a415-4abc-a7fd-1a75817e45aa-calico-apiserver-certs\") pod \"calico-apiserver-5cc6545496-bzmv2\" (UID: \"81bbb4a4-a415-4abc-a7fd-1a75817e45aa\") " pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" Oct 31 05:24:54.826045 kubelet[2031]: I1031 05:24:54.826008 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-q9l8k\" (UniqueName: \"kubernetes.io/projected/f505ca8a-1440-4ca4-ac04-92eb3b2080ce-kube-api-access-q9l8k\") pod \"calico-apiserver-5cc6545496-7xfb2\" (UID: \"f505ca8a-1440-4ca4-ac04-92eb3b2080ce\") " pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" Oct 31 05:24:54.826311 kubelet[2031]: I1031 05:24:54.826283 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/bc04009c-ce79-4cda-91a6-dd78e1ed2ba7-config\") pod \"goldmane-7c778bb748-4spgj\" (UID: \"bc04009c-ce79-4cda-91a6-dd78e1ed2ba7\") " pod="calico-system/goldmane-7c778bb748-4spgj" Oct 31 05:24:54.826496 kubelet[2031]: I1031 05:24:54.826468 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/bc04009c-ce79-4cda-91a6-dd78e1ed2ba7-goldmane-ca-bundle\") pod \"goldmane-7c778bb748-4spgj\" (UID: \"bc04009c-ce79-4cda-91a6-dd78e1ed2ba7\") " pod="calico-system/goldmane-7c778bb748-4spgj" Oct 31 05:24:54.826687 kubelet[2031]: I1031 05:24:54.826656 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/440bdb2f-ff72-44c2-b0bc-e953f311f252-tigera-ca-bundle\") pod \"calico-kube-controllers-65f7799b87-47jbs\" (UID: \"440bdb2f-ff72-44c2-b0bc-e953f311f252\") " pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" Oct 31 05:24:54.826853 kubelet[2031]: I1031 05:24:54.826825 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f505ca8a-1440-4ca4-ac04-92eb3b2080ce-calico-apiserver-certs\") pod \"calico-apiserver-5cc6545496-7xfb2\" (UID: \"f505ca8a-1440-4ca4-ac04-92eb3b2080ce\") " pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" Oct 31 05:24:55.015371 env[1193]: time="2025-10-31T05:24:55.014906815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65f7799b87-47jbs,Uid:440bdb2f-ff72-44c2-b0bc-e953f311f252,Namespace:calico-system,Attempt:0,}" Oct 31 05:24:55.026303 env[1193]: time="2025-10-31T05:24:55.026257112Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cc6545496-bzmv2,Uid:81bbb4a4-a415-4abc-a7fd-1a75817e45aa,Namespace:calico-apiserver,Attempt:0,}" Oct 31 05:24:55.041829 env[1193]: time="2025-10-31T05:24:55.041759817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-66bc5c9577-4k4fh,Uid:0c9303bc-5dc8-420a-b98f-17f88112d207,Namespace:kube-system,Attempt:0,}" Oct 31 05:24:55.046039 env[1193]: time="2025-10-31T05:24:55.045998899Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6566988f9b-tzkgd,Uid:37d2878f-048f-4de4-a194-8da4edc34c5c,Namespace:calico-system,Attempt:0,}" Oct 31 05:24:55.064687 env[1193]: time="2025-10-31T05:24:55.064622163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cc6545496-7xfb2,Uid:f505ca8a-1440-4ca4-ac04-92eb3b2080ce,Namespace:calico-apiserver,Attempt:0,}" Oct 31 05:24:55.069745 env[1193]: time="2025-10-31T05:24:55.069690920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-7c778bb748-4spgj,Uid:bc04009c-ce79-4cda-91a6-dd78e1ed2ba7,Namespace:calico-system,Attempt:0,}" Oct 31 05:24:55.216008 env[1193]: time="2025-10-31T05:24:55.215585933Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 31 05:24:55.289242 env[1193]: time="2025-10-31T05:24:55.289182540Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-66bc5c9577-ngmnt,Uid:d9c3f104-ec6e-4a81-b201-05d6bbc995ee,Namespace:kube-system,Attempt:0,}" Oct 31 05:24:55.446492 env[1193]: time="2025-10-31T05:24:55.446265874Z" level=error msg="Failed to destroy network for sandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.447356 env[1193]: time="2025-10-31T05:24:55.447296416Z" level=error msg="encountered an error cleaning up failed sandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.447622 env[1193]: time="2025-10-31T05:24:55.447565319Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cc6545496-7xfb2,Uid:f505ca8a-1440-4ca4-ac04-92eb3b2080ce,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.448277 kubelet[2031]: E1031 05:24:55.448208 2031 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.450021 kubelet[2031]: E1031 05:24:55.449844 2031 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" Oct 31 05:24:55.450021 kubelet[2031]: E1031 05:24:55.449895 2031 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" Oct 31 05:24:55.452157 kubelet[2031]: E1031 05:24:55.450021 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5cc6545496-7xfb2_calico-apiserver(f505ca8a-1440-4ca4-ac04-92eb3b2080ce)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5cc6545496-7xfb2_calico-apiserver(f505ca8a-1440-4ca4-ac04-92eb3b2080ce)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" podUID="f505ca8a-1440-4ca4-ac04-92eb3b2080ce" Oct 31 05:24:55.453072 env[1193]: time="2025-10-31T05:24:55.453013656Z" level=error msg="Failed to destroy network for sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.453874 env[1193]: time="2025-10-31T05:24:55.453821073Z" level=error msg="encountered an error cleaning up failed sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.454865 env[1193]: time="2025-10-31T05:24:55.454785258Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6566988f9b-tzkgd,Uid:37d2878f-048f-4de4-a194-8da4edc34c5c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.455286 kubelet[2031]: E1031 05:24:55.455228 2031 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.455389 kubelet[2031]: E1031 05:24:55.455285 2031 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6566988f9b-tzkgd" Oct 31 05:24:55.455389 kubelet[2031]: E1031 05:24:55.455314 2031 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6566988f9b-tzkgd" Oct 31 05:24:55.455544 kubelet[2031]: E1031 05:24:55.455386 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-6566988f9b-tzkgd_calico-system(37d2878f-048f-4de4-a194-8da4edc34c5c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-6566988f9b-tzkgd_calico-system(37d2878f-048f-4de4-a194-8da4edc34c5c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6566988f9b-tzkgd" podUID="37d2878f-048f-4de4-a194-8da4edc34c5c" Oct 31 05:24:55.502013 env[1193]: time="2025-10-31T05:24:55.501851550Z" level=error msg="Failed to destroy network for sandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.502887 env[1193]: time="2025-10-31T05:24:55.502754552Z" level=error msg="encountered an error cleaning up failed sandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.503130 env[1193]: time="2025-10-31T05:24:55.503064697Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65f7799b87-47jbs,Uid:440bdb2f-ff72-44c2-b0bc-e953f311f252,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.503812 kubelet[2031]: E1031 05:24:55.503747 2031 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.503942 kubelet[2031]: E1031 05:24:55.503845 2031 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" Oct 31 05:24:55.503942 kubelet[2031]: E1031 05:24:55.503879 2031 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" Oct 31 05:24:55.504067 kubelet[2031]: E1031 05:24:55.503956 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-65f7799b87-47jbs_calico-system(440bdb2f-ff72-44c2-b0bc-e953f311f252)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-65f7799b87-47jbs_calico-system(440bdb2f-ff72-44c2-b0bc-e953f311f252)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" podUID="440bdb2f-ff72-44c2-b0bc-e953f311f252" Oct 31 05:24:55.536101 env[1193]: time="2025-10-31T05:24:55.535909620Z" level=error msg="Failed to destroy network for sandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.537802 env[1193]: time="2025-10-31T05:24:55.537741424Z" level=error msg="encountered an error cleaning up failed sandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.538128 env[1193]: time="2025-10-31T05:24:55.538076802Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cc6545496-bzmv2,Uid:81bbb4a4-a415-4abc-a7fd-1a75817e45aa,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.539164 kubelet[2031]: E1031 05:24:55.539081 2031 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.542026 kubelet[2031]: E1031 05:24:55.539192 2031 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" Oct 31 05:24:55.542026 kubelet[2031]: E1031 05:24:55.539231 2031 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" Oct 31 05:24:55.542026 kubelet[2031]: E1031 05:24:55.539715 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5cc6545496-bzmv2_calico-apiserver(81bbb4a4-a415-4abc-a7fd-1a75817e45aa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5cc6545496-bzmv2_calico-apiserver(81bbb4a4-a415-4abc-a7fd-1a75817e45aa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" podUID="81bbb4a4-a415-4abc-a7fd-1a75817e45aa" Oct 31 05:24:55.543023 env[1193]: time="2025-10-31T05:24:55.542765331Z" level=error msg="Failed to destroy network for sandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.543647 env[1193]: time="2025-10-31T05:24:55.543599581Z" level=error msg="encountered an error cleaning up failed sandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.544793 env[1193]: time="2025-10-31T05:24:55.543853259Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-66bc5c9577-4k4fh,Uid:0c9303bc-5dc8-420a-b98f-17f88112d207,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.545199 kubelet[2031]: E1031 05:24:55.545145 2031 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.545316 kubelet[2031]: E1031 05:24:55.545216 2031 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-66bc5c9577-4k4fh" Oct 31 05:24:55.545316 kubelet[2031]: E1031 05:24:55.545245 2031 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-66bc5c9577-4k4fh" Oct 31 05:24:55.547588 kubelet[2031]: E1031 05:24:55.545295 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-66bc5c9577-4k4fh_kube-system(0c9303bc-5dc8-420a-b98f-17f88112d207)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-66bc5c9577-4k4fh_kube-system(0c9303bc-5dc8-420a-b98f-17f88112d207)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-66bc5c9577-4k4fh" podUID="0c9303bc-5dc8-420a-b98f-17f88112d207" Oct 31 05:24:55.552109 env[1193]: time="2025-10-31T05:24:55.552056237Z" level=error msg="Failed to destroy network for sandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.552761 env[1193]: time="2025-10-31T05:24:55.552713051Z" level=error msg="encountered an error cleaning up failed sandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.553022 env[1193]: time="2025-10-31T05:24:55.552943782Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-66bc5c9577-ngmnt,Uid:d9c3f104-ec6e-4a81-b201-05d6bbc995ee,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.553511 kubelet[2031]: E1031 05:24:55.553456 2031 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.554239 kubelet[2031]: E1031 05:24:55.553515 2031 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-66bc5c9577-ngmnt" Oct 31 05:24:55.554239 kubelet[2031]: E1031 05:24:55.553544 2031 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-66bc5c9577-ngmnt" Oct 31 05:24:55.554239 kubelet[2031]: E1031 05:24:55.553611 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-66bc5c9577-ngmnt_kube-system(d9c3f104-ec6e-4a81-b201-05d6bbc995ee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-66bc5c9577-ngmnt_kube-system(d9c3f104-ec6e-4a81-b201-05d6bbc995ee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-66bc5c9577-ngmnt" podUID="d9c3f104-ec6e-4a81-b201-05d6bbc995ee" Oct 31 05:24:55.559703 env[1193]: time="2025-10-31T05:24:55.559644862Z" level=error msg="Failed to destroy network for sandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.560888 env[1193]: time="2025-10-31T05:24:55.560838768Z" level=error msg="encountered an error cleaning up failed sandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.561156 env[1193]: time="2025-10-31T05:24:55.561101292Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-7c778bb748-4spgj,Uid:bc04009c-ce79-4cda-91a6-dd78e1ed2ba7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.561759 kubelet[2031]: E1031 05:24:55.561711 2031 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:55.561889 kubelet[2031]: E1031 05:24:55.561789 2031 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-7c778bb748-4spgj" Oct 31 05:24:55.561889 kubelet[2031]: E1031 05:24:55.561820 2031 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-7c778bb748-4spgj" Oct 31 05:24:55.562036 kubelet[2031]: E1031 05:24:55.561886 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-7c778bb748-4spgj_calico-system(bc04009c-ce79-4cda-91a6-dd78e1ed2ba7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-7c778bb748-4spgj_calico-system(bc04009c-ce79-4cda-91a6-dd78e1ed2ba7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-7c778bb748-4spgj" podUID="bc04009c-ce79-4cda-91a6-dd78e1ed2ba7" Oct 31 05:24:55.961506 systemd[1]: Created slice kubepods-besteffort-poda6a56ae4_0d29_4361_8d53_116b2173dd54.slice. Oct 31 05:24:55.967653 env[1193]: time="2025-10-31T05:24:55.967606117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cprzg,Uid:a6a56ae4-0d29-4361-8d53-116b2173dd54,Namespace:calico-system,Attempt:0,}" Oct 31 05:24:56.056818 env[1193]: time="2025-10-31T05:24:56.056717128Z" level=error msg="Failed to destroy network for sandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:56.060455 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424-shm.mount: Deactivated successfully. Oct 31 05:24:56.060940 env[1193]: time="2025-10-31T05:24:56.060889257Z" level=error msg="encountered an error cleaning up failed sandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:56.062191 env[1193]: time="2025-10-31T05:24:56.061116088Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cprzg,Uid:a6a56ae4-0d29-4361-8d53-116b2173dd54,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:56.062461 kubelet[2031]: E1031 05:24:56.061507 2031 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:56.062461 kubelet[2031]: E1031 05:24:56.061605 2031 kuberuntime_sandbox.go:71] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-cprzg" Oct 31 05:24:56.062461 kubelet[2031]: E1031 05:24:56.061642 2031 kuberuntime_manager.go:1343] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-cprzg" Oct 31 05:24:56.062852 kubelet[2031]: E1031 05:24:56.061725 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-cprzg_calico-system(a6a56ae4-0d29-4361-8d53-116b2173dd54)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-cprzg_calico-system(a6a56ae4-0d29-4361-8d53-116b2173dd54)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:24:56.200588 kubelet[2031]: I1031 05:24:56.200515 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:24:56.202758 env[1193]: time="2025-10-31T05:24:56.202710412Z" level=info msg="StopPodSandbox for \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\"" Oct 31 05:24:56.205090 kubelet[2031]: I1031 05:24:56.205043 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:24:56.208193 env[1193]: time="2025-10-31T05:24:56.208149746Z" level=info msg="StopPodSandbox for \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\"" Oct 31 05:24:56.209761 kubelet[2031]: I1031 05:24:56.209695 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:24:56.211182 env[1193]: time="2025-10-31T05:24:56.211144242Z" level=info msg="StopPodSandbox for \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\"" Oct 31 05:24:56.214456 kubelet[2031]: I1031 05:24:56.214152 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:24:56.216057 env[1193]: time="2025-10-31T05:24:56.216010842Z" level=info msg="StopPodSandbox for \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\"" Oct 31 05:24:56.220824 kubelet[2031]: I1031 05:24:56.220736 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:24:56.221693 env[1193]: time="2025-10-31T05:24:56.221651471Z" level=info msg="StopPodSandbox for \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\"" Oct 31 05:24:56.226439 kubelet[2031]: I1031 05:24:56.226074 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:24:56.226932 env[1193]: time="2025-10-31T05:24:56.226888813Z" level=info msg="StopPodSandbox for \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\"" Oct 31 05:24:56.228881 kubelet[2031]: I1031 05:24:56.228477 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:24:56.229257 env[1193]: time="2025-10-31T05:24:56.229222940Z" level=info msg="StopPodSandbox for \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\"" Oct 31 05:24:56.232175 kubelet[2031]: I1031 05:24:56.231750 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:24:56.232495 env[1193]: time="2025-10-31T05:24:56.232440836Z" level=info msg="StopPodSandbox for \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\"" Oct 31 05:24:56.297574 env[1193]: time="2025-10-31T05:24:56.297442648Z" level=error msg="StopPodSandbox for \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\" failed" error="failed to destroy network for sandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:56.298347 kubelet[2031]: E1031 05:24:56.298001 2031 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:24:56.298347 kubelet[2031]: E1031 05:24:56.298098 2031 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e"} Oct 31 05:24:56.298347 kubelet[2031]: E1031 05:24:56.298200 2031 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d9c3f104-ec6e-4a81-b201-05d6bbc995ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:24:56.298347 kubelet[2031]: E1031 05:24:56.298248 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d9c3f104-ec6e-4a81-b201-05d6bbc995ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-66bc5c9577-ngmnt" podUID="d9c3f104-ec6e-4a81-b201-05d6bbc995ee" Oct 31 05:24:56.334198 env[1193]: time="2025-10-31T05:24:56.334119823Z" level=error msg="StopPodSandbox for \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\" failed" error="failed to destroy network for sandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:56.335009 kubelet[2031]: E1031 05:24:56.334761 2031 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:24:56.335009 kubelet[2031]: E1031 05:24:56.334845 2031 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e"} Oct 31 05:24:56.335009 kubelet[2031]: E1031 05:24:56.334897 2031 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"81bbb4a4-a415-4abc-a7fd-1a75817e45aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:24:56.335009 kubelet[2031]: E1031 05:24:56.334936 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"81bbb4a4-a415-4abc-a7fd-1a75817e45aa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" podUID="81bbb4a4-a415-4abc-a7fd-1a75817e45aa" Oct 31 05:24:56.365174 env[1193]: time="2025-10-31T05:24:56.365095552Z" level=error msg="StopPodSandbox for \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\" failed" error="failed to destroy network for sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:56.366080 kubelet[2031]: E1031 05:24:56.365747 2031 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:24:56.366080 kubelet[2031]: E1031 05:24:56.365825 2031 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff"} Oct 31 05:24:56.366080 kubelet[2031]: E1031 05:24:56.365880 2031 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"37d2878f-048f-4de4-a194-8da4edc34c5c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:24:56.366080 kubelet[2031]: E1031 05:24:56.365922 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"37d2878f-048f-4de4-a194-8da4edc34c5c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6566988f9b-tzkgd" podUID="37d2878f-048f-4de4-a194-8da4edc34c5c" Oct 31 05:24:56.381211 env[1193]: time="2025-10-31T05:24:56.381127588Z" level=error msg="StopPodSandbox for \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\" failed" error="failed to destroy network for sandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:56.381887 kubelet[2031]: E1031 05:24:56.381651 2031 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:24:56.381887 kubelet[2031]: E1031 05:24:56.381728 2031 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424"} Oct 31 05:24:56.381887 kubelet[2031]: E1031 05:24:56.381781 2031 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a6a56ae4-0d29-4361-8d53-116b2173dd54\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:24:56.381887 kubelet[2031]: E1031 05:24:56.381836 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a6a56ae4-0d29-4361-8d53-116b2173dd54\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:24:56.429505 env[1193]: time="2025-10-31T05:24:56.429428773Z" level=error msg="StopPodSandbox for \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\" failed" error="failed to destroy network for sandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:56.430345 kubelet[2031]: E1031 05:24:56.430083 2031 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:24:56.430345 kubelet[2031]: E1031 05:24:56.430147 2031 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95"} Oct 31 05:24:56.430345 kubelet[2031]: E1031 05:24:56.430199 2031 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f505ca8a-1440-4ca4-ac04-92eb3b2080ce\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:24:56.430345 kubelet[2031]: E1031 05:24:56.430254 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f505ca8a-1440-4ca4-ac04-92eb3b2080ce\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" podUID="f505ca8a-1440-4ca4-ac04-92eb3b2080ce" Oct 31 05:24:56.438187 env[1193]: time="2025-10-31T05:24:56.438126182Z" level=error msg="StopPodSandbox for \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\" failed" error="failed to destroy network for sandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:56.438832 kubelet[2031]: E1031 05:24:56.438633 2031 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:24:56.438832 kubelet[2031]: E1031 05:24:56.438705 2031 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936"} Oct 31 05:24:56.438832 kubelet[2031]: E1031 05:24:56.438742 2031 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"440bdb2f-ff72-44c2-b0bc-e953f311f252\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:24:56.438832 kubelet[2031]: E1031 05:24:56.438776 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"440bdb2f-ff72-44c2-b0bc-e953f311f252\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" podUID="440bdb2f-ff72-44c2-b0bc-e953f311f252" Oct 31 05:24:56.443407 env[1193]: time="2025-10-31T05:24:56.443352230Z" level=error msg="StopPodSandbox for \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\" failed" error="failed to destroy network for sandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:56.443705 kubelet[2031]: E1031 05:24:56.443656 2031 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:24:56.443821 kubelet[2031]: E1031 05:24:56.443711 2031 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594"} Oct 31 05:24:56.443821 kubelet[2031]: E1031 05:24:56.443769 2031 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bc04009c-ce79-4cda-91a6-dd78e1ed2ba7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:24:56.443986 kubelet[2031]: E1031 05:24:56.443838 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bc04009c-ce79-4cda-91a6-dd78e1ed2ba7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-7c778bb748-4spgj" podUID="bc04009c-ce79-4cda-91a6-dd78e1ed2ba7" Oct 31 05:24:56.450217 env[1193]: time="2025-10-31T05:24:56.450152942Z" level=error msg="StopPodSandbox for \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\" failed" error="failed to destroy network for sandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:24:56.450530 kubelet[2031]: E1031 05:24:56.450456 2031 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:24:56.451319 kubelet[2031]: E1031 05:24:56.450530 2031 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd"} Oct 31 05:24:56.451319 kubelet[2031]: E1031 05:24:56.450599 2031 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0c9303bc-5dc8-420a-b98f-17f88112d207\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:24:56.451319 kubelet[2031]: E1031 05:24:56.450653 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0c9303bc-5dc8-420a-b98f-17f88112d207\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-66bc5c9577-4k4fh" podUID="0c9303bc-5dc8-420a-b98f-17f88112d207" Oct 31 05:25:07.057092 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4283169468.mount: Deactivated successfully. Oct 31 05:25:07.106240 env[1193]: time="2025-10-31T05:25:07.105872532Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:25:07.108433 env[1193]: time="2025-10-31T05:25:07.108364181Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:25:07.110288 env[1193]: time="2025-10-31T05:25:07.110246178Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:25:07.111805 env[1193]: time="2025-10-31T05:25:07.111762709Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 31 05:25:07.112929 env[1193]: time="2025-10-31T05:25:07.112884526Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 31 05:25:07.167639 env[1193]: time="2025-10-31T05:25:07.167289376Z" level=info msg="CreateContainer within sandbox \"c9da8c930e6291495875fe9e1cf0053bce8728170c3c9a199699f4e22e20fa3f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 31 05:25:07.190961 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1881197502.mount: Deactivated successfully. Oct 31 05:25:07.197168 env[1193]: time="2025-10-31T05:25:07.197112109Z" level=info msg="CreateContainer within sandbox \"c9da8c930e6291495875fe9e1cf0053bce8728170c3c9a199699f4e22e20fa3f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7b873f716d7a294c417b9f7188ba936f919094ee13d09cffe1e3f5f75c9670e9\"" Oct 31 05:25:07.201374 env[1193]: time="2025-10-31T05:25:07.200388021Z" level=info msg="StartContainer for \"7b873f716d7a294c417b9f7188ba936f919094ee13d09cffe1e3f5f75c9670e9\"" Oct 31 05:25:07.238708 systemd[1]: Started cri-containerd-7b873f716d7a294c417b9f7188ba936f919094ee13d09cffe1e3f5f75c9670e9.scope. Oct 31 05:25:07.297000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.303222 kernel: kauditd_printk_skb: 34 callbacks suppressed Oct 31 05:25:07.303665 kernel: audit: type=1400 audit(1761888307.297:1019): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.297000 audit[3094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fb0197bea88 items=0 ppid=2483 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:07.327587 kernel: audit: type=1300 audit(1761888307.297:1019): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fb0197bea88 items=0 ppid=2483 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:07.327705 kernel: audit: type=1327 audit(1761888307.297:1019): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383733663731366437613239346334313762396637313838626139 Oct 31 05:25:07.327762 kernel: audit: type=1400 audit(1761888307.304:1020): avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.327823 kernel: audit: type=1400 audit(1761888307.304:1020): avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383733663731366437613239346334313762396637313838626139 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.338438 kernel: audit: type=1400 audit(1761888307.304:1020): avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.349451 kernel: audit: type=1400 audit(1761888307.304:1020): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.349594 kernel: audit: type=1400 audit(1761888307.304:1020): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.355068 kernel: audit: type=1400 audit(1761888307.304:1020): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.361406 kernel: audit: type=1400 audit(1761888307.304:1020): avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit: BPF prog-id=136 op=LOAD Oct 31 05:25:07.304000 audit[3094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000298528 items=0 ppid=2483 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:07.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383733663731366437613239346334313762396637313838626139 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.304000 audit: BPF prog-id=137 op=LOAD Oct 31 05:25:07.304000 audit[3094]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000298578 items=0 ppid=2483 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:07.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383733663731366437613239346334313762396637313838626139 Oct 31 05:25:07.319000 audit: BPF prog-id=137 op=UNLOAD Oct 31 05:25:07.319000 audit: BPF prog-id=136 op=UNLOAD Oct 31 05:25:07.319000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.319000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.319000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.319000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.319000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.319000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.319000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.319000 audit[3094]: AVC avc: denied { perfmon } for pid=3094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.319000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.319000 audit[3094]: AVC avc: denied { bpf } for pid=3094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:07.319000 audit: BPF prog-id=138 op=LOAD Oct 31 05:25:07.319000 audit[3094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000298608 items=0 ppid=2483 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:07.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383733663731366437613239346334313762396637313838626139 Oct 31 05:25:07.390621 env[1193]: time="2025-10-31T05:25:07.390561810Z" level=info msg="StartContainer for \"7b873f716d7a294c417b9f7188ba936f919094ee13d09cffe1e3f5f75c9670e9\" returns successfully" Oct 31 05:25:07.911926 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 31 05:25:07.912287 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 31 05:25:07.952808 env[1193]: time="2025-10-31T05:25:07.952724231Z" level=info msg="StopPodSandbox for \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\"" Oct 31 05:25:08.025054 env[1193]: time="2025-10-31T05:25:08.024950809Z" level=error msg="StopPodSandbox for \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\" failed" error="failed to destroy network for sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 31 05:25:08.025866 kubelet[2031]: E1031 05:25:08.025494 2031 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:08.025866 kubelet[2031]: E1031 05:25:08.025628 2031 kuberuntime_manager.go:1665] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff"} Oct 31 05:25:08.025866 kubelet[2031]: E1031 05:25:08.025705 2031 kuberuntime_manager.go:1233] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"37d2878f-048f-4de4-a194-8da4edc34c5c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 31 05:25:08.025866 kubelet[2031]: E1031 05:25:08.025786 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"37d2878f-048f-4de4-a194-8da4edc34c5c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6566988f9b-tzkgd" podUID="37d2878f-048f-4de4-a194-8da4edc34c5c" Oct 31 05:25:08.303516 env[1193]: time="2025-10-31T05:25:08.303438241Z" level=info msg="StopPodSandbox for \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\"" Oct 31 05:25:08.356790 systemd[1]: run-containerd-runc-k8s.io-7b873f716d7a294c417b9f7188ba936f919094ee13d09cffe1e3f5f75c9670e9-runc.IPBZxl.mount: Deactivated successfully. Oct 31 05:25:08.389263 kubelet[2031]: I1031 05:25:08.386987 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-q86nh" podStartSLOduration=2.946207221 podStartE2EDuration="28.384746514s" podCreationTimestamp="2025-10-31 05:24:40 +0000 UTC" firstStartedPulling="2025-10-31 05:24:41.677002561 +0000 UTC m=+25.169736809" lastFinishedPulling="2025-10-31 05:25:07.115541847 +0000 UTC m=+50.608276102" observedRunningTime="2025-10-31 05:25:08.381241387 +0000 UTC m=+51.873975651" watchObservedRunningTime="2025-10-31 05:25:08.384746514 +0000 UTC m=+51.877480769" Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.521 [INFO][3171] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.521 [INFO][3171] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" iface="eth0" netns="/var/run/netns/cni-2ddd4a65-08dc-49ec-25db-eda3cb8e727f" Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.522 [INFO][3171] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" iface="eth0" netns="/var/run/netns/cni-2ddd4a65-08dc-49ec-25db-eda3cb8e727f" Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.523 [INFO][3171] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" iface="eth0" netns="/var/run/netns/cni-2ddd4a65-08dc-49ec-25db-eda3cb8e727f" Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.523 [INFO][3171] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.523 [INFO][3171] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.720 [INFO][3190] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" HandleID="k8s-pod-network.6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Workload="srv--clgmo.gb1.brightbox.com-k8s-whisker--6566988f9b--tzkgd-eth0" Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.724 [INFO][3190] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.725 [INFO][3190] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.740 [WARNING][3190] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" HandleID="k8s-pod-network.6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Workload="srv--clgmo.gb1.brightbox.com-k8s-whisker--6566988f9b--tzkgd-eth0" Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.740 [INFO][3190] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" HandleID="k8s-pod-network.6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Workload="srv--clgmo.gb1.brightbox.com-k8s-whisker--6566988f9b--tzkgd-eth0" Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.742 [INFO][3190] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:08.746614 env[1193]: 2025-10-31 05:25:08.744 [INFO][3171] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:08.751068 systemd[1]: run-netns-cni\x2d2ddd4a65\x2d08dc\x2d49ec\x2d25db\x2deda3cb8e727f.mount: Deactivated successfully. Oct 31 05:25:08.753708 env[1193]: time="2025-10-31T05:25:08.753291816Z" level=info msg="TearDown network for sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\" successfully" Oct 31 05:25:08.754143 env[1193]: time="2025-10-31T05:25:08.753832226Z" level=info msg="StopPodSandbox for \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\" returns successfully" Oct 31 05:25:08.872565 kubelet[2031]: I1031 05:25:08.871929 2031 reconciler_common.go:163] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/37d2878f-048f-4de4-a194-8da4edc34c5c-whisker-backend-key-pair\") pod \"37d2878f-048f-4de4-a194-8da4edc34c5c\" (UID: \"37d2878f-048f-4de4-a194-8da4edc34c5c\") " Oct 31 05:25:08.872565 kubelet[2031]: I1031 05:25:08.872029 2031 reconciler_common.go:163] "operationExecutor.UnmountVolume started for volume \"kube-api-access-f5l77\" (UniqueName: \"kubernetes.io/projected/37d2878f-048f-4de4-a194-8da4edc34c5c-kube-api-access-f5l77\") pod \"37d2878f-048f-4de4-a194-8da4edc34c5c\" (UID: \"37d2878f-048f-4de4-a194-8da4edc34c5c\") " Oct 31 05:25:08.872565 kubelet[2031]: I1031 05:25:08.872088 2031 reconciler_common.go:163] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/37d2878f-048f-4de4-a194-8da4edc34c5c-whisker-ca-bundle\") pod \"37d2878f-048f-4de4-a194-8da4edc34c5c\" (UID: \"37d2878f-048f-4de4-a194-8da4edc34c5c\") " Oct 31 05:25:08.877757 kubelet[2031]: I1031 05:25:08.874523 2031 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/37d2878f-048f-4de4-a194-8da4edc34c5c-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "37d2878f-048f-4de4-a194-8da4edc34c5c" (UID: "37d2878f-048f-4de4-a194-8da4edc34c5c"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Oct 31 05:25:08.882362 kubelet[2031]: I1031 05:25:08.882303 2031 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/37d2878f-048f-4de4-a194-8da4edc34c5c-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "37d2878f-048f-4de4-a194-8da4edc34c5c" (UID: "37d2878f-048f-4de4-a194-8da4edc34c5c"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Oct 31 05:25:08.882671 kubelet[2031]: I1031 05:25:08.882627 2031 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/37d2878f-048f-4de4-a194-8da4edc34c5c-kube-api-access-f5l77" (OuterVolumeSpecName: "kube-api-access-f5l77") pod "37d2878f-048f-4de4-a194-8da4edc34c5c" (UID: "37d2878f-048f-4de4-a194-8da4edc34c5c"). InnerVolumeSpecName "kube-api-access-f5l77". PluginName "kubernetes.io/projected", VolumeGIDValue "" Oct 31 05:25:08.971491 systemd[1]: Removed slice kubepods-besteffort-pod37d2878f_048f_4de4_a194_8da4edc34c5c.slice. Oct 31 05:25:08.973426 kubelet[2031]: I1031 05:25:08.973322 2031 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/37d2878f-048f-4de4-a194-8da4edc34c5c-whisker-backend-key-pair\") on node \"srv-clgmo.gb1.brightbox.com\" DevicePath \"\"" Oct 31 05:25:08.973426 kubelet[2031]: I1031 05:25:08.973371 2031 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-f5l77\" (UniqueName: \"kubernetes.io/projected/37d2878f-048f-4de4-a194-8da4edc34c5c-kube-api-access-f5l77\") on node \"srv-clgmo.gb1.brightbox.com\" DevicePath \"\"" Oct 31 05:25:08.973426 kubelet[2031]: I1031 05:25:08.973389 2031 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/37d2878f-048f-4de4-a194-8da4edc34c5c-whisker-ca-bundle\") on node \"srv-clgmo.gb1.brightbox.com\" DevicePath \"\"" Oct 31 05:25:09.055349 systemd[1]: var-lib-kubelet-pods-37d2878f\x2d048f\x2d4de4\x2da194\x2d8da4edc34c5c-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2df5l77.mount: Deactivated successfully. Oct 31 05:25:09.056373 systemd[1]: var-lib-kubelet-pods-37d2878f\x2d048f\x2d4de4\x2da194\x2d8da4edc34c5c-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Oct 31 05:25:09.351247 systemd[1]: run-containerd-runc-k8s.io-7b873f716d7a294c417b9f7188ba936f919094ee13d09cffe1e3f5f75c9670e9-runc.YQRmvJ.mount: Deactivated successfully. Oct 31 05:25:09.526655 systemd[1]: Created slice kubepods-besteffort-podc5bf3236_396f_4d92_8de8_ce437ec49156.slice. Oct 31 05:25:09.678902 kubelet[2031]: I1031 05:25:09.678797 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/c5bf3236-396f-4d92-8de8-ce437ec49156-whisker-backend-key-pair\") pod \"whisker-6c6db879c4-hvpcf\" (UID: \"c5bf3236-396f-4d92-8de8-ce437ec49156\") " pod="calico-system/whisker-6c6db879c4-hvpcf" Oct 31 05:25:09.679889 kubelet[2031]: I1031 05:25:09.679498 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c5bf3236-396f-4d92-8de8-ce437ec49156-whisker-ca-bundle\") pod \"whisker-6c6db879c4-hvpcf\" (UID: \"c5bf3236-396f-4d92-8de8-ce437ec49156\") " pod="calico-system/whisker-6c6db879c4-hvpcf" Oct 31 05:25:09.679889 kubelet[2031]: I1031 05:25:09.679553 2031 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fp2fn\" (UniqueName: \"kubernetes.io/projected/c5bf3236-396f-4d92-8de8-ce437ec49156-kube-api-access-fp2fn\") pod \"whisker-6c6db879c4-hvpcf\" (UID: \"c5bf3236-396f-4d92-8de8-ce437ec49156\") " pod="calico-system/whisker-6c6db879c4-hvpcf" Oct 31 05:25:09.835473 env[1193]: time="2025-10-31T05:25:09.835299313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6c6db879c4-hvpcf,Uid:c5bf3236-396f-4d92-8de8-ce437ec49156,Namespace:calico-system,Attempt:0,}" Oct 31 05:25:09.938000 audit[3270]: AVC avc: denied { write } for pid=3270 comm="tee" name="fd" dev="proc" ino=29440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:25:09.938000 audit[3270]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff763f17c1 a2=241 a3=1b6 items=1 ppid=3243 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:09.938000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 31 05:25:09.938000 audit: PATH item=0 name="/dev/fd/63" inode=29982 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:25:09.938000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:25:09.954181 env[1193]: time="2025-10-31T05:25:09.954129872Z" level=info msg="StopPodSandbox for \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\"" Oct 31 05:25:09.955044 env[1193]: time="2025-10-31T05:25:09.954281335Z" level=info msg="StopPodSandbox for \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\"" Oct 31 05:25:09.955478 env[1193]: time="2025-10-31T05:25:09.954385662Z" level=info msg="StopPodSandbox for \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\"" Oct 31 05:25:09.955878 env[1193]: time="2025-10-31T05:25:09.954451921Z" level=info msg="StopPodSandbox for \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\"" Oct 31 05:25:09.956270 env[1193]: time="2025-10-31T05:25:09.954459557Z" level=info msg="StopPodSandbox for \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\"" Oct 31 05:25:09.981000 audit[3289]: AVC avc: denied { write } for pid=3289 comm="tee" name="fd" dev="proc" ino=30031 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:25:09.981000 audit[3289]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3c8ea7c3 a2=241 a3=1b6 items=1 ppid=3237 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:09.981000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 31 05:25:09.981000 audit: PATH item=0 name="/dev/fd/63" inode=30009 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:25:09.981000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:25:09.986000 audit[3291]: AVC avc: denied { write } for pid=3291 comm="tee" name="fd" dev="proc" ino=30038 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:25:09.986000 audit[3291]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1c9577c1 a2=241 a3=1b6 items=1 ppid=3247 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:09.986000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 31 05:25:09.986000 audit: PATH item=0 name="/dev/fd/63" inode=30011 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:25:09.986000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:25:09.995000 audit[3286]: AVC avc: denied { write } for pid=3286 comm="tee" name="fd" dev="proc" ino=29506 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:25:09.995000 audit[3286]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef38b37b1 a2=241 a3=1b6 items=1 ppid=3239 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:09.995000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 31 05:25:09.995000 audit: PATH item=0 name="/dev/fd/63" inode=29433 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:25:09.995000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:25:10.093000 audit[3349]: AVC avc: denied { write } for pid=3349 comm="tee" name="fd" dev="proc" ino=30061 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:25:10.093000 audit[3349]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc94d197c2 a2=241 a3=1b6 items=1 ppid=3241 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:10.093000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 31 05:25:10.093000 audit: PATH item=0 name="/dev/fd/63" inode=29503 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:25:10.093000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:25:10.130000 audit[3340]: AVC avc: denied { write } for pid=3340 comm="tee" name="fd" dev="proc" ino=30064 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:25:10.130000 audit[3340]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4fcb57b2 a2=241 a3=1b6 items=1 ppid=3245 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:10.130000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 31 05:25:10.130000 audit: PATH item=0 name="/dev/fd/63" inode=29487 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:25:10.130000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:25:10.153000 audit[3399]: AVC avc: denied { write } for pid=3399 comm="tee" name="fd" dev="proc" ino=29535 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 31 05:25:10.153000 audit[3399]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd6a927c1 a2=241 a3=1b6 items=1 ppid=3248 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:10.153000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 31 05:25:10.153000 audit: PATH item=0 name="/dev/fd/63" inode=29532 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 31 05:25:10.153000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 31 05:25:10.454438 systemd-networkd[1013]: calibfbb674e474: Link UP Oct 31 05:25:10.474261 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 05:25:10.474481 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibfbb674e474: link becomes ready Oct 31 05:25:10.474319 systemd-networkd[1013]: calibfbb674e474: Gained carrier Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:09.918 [INFO][3272] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:09.944 [INFO][3272] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0 whisker-6c6db879c4- calico-system c5bf3236-396f-4d92-8de8-ce437ec49156 957 0 2025-10-31 05:25:09 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:6c6db879c4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s srv-clgmo.gb1.brightbox.com whisker-6c6db879c4-hvpcf eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calibfbb674e474 [] [] }} ContainerID="67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" Namespace="calico-system" Pod="whisker-6c6db879c4-hvpcf" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-" Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:09.945 [INFO][3272] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" Namespace="calico-system" Pod="whisker-6c6db879c4-hvpcf" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0" Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.213 [INFO][3321] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" HandleID="k8s-pod-network.67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" Workload="srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0" Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.214 [INFO][3321] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" HandleID="k8s-pod-network.67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" Workload="srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003337e0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-clgmo.gb1.brightbox.com", "pod":"whisker-6c6db879c4-hvpcf", "timestamp":"2025-10-31 05:25:10.213780857 +0000 UTC"}, Hostname:"srv-clgmo.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.214 [INFO][3321] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.214 [INFO][3321] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.216 [INFO][3321] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-clgmo.gb1.brightbox.com' Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.258 [INFO][3321] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.293 [INFO][3321] ipam/ipam.go 394: Looking up existing affinities for host host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.315 [INFO][3321] ipam/ipam.go 511: Trying affinity for 192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.332 [INFO][3321] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.339 [INFO][3321] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.339 [INFO][3321] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.346 [INFO][3321] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72 Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.365 [INFO][3321] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.386 [INFO][3321] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.71.129/26] block=192.168.71.128/26 handle="k8s-pod-network.67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.386 [INFO][3321] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.129/26] handle="k8s-pod-network.67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.386 [INFO][3321] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:10.579752 env[1193]: 2025-10-31 05:25:10.387 [INFO][3321] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.71.129/26] IPv6=[] ContainerID="67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" HandleID="k8s-pod-network.67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" Workload="srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0" Oct 31 05:25:10.582126 env[1193]: 2025-10-31 05:25:10.395 [INFO][3272] cni-plugin/k8s.go 418: Populated endpoint ContainerID="67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" Namespace="calico-system" Pod="whisker-6c6db879c4-hvpcf" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0", GenerateName:"whisker-6c6db879c4-", Namespace:"calico-system", SelfLink:"", UID:"c5bf3236-396f-4d92-8de8-ce437ec49156", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 25, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6c6db879c4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"", Pod:"whisker-6c6db879c4-hvpcf", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.71.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calibfbb674e474", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:10.582126 env[1193]: 2025-10-31 05:25:10.395 [INFO][3272] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.129/32] ContainerID="67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" Namespace="calico-system" Pod="whisker-6c6db879c4-hvpcf" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0" Oct 31 05:25:10.582126 env[1193]: 2025-10-31 05:25:10.395 [INFO][3272] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibfbb674e474 ContainerID="67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" Namespace="calico-system" Pod="whisker-6c6db879c4-hvpcf" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0" Oct 31 05:25:10.582126 env[1193]: 2025-10-31 05:25:10.528 [INFO][3272] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" Namespace="calico-system" Pod="whisker-6c6db879c4-hvpcf" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0" Oct 31 05:25:10.582126 env[1193]: 2025-10-31 05:25:10.529 [INFO][3272] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" Namespace="calico-system" Pod="whisker-6c6db879c4-hvpcf" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0", GenerateName:"whisker-6c6db879c4-", Namespace:"calico-system", SelfLink:"", UID:"c5bf3236-396f-4d92-8de8-ce437ec49156", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 25, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6c6db879c4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72", Pod:"whisker-6c6db879c4-hvpcf", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.71.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calibfbb674e474", MAC:"a6:74:ec:1f:38:1e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:10.582126 env[1193]: 2025-10-31 05:25:10.568 [INFO][3272] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72" Namespace="calico-system" Pod="whisker-6c6db879c4-hvpcf" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-whisker--6c6db879c4--hvpcf-eth0" Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.443 [INFO][3383] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.443 [INFO][3383] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" iface="eth0" netns="/var/run/netns/cni-4059fd73-3133-41ee-a633-98fde6ebbacb" Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.448 [INFO][3383] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" iface="eth0" netns="/var/run/netns/cni-4059fd73-3133-41ee-a633-98fde6ebbacb" Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.449 [INFO][3383] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" iface="eth0" netns="/var/run/netns/cni-4059fd73-3133-41ee-a633-98fde6ebbacb" Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.449 [INFO][3383] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.449 [INFO][3383] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.683 [INFO][3423] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" HandleID="k8s-pod-network.49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.690 [INFO][3423] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.690 [INFO][3423] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.710 [WARNING][3423] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" HandleID="k8s-pod-network.49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.710 [INFO][3423] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" HandleID="k8s-pod-network.49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.713 [INFO][3423] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:10.728123 env[1193]: 2025-10-31 05:25:10.719 [INFO][3383] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:25:10.734291 systemd[1]: run-netns-cni\x2d4059fd73\x2d3133\x2d41ee\x2da633\x2d98fde6ebbacb.mount: Deactivated successfully. Oct 31 05:25:10.737860 env[1193]: time="2025-10-31T05:25:10.734585540Z" level=info msg="TearDown network for sandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\" successfully" Oct 31 05:25:10.737860 env[1193]: time="2025-10-31T05:25:10.734675871Z" level=info msg="StopPodSandbox for \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\" returns successfully" Oct 31 05:25:10.742597 env[1193]: time="2025-10-31T05:25:10.742543520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-66bc5c9577-ngmnt,Uid:d9c3f104-ec6e-4a81-b201-05d6bbc995ee,Namespace:kube-system,Attempt:1,}" Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.553 [INFO][3387] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.553 [INFO][3387] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" iface="eth0" netns="/var/run/netns/cni-377ab35f-1f69-de20-7d26-a77f8a12e284" Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.553 [INFO][3387] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" iface="eth0" netns="/var/run/netns/cni-377ab35f-1f69-de20-7d26-a77f8a12e284" Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.554 [INFO][3387] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" iface="eth0" netns="/var/run/netns/cni-377ab35f-1f69-de20-7d26-a77f8a12e284" Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.554 [INFO][3387] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.554 [INFO][3387] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.748 [INFO][3433] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" HandleID="k8s-pod-network.298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.748 [INFO][3433] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.748 [INFO][3433] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.775 [WARNING][3433] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" HandleID="k8s-pod-network.298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.775 [INFO][3433] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" HandleID="k8s-pod-network.298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.784 [INFO][3433] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:10.815066 env[1193]: 2025-10-31 05:25:10.810 [INFO][3387] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:25:10.827141 systemd[1]: run-netns-cni\x2d377ab35f\x2d1f69\x2dde20\x2d7d26\x2da77f8a12e284.mount: Deactivated successfully. Oct 31 05:25:10.832263 env[1193]: time="2025-10-31T05:25:10.827801940Z" level=info msg="TearDown network for sandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\" successfully" Oct 31 05:25:10.832263 env[1193]: time="2025-10-31T05:25:10.827871234Z" level=info msg="StopPodSandbox for \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\" returns successfully" Oct 31 05:25:10.839191 env[1193]: time="2025-10-31T05:25:10.832244248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cc6545496-bzmv2,Uid:81bbb4a4-a415-4abc-a7fd-1a75817e45aa,Namespace:calico-apiserver,Attempt:1,}" Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.241 [INFO][3367] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.241 [INFO][3367] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" iface="eth0" netns="/var/run/netns/cni-209054bf-32b8-33e6-a4de-984f73711c58" Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.242 [INFO][3367] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" iface="eth0" netns="/var/run/netns/cni-209054bf-32b8-33e6-a4de-984f73711c58" Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.242 [INFO][3367] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" iface="eth0" netns="/var/run/netns/cni-209054bf-32b8-33e6-a4de-984f73711c58" Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.242 [INFO][3367] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.242 [INFO][3367] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.739 [INFO][3408] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" HandleID="k8s-pod-network.2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.762 [INFO][3408] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.784 [INFO][3408] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.820 [WARNING][3408] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" HandleID="k8s-pod-network.2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.820 [INFO][3408] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" HandleID="k8s-pod-network.2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.827 [INFO][3408] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:10.847714 env[1193]: 2025-10-31 05:25:10.843 [INFO][3367] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:25:10.852118 env[1193]: time="2025-10-31T05:25:10.852063838Z" level=info msg="TearDown network for sandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\" successfully" Oct 31 05:25:10.852280 env[1193]: time="2025-10-31T05:25:10.852238845Z" level=info msg="StopPodSandbox for \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\" returns successfully" Oct 31 05:25:10.858361 env[1193]: time="2025-10-31T05:25:10.858230760Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cc6545496-7xfb2,Uid:f505ca8a-1440-4ca4-ac04-92eb3b2080ce,Namespace:calico-apiserver,Attempt:1,}" Oct 31 05:25:10.950622 env[1193]: time="2025-10-31T05:25:10.949400463Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:25:10.964100 env[1193]: time="2025-10-31T05:25:10.962174597Z" level=info msg="StopPodSandbox for \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\"" Oct 31 05:25:10.966455 env[1193]: time="2025-10-31T05:25:10.966382588Z" level=info msg="StopPodSandbox for \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\"" Oct 31 05:25:10.966934 kubelet[2031]: I1031 05:25:10.966874 2031 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="37d2878f-048f-4de4-a194-8da4edc34c5c" path="/var/lib/kubelet/pods/37d2878f-048f-4de4-a194-8da4edc34c5c/volumes" Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.526 [INFO][3355] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.527 [INFO][3355] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" iface="eth0" netns="/var/run/netns/cni-2b7e719b-321c-cbcc-968e-bbfb3402c270" Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.527 [INFO][3355] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" iface="eth0" netns="/var/run/netns/cni-2b7e719b-321c-cbcc-968e-bbfb3402c270" Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.528 [INFO][3355] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" iface="eth0" netns="/var/run/netns/cni-2b7e719b-321c-cbcc-968e-bbfb3402c270" Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.528 [INFO][3355] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.528 [INFO][3355] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.867 [INFO][3431] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" HandleID="k8s-pod-network.d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Workload="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.885 [INFO][3431] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.885 [INFO][3431] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.921 [WARNING][3431] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" HandleID="k8s-pod-network.d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Workload="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.922 [INFO][3431] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" HandleID="k8s-pod-network.d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Workload="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.931 [INFO][3431] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:10.968257 env[1193]: 2025-10-31 05:25:10.952 [INFO][3355] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:25:10.969705 env[1193]: time="2025-10-31T05:25:10.969665624Z" level=info msg="TearDown network for sandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\" successfully" Oct 31 05:25:10.969957 env[1193]: time="2025-10-31T05:25:10.969900501Z" level=info msg="StopPodSandbox for \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\" returns successfully" Oct 31 05:25:10.976035 env[1193]: time="2025-10-31T05:25:10.975746000Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:25:10.977233 env[1193]: time="2025-10-31T05:25:10.977178252Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-7c778bb748-4spgj,Uid:bc04009c-ce79-4cda-91a6-dd78e1ed2ba7,Namespace:calico-system,Attempt:1,}" Oct 31 05:25:10.986064 env[1193]: time="2025-10-31T05:25:10.978251913Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:25:10.991122 env[1193]: time="2025-10-31T05:25:10.990814722Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72 pid=3470 runtime=io.containerd.runc.v2 Oct 31 05:25:11.059245 systemd[1]: run-netns-cni\x2d2b7e719b\x2d321c\x2dcbcc\x2d968e\x2dbbfb3402c270.mount: Deactivated successfully. Oct 31 05:25:11.059416 systemd[1]: run-netns-cni\x2d209054bf\x2d32b8\x2d33e6\x2da4de\x2d984f73711c58.mount: Deactivated successfully. Oct 31 05:25:11.066000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=522574 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:11.066000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0025b93e0 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:25:11.066000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:25:11.066000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:11.066000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b9ea80 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:25:11.066000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:10.619 [INFO][3374] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:10.620 [INFO][3374] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" iface="eth0" netns="/var/run/netns/cni-c503ba92-9f25-464a-549a-cd1e1bf29d79" Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:10.620 [INFO][3374] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" iface="eth0" netns="/var/run/netns/cni-c503ba92-9f25-464a-549a-cd1e1bf29d79" Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:10.620 [INFO][3374] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" iface="eth0" netns="/var/run/netns/cni-c503ba92-9f25-464a-549a-cd1e1bf29d79" Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:10.620 [INFO][3374] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:10.620 [INFO][3374] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:11.035 [INFO][3446] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" HandleID="k8s-pod-network.8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:11.036 [INFO][3446] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:11.036 [INFO][3446] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:11.079 [WARNING][3446] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" HandleID="k8s-pod-network.8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:11.079 [INFO][3446] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" HandleID="k8s-pod-network.8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:11.085 [INFO][3446] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:11.110021 env[1193]: 2025-10-31 05:25:11.092 [INFO][3374] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:25:11.114383 systemd[1]: run-netns-cni\x2dc503ba92\x2d9f25\x2d464a\x2d549a\x2dcd1e1bf29d79.mount: Deactivated successfully. Oct 31 05:25:11.117632 env[1193]: time="2025-10-31T05:25:11.117580524Z" level=info msg="TearDown network for sandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\" successfully" Oct 31 05:25:11.126538 env[1193]: time="2025-10-31T05:25:11.126482424Z" level=info msg="StopPodSandbox for \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\" returns successfully" Oct 31 05:25:11.133959 env[1193]: time="2025-10-31T05:25:11.133879853Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65f7799b87-47jbs,Uid:440bdb2f-ff72-44c2-b0bc-e953f311f252,Namespace:calico-system,Attempt:1,}" Oct 31 05:25:11.242987 systemd[1]: Started cri-containerd-67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72.scope. Oct 31 05:25:11.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.449000 audit: BPF prog-id=139 op=LOAD Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3470 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:11.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637656532636236643032386462363735613231356561636532646266 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3470 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:11.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637656532636236643032386462363735613231356561636532646266 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit: BPF prog-id=140 op=LOAD Oct 31 05:25:11.450000 audit[3515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002fe440 items=0 ppid=3470 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:11.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637656532636236643032386462363735613231356561636532646266 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit: BPF prog-id=141 op=LOAD Oct 31 05:25:11.450000 audit[3515]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002fe488 items=0 ppid=3470 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:11.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637656532636236643032386462363735613231356561636532646266 Oct 31 05:25:11.450000 audit: BPF prog-id=141 op=UNLOAD Oct 31 05:25:11.450000 audit: BPF prog-id=140 op=UNLOAD Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:11.450000 audit: BPF prog-id=142 op=LOAD Oct 31 05:25:11.450000 audit[3515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002fe898 items=0 ppid=3470 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:11.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637656532636236643032386462363735613231356561636532646266 Oct 31 05:25:11.775119 systemd-networkd[1013]: cali7ca9ddb495f: Link UP Oct 31 05:25:11.779866 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 05:25:11.779998 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7ca9ddb495f: link becomes ready Oct 31 05:25:11.779777 systemd-networkd[1013]: cali7ca9ddb495f: Gained carrier Oct 31 05:25:11.801000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=522570 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:11.801000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c012c3fb60 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:25:11.801000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:25:11.803000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=522574 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:11.803000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c01244ff80 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:25:11.803000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:25:11.803000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=522574 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:11.803000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c01244ffb0 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:25:11.803000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:25:11.806000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:11.806000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c005107a20 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:25:11.806000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:25:11.809000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:11.809000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c005107a40 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:25:11.809000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:25:11.817000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=522576 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:11.817000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c012e7a180 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:25:11.817000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.331 [INFO][3465] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.388 [INFO][3465] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0 coredns-66bc5c9577- kube-system d9c3f104-ec6e-4a81-b201-05d6bbc995ee 968 0 2025-10-31 05:24:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:66bc5c9577 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-clgmo.gb1.brightbox.com coredns-66bc5c9577-ngmnt eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali7ca9ddb495f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 } {liveness-probe TCP 8080 0 } {readiness-probe TCP 8181 0 }] [] }} ContainerID="e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" Namespace="kube-system" Pod="coredns-66bc5c9577-ngmnt" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-" Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.390 [INFO][3465] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" Namespace="kube-system" Pod="coredns-66bc5c9577-ngmnt" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.607 [INFO][3591] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" HandleID="k8s-pod-network.e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.608 [INFO][3591] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" HandleID="k8s-pod-network.e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004e150), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-clgmo.gb1.brightbox.com", "pod":"coredns-66bc5c9577-ngmnt", "timestamp":"2025-10-31 05:25:11.607951607 +0000 UTC"}, Hostname:"srv-clgmo.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.608 [INFO][3591] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.608 [INFO][3591] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.608 [INFO][3591] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-clgmo.gb1.brightbox.com' Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.629 [INFO][3591] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.642 [INFO][3591] ipam/ipam.go 394: Looking up existing affinities for host host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.670 [INFO][3591] ipam/ipam.go 511: Trying affinity for 192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.677 [INFO][3591] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.693 [INFO][3591] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.693 [INFO][3591] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.701 [INFO][3591] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.715 [INFO][3591] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.741 [INFO][3591] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.71.130/26] block=192.168.71.128/26 handle="k8s-pod-network.e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.741 [INFO][3591] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.130/26] handle="k8s-pod-network.e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.741 [INFO][3591] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:11.871036 env[1193]: 2025-10-31 05:25:11.741 [INFO][3591] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.71.130/26] IPv6=[] ContainerID="e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" HandleID="k8s-pod-network.e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:11.873059 env[1193]: 2025-10-31 05:25:11.744 [INFO][3465] cni-plugin/k8s.go 418: Populated endpoint ContainerID="e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" Namespace="kube-system" Pod="coredns-66bc5c9577-ngmnt" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0", GenerateName:"coredns-66bc5c9577-", Namespace:"kube-system", SelfLink:"", UID:"d9c3f104-ec6e-4a81-b201-05d6bbc995ee", ResourceVersion:"968", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"66bc5c9577", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"", Pod:"coredns-66bc5c9577-ngmnt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ca9ddb495f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"liveness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1f90, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"readiness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1ff5, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:11.873059 env[1193]: 2025-10-31 05:25:11.745 [INFO][3465] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.130/32] ContainerID="e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" Namespace="kube-system" Pod="coredns-66bc5c9577-ngmnt" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:11.873059 env[1193]: 2025-10-31 05:25:11.745 [INFO][3465] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7ca9ddb495f ContainerID="e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" Namespace="kube-system" Pod="coredns-66bc5c9577-ngmnt" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:11.873059 env[1193]: 2025-10-31 05:25:11.812 [INFO][3465] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" Namespace="kube-system" Pod="coredns-66bc5c9577-ngmnt" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:11.873059 env[1193]: 2025-10-31 05:25:11.814 [INFO][3465] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" Namespace="kube-system" Pod="coredns-66bc5c9577-ngmnt" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0", GenerateName:"coredns-66bc5c9577-", Namespace:"kube-system", SelfLink:"", UID:"d9c3f104-ec6e-4a81-b201-05d6bbc995ee", ResourceVersion:"968", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"66bc5c9577", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf", Pod:"coredns-66bc5c9577-ngmnt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ca9ddb495f", MAC:"66:e1:30:6a:fb:4e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"liveness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1f90, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"readiness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1ff5, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:11.873563 env[1193]: 2025-10-31 05:25:11.854 [INFO][3465] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf" Namespace="kube-system" Pod="coredns-66bc5c9577-ngmnt" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.554 [INFO][3562] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.554 [INFO][3562] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" iface="eth0" netns="/var/run/netns/cni-9734f60f-63ec-5b0c-3182-fcad5b4628a6" Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.554 [INFO][3562] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" iface="eth0" netns="/var/run/netns/cni-9734f60f-63ec-5b0c-3182-fcad5b4628a6" Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.555 [INFO][3562] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" iface="eth0" netns="/var/run/netns/cni-9734f60f-63ec-5b0c-3182-fcad5b4628a6" Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.555 [INFO][3562] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.556 [INFO][3562] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.724 [INFO][3601] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" HandleID="k8s-pod-network.0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.725 [INFO][3601] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.745 [INFO][3601] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.841 [WARNING][3601] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" HandleID="k8s-pod-network.0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.842 [INFO][3601] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" HandleID="k8s-pod-network.0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.866 [INFO][3601] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:11.874031 env[1193]: 2025-10-31 05:25:11.870 [INFO][3562] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:25:11.876473 env[1193]: time="2025-10-31T05:25:11.876404532Z" level=info msg="TearDown network for sandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\" successfully" Oct 31 05:25:11.876473 env[1193]: time="2025-10-31T05:25:11.876465979Z" level=info msg="StopPodSandbox for \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\" returns successfully" Oct 31 05:25:11.886562 env[1193]: time="2025-10-31T05:25:11.886494442Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-66bc5c9577-4k4fh,Uid:0c9303bc-5dc8-420a-b98f-17f88112d207,Namespace:kube-system,Attempt:1,}" Oct 31 05:25:12.059679 systemd[1]: run-netns-cni\x2d9734f60f\x2d63ec\x2d5b0c\x2d3182\x2dfcad5b4628a6.mount: Deactivated successfully. Oct 31 05:25:12.094019 env[1193]: time="2025-10-31T05:25:12.093931664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6c6db879c4-hvpcf,Uid:c5bf3236-396f-4d92-8de8-ce437ec49156,Namespace:calico-system,Attempt:0,} returns sandbox id \"67ee2cb6d028db675a215eace2dbf8d61995a7fde86b8781c9a2fcef759c3a72\"" Oct 31 05:25:12.116935 env[1193]: time="2025-10-31T05:25:12.116270346Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:25:12.116935 env[1193]: time="2025-10-31T05:25:12.116373548Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:25:12.116935 env[1193]: time="2025-10-31T05:25:12.116393127Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:25:12.116935 env[1193]: time="2025-10-31T05:25:12.116682034Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf pid=3665 runtime=io.containerd.runc.v2 Oct 31 05:25:12.117403 env[1193]: time="2025-10-31T05:25:12.117322820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 05:25:12.246306 systemd[1]: run-containerd-runc-k8s.io-e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf-runc.IFJweE.mount: Deactivated successfully. Oct 31 05:25:12.252794 systemd-networkd[1013]: calie49dac0f8cd: Link UP Oct 31 05:25:12.256069 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie49dac0f8cd: link becomes ready Oct 31 05:25:12.255181 systemd-networkd[1013]: calie49dac0f8cd: Gained carrier Oct 31 05:25:12.262203 systemd[1]: Started cri-containerd-e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf.scope. Oct 31 05:25:12.289662 systemd-networkd[1013]: calibfbb674e474: Gained IPv6LL Oct 31 05:25:12.314577 kernel: kauditd_printk_skb: 149 callbacks suppressed Oct 31 05:25:12.315056 kernel: audit: type=1400 audit(1761888312.311:1058): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.315722 kernel: audit: type=1400 audit(1761888312.311:1059): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.315807 kernel: audit: type=1400 audit(1761888312.311:1060): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.315879 kernel: audit: type=1400 audit(1761888312.311:1061): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.316119 kernel: audit: type=1400 audit(1761888312.311:1062): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.316239 kernel: audit: type=1400 audit(1761888312.311:1063): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.316305 kernel: audit: type=1400 audit(1761888312.311:1064): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.316665 kernel: audit: type=1400 audit(1761888312.311:1065): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.316739 kernel: audit: type=1400 audit(1761888312.311:1066): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.316806 kernel: audit: type=1400 audit(1761888312.311:1067): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.311000 audit: BPF prog-id=143 op=LOAD Oct 31 05:25:12.312000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.312000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3665 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530343437633630636231363163346435353437633264356231383637 Oct 31 05:25:12.312000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.312000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3665 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530343437633630636231363163346435353437633264356231383637 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit: BPF prog-id=144 op=LOAD Oct 31 05:25:12.317000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003a07e0 items=0 ppid=3665 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530343437633630636231363163346435353437633264356231383637 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.317000 audit: BPF prog-id=145 op=LOAD Oct 31 05:25:12.317000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003a0828 items=0 ppid=3665 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530343437633630636231363163346435353437633264356231383637 Oct 31 05:25:12.318000 audit: BPF prog-id=145 op=UNLOAD Oct 31 05:25:12.318000 audit: BPF prog-id=144 op=UNLOAD Oct 31 05:25:12.318000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.318000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.318000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.318000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.318000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.318000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.318000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.318000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.318000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.318000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.318000 audit: BPF prog-id=146 op=LOAD Oct 31 05:25:12.318000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003a0c38 items=0 ppid=3665 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530343437633630636231363163346435353437633264356231383637 Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:11.276 [INFO][3498] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:11.319 [INFO][3498] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0 calico-apiserver-5cc6545496- calico-apiserver f505ca8a-1440-4ca4-ac04-92eb3b2080ce 964 0 2025-10-31 05:24:33 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5cc6545496 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-clgmo.gb1.brightbox.com calico-apiserver-5cc6545496-7xfb2 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie49dac0f8cd [] [] }} ContainerID="f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-7xfb2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-" Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:11.319 [INFO][3498] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-7xfb2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.018 [INFO][3576] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" HandleID="k8s-pod-network.f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.047 [INFO][3576] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" HandleID="k8s-pod-network.f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000327f40), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-clgmo.gb1.brightbox.com", "pod":"calico-apiserver-5cc6545496-7xfb2", "timestamp":"2025-10-31 05:25:12.018896234 +0000 UTC"}, Hostname:"srv-clgmo.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.048 [INFO][3576] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.049 [INFO][3576] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.049 [INFO][3576] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-clgmo.gb1.brightbox.com' Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.080 [INFO][3576] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.092 [INFO][3576] ipam/ipam.go 394: Looking up existing affinities for host host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.110 [INFO][3576] ipam/ipam.go 511: Trying affinity for 192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.140 [INFO][3576] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.151 [INFO][3576] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.151 [INFO][3576] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.160 [INFO][3576] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.170 [INFO][3576] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.188 [INFO][3576] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.71.131/26] block=192.168.71.128/26 handle="k8s-pod-network.f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.188 [INFO][3576] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.131/26] handle="k8s-pod-network.f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.189 [INFO][3576] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:12.354606 env[1193]: 2025-10-31 05:25:12.189 [INFO][3576] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.71.131/26] IPv6=[] ContainerID="f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" HandleID="k8s-pod-network.f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:12.356150 env[1193]: 2025-10-31 05:25:12.198 [INFO][3498] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-7xfb2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0", GenerateName:"calico-apiserver-5cc6545496-", Namespace:"calico-apiserver", SelfLink:"", UID:"f505ca8a-1440-4ca4-ac04-92eb3b2080ce", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cc6545496", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-5cc6545496-7xfb2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie49dac0f8cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:12.356150 env[1193]: 2025-10-31 05:25:12.200 [INFO][3498] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.131/32] ContainerID="f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-7xfb2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:12.356150 env[1193]: 2025-10-31 05:25:12.200 [INFO][3498] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie49dac0f8cd ContainerID="f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-7xfb2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:12.356150 env[1193]: 2025-10-31 05:25:12.286 [INFO][3498] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-7xfb2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:12.356150 env[1193]: 2025-10-31 05:25:12.286 [INFO][3498] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-7xfb2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0", GenerateName:"calico-apiserver-5cc6545496-", Namespace:"calico-apiserver", SelfLink:"", UID:"f505ca8a-1440-4ca4-ac04-92eb3b2080ce", ResourceVersion:"964", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cc6545496", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c", Pod:"calico-apiserver-5cc6545496-7xfb2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie49dac0f8cd", MAC:"16:d7:d7:ad:ea:d7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:12.356150 env[1193]: 2025-10-31 05:25:12.315 [INFO][3498] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-7xfb2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:12.416000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.416000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.416000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.416000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.416000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.416000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.416000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.416000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.416000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.416000 audit: BPF prog-id=147 op=LOAD Oct 31 05:25:12.416000 audit[3731]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff50b4cd80 a2=98 a3=1fffffffffffffff items=0 ppid=3249 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.416000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 05:25:12.416000 audit: BPF prog-id=147 op=UNLOAD Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit: BPF prog-id=148 op=LOAD Oct 31 05:25:12.419000 audit[3731]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff50b4cc60 a2=94 a3=3 items=0 ppid=3249 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.419000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 05:25:12.419000 audit: BPF prog-id=148 op=UNLOAD Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { bpf } for pid=3731 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit: BPF prog-id=149 op=LOAD Oct 31 05:25:12.419000 audit[3731]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff50b4cca0 a2=94 a3=7fff50b4ce80 items=0 ppid=3249 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.419000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 05:25:12.419000 audit: BPF prog-id=149 op=UNLOAD Oct 31 05:25:12.419000 audit[3731]: AVC avc: denied { perfmon } for pid=3731 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.419000 audit[3731]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff50b4cd70 a2=50 a3=a000000085 items=0 ppid=3249 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.419000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 31 05:25:12.439000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.439000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.439000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.439000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.439000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.439000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.439000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.439000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.439000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.439000 audit: BPF prog-id=150 op=LOAD Oct 31 05:25:12.439000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee698eb20 a2=98 a3=3 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.439000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:12.439000 audit: BPF prog-id=150 op=UNLOAD Oct 31 05:25:12.442298 env[1193]: time="2025-10-31T05:25:12.442232586Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit: BPF prog-id=151 op=LOAD Oct 31 05:25:12.441000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee698e910 a2=94 a3=54428f items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:12.441000 audit: BPF prog-id=151 op=UNLOAD Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.441000 audit: BPF prog-id=152 op=LOAD Oct 31 05:25:12.441000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee698e940 a2=94 a3=2 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.441000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:12.441000 audit: BPF prog-id=152 op=UNLOAD Oct 31 05:25:12.470647 env[1193]: time="2025-10-31T05:25:12.470413820Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 05:25:12.471476 kubelet[2031]: E1031 05:25:12.471388 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:25:12.472540 kubelet[2031]: E1031 05:25:12.472482 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:25:12.488899 kubelet[2031]: E1031 05:25:12.486121 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container whisker start failed in pod whisker-6c6db879c4-hvpcf_calico-system(c5bf3236-396f-4d92-8de8-ce437ec49156): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:12.506893 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali13c4f7a2fb4: link becomes ready Oct 31 05:25:12.508685 systemd-networkd[1013]: cali13c4f7a2fb4: Link UP Oct 31 05:25:12.509103 systemd-networkd[1013]: cali13c4f7a2fb4: Gained carrier Oct 31 05:25:12.533066 env[1193]: time="2025-10-31T05:25:12.533000661Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 05:25:12.550355 env[1193]: time="2025-10-31T05:25:12.550064183Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:25:12.550355 env[1193]: time="2025-10-31T05:25:12.550199251Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:25:12.550355 env[1193]: time="2025-10-31T05:25:12.550253731Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:25:12.550696 env[1193]: time="2025-10-31T05:25:12.550558689Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c pid=3744 runtime=io.containerd.runc.v2 Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:11.702 [INFO][3544] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:11.702 [INFO][3544] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" iface="eth0" netns="/var/run/netns/cni-23a854d0-ad49-fdc8-ce04-e57f74c03a25" Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:11.703 [INFO][3544] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" iface="eth0" netns="/var/run/netns/cni-23a854d0-ad49-fdc8-ce04-e57f74c03a25" Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:11.703 [INFO][3544] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" iface="eth0" netns="/var/run/netns/cni-23a854d0-ad49-fdc8-ce04-e57f74c03a25" Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:11.703 [INFO][3544] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:11.703 [INFO][3544] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:12.143 [INFO][3617] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" HandleID="k8s-pod-network.9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Workload="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:12.146 [INFO][3617] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:12.448 [INFO][3617] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:12.529 [WARNING][3617] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" HandleID="k8s-pod-network.9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Workload="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:12.529 [INFO][3617] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" HandleID="k8s-pod-network.9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Workload="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:12.551 [INFO][3617] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:12.608851 env[1193]: 2025-10-31 05:25:12.585 [INFO][3544] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:25:12.608851 env[1193]: time="2025-10-31T05:25:12.597439367Z" level=info msg="TearDown network for sandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\" successfully" Oct 31 05:25:12.608851 env[1193]: time="2025-10-31T05:25:12.597494586Z" level=info msg="StopPodSandbox for \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\" returns successfully" Oct 31 05:25:12.608851 env[1193]: time="2025-10-31T05:25:12.599172020Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-66bc5c9577-ngmnt,Uid:d9c3f104-ec6e-4a81-b201-05d6bbc995ee,Namespace:kube-system,Attempt:1,} returns sandbox id \"e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf\"" Oct 31 05:25:12.608851 env[1193]: time="2025-10-31T05:25:12.604225574Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cprzg,Uid:a6a56ae4-0d29-4361-8d53-116b2173dd54,Namespace:calico-system,Attempt:1,}" Oct 31 05:25:12.617628 env[1193]: time="2025-10-31T05:25:12.617571899Z" level=info msg="CreateContainer within sandbox \"e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:11.721 [INFO][3547] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:11.864 [INFO][3547] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0 calico-kube-controllers-65f7799b87- calico-system 440bdb2f-ff72-44c2-b0bc-e953f311f252 973 0 2025-10-31 05:24:40 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:65f7799b87 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-clgmo.gb1.brightbox.com calico-kube-controllers-65f7799b87-47jbs eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali13c4f7a2fb4 [] [] }} ContainerID="af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" Namespace="calico-system" Pod="calico-kube-controllers-65f7799b87-47jbs" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:11.864 [INFO][3547] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" Namespace="calico-system" Pod="calico-kube-controllers-65f7799b87-47jbs" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.091 [INFO][3632] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" HandleID="k8s-pod-network.af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.099 [INFO][3632] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" HandleID="k8s-pod-network.af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000123e30), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-clgmo.gb1.brightbox.com", "pod":"calico-kube-controllers-65f7799b87-47jbs", "timestamp":"2025-10-31 05:25:12.091648915 +0000 UTC"}, Hostname:"srv-clgmo.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.101 [INFO][3632] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.189 [INFO][3632] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.189 [INFO][3632] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-clgmo.gb1.brightbox.com' Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.250 [INFO][3632] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.288 [INFO][3632] ipam/ipam.go 394: Looking up existing affinities for host host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.380 [INFO][3632] ipam/ipam.go 511: Trying affinity for 192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.388 [INFO][3632] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.393 [INFO][3632] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.393 [INFO][3632] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.396 [INFO][3632] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909 Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.406 [INFO][3632] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.448 [INFO][3632] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.71.132/26] block=192.168.71.128/26 handle="k8s-pod-network.af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.448 [INFO][3632] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.132/26] handle="k8s-pod-network.af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.448 [INFO][3632] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:12.638151 env[1193]: 2025-10-31 05:25:12.448 [INFO][3632] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.71.132/26] IPv6=[] ContainerID="af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" HandleID="k8s-pod-network.af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:12.641713 env[1193]: 2025-10-31 05:25:12.474 [INFO][3547] cni-plugin/k8s.go 418: Populated endpoint ContainerID="af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" Namespace="calico-system" Pod="calico-kube-controllers-65f7799b87-47jbs" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0", GenerateName:"calico-kube-controllers-65f7799b87-", Namespace:"calico-system", SelfLink:"", UID:"440bdb2f-ff72-44c2-b0bc-e953f311f252", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65f7799b87", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-65f7799b87-47jbs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.71.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali13c4f7a2fb4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:12.641713 env[1193]: 2025-10-31 05:25:12.474 [INFO][3547] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.132/32] ContainerID="af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" Namespace="calico-system" Pod="calico-kube-controllers-65f7799b87-47jbs" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:12.641713 env[1193]: 2025-10-31 05:25:12.474 [INFO][3547] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali13c4f7a2fb4 ContainerID="af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" Namespace="calico-system" Pod="calico-kube-controllers-65f7799b87-47jbs" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:12.641713 env[1193]: 2025-10-31 05:25:12.511 [INFO][3547] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" Namespace="calico-system" Pod="calico-kube-controllers-65f7799b87-47jbs" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:12.641713 env[1193]: 2025-10-31 05:25:12.514 [INFO][3547] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" Namespace="calico-system" Pod="calico-kube-controllers-65f7799b87-47jbs" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0", GenerateName:"calico-kube-controllers-65f7799b87-", Namespace:"calico-system", SelfLink:"", UID:"440bdb2f-ff72-44c2-b0bc-e953f311f252", ResourceVersion:"973", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65f7799b87", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909", Pod:"calico-kube-controllers-65f7799b87-47jbs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.71.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali13c4f7a2fb4", MAC:"42:54:13:21:f2:ba", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:12.641713 env[1193]: 2025-10-31 05:25:12.618 [INFO][3547] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909" Namespace="calico-system" Pod="calico-kube-controllers-65f7799b87-47jbs" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:12.672054 systemd[1]: Started cri-containerd-f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c.scope. Oct 31 05:25:12.711252 env[1193]: time="2025-10-31T05:25:12.711181276Z" level=info msg="CreateContainer within sandbox \"e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7d732184bd739357fe1457f0e45255aafa202eebbeb7df0ffaef6c433e62ea86\"" Oct 31 05:25:12.716237 systemd-networkd[1013]: califfd5571249d: Link UP Oct 31 05:25:12.721540 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califfd5571249d: link becomes ready Oct 31 05:25:12.719903 systemd-networkd[1013]: califfd5571249d: Gained carrier Oct 31 05:25:12.735303 env[1193]: time="2025-10-31T05:25:12.722889628Z" level=info msg="StartContainer for \"7d732184bd739357fe1457f0e45255aafa202eebbeb7df0ffaef6c433e62ea86\"" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:11.349 [INFO][3473] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:11.491 [INFO][3473] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0 calico-apiserver-5cc6545496- calico-apiserver 81bbb4a4-a415-4abc-a7fd-1a75817e45aa 971 0 2025-10-31 05:24:33 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5cc6545496 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-clgmo.gb1.brightbox.com calico-apiserver-5cc6545496-bzmv2 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] califfd5571249d [] [] }} ContainerID="af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-bzmv2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:11.491 [INFO][3473] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-bzmv2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.169 [INFO][3598] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" HandleID="k8s-pod-network.af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.177 [INFO][3598] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" HandleID="k8s-pod-network.af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00036fe00), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-clgmo.gb1.brightbox.com", "pod":"calico-apiserver-5cc6545496-bzmv2", "timestamp":"2025-10-31 05:25:12.169725469 +0000 UTC"}, Hostname:"srv-clgmo.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.177 [INFO][3598] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.553 [INFO][3598] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.553 [INFO][3598] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-clgmo.gb1.brightbox.com' Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.621 [INFO][3598] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.639 [INFO][3598] ipam/ipam.go 394: Looking up existing affinities for host host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.647 [INFO][3598] ipam/ipam.go 511: Trying affinity for 192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.650 [INFO][3598] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.654 [INFO][3598] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.654 [INFO][3598] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.657 [INFO][3598] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5 Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.665 [INFO][3598] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.683 [INFO][3598] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.71.133/26] block=192.168.71.128/26 handle="k8s-pod-network.af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.683 [INFO][3598] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.133/26] handle="k8s-pod-network.af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.683 [INFO][3598] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:12.748870 env[1193]: 2025-10-31 05:25:12.684 [INFO][3598] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.71.133/26] IPv6=[] ContainerID="af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" HandleID="k8s-pod-network.af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:12.750666 env[1193]: 2025-10-31 05:25:12.692 [INFO][3473] cni-plugin/k8s.go 418: Populated endpoint ContainerID="af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-bzmv2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0", GenerateName:"calico-apiserver-5cc6545496-", Namespace:"calico-apiserver", SelfLink:"", UID:"81bbb4a4-a415-4abc-a7fd-1a75817e45aa", ResourceVersion:"971", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cc6545496", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-5cc6545496-bzmv2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califfd5571249d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:12.750666 env[1193]: 2025-10-31 05:25:12.693 [INFO][3473] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.133/32] ContainerID="af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-bzmv2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:12.750666 env[1193]: 2025-10-31 05:25:12.693 [INFO][3473] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califfd5571249d ContainerID="af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-bzmv2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:12.750666 env[1193]: 2025-10-31 05:25:12.723 [INFO][3473] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-bzmv2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:12.750666 env[1193]: 2025-10-31 05:25:12.724 [INFO][3473] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-bzmv2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0", GenerateName:"calico-apiserver-5cc6545496-", Namespace:"calico-apiserver", SelfLink:"", UID:"81bbb4a4-a415-4abc-a7fd-1a75817e45aa", ResourceVersion:"971", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cc6545496", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5", Pod:"calico-apiserver-5cc6545496-bzmv2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califfd5571249d", MAC:"a6:3f:cd:0f:25:3c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:12.750666 env[1193]: 2025-10-31 05:25:12.746 [INFO][3473] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5" Namespace="calico-apiserver" Pod="calico-apiserver-5cc6545496-bzmv2" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.779000 audit: BPF prog-id=153 op=LOAD Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3744 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356366656332363232373836336134623739373261303135383332 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3744 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356366656332363232373836336134623739373261303135383332 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit: BPF prog-id=154 op=LOAD Oct 31 05:25:12.780000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001eb3f0 items=0 ppid=3744 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356366656332363232373836336134623739373261303135383332 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit: BPF prog-id=155 op=LOAD Oct 31 05:25:12.780000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001eb438 items=0 ppid=3744 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356366656332363232373836336134623739373261303135383332 Oct 31 05:25:12.780000 audit: BPF prog-id=155 op=UNLOAD Oct 31 05:25:12.780000 audit: BPF prog-id=154 op=UNLOAD Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.780000 audit: BPF prog-id=156 op=LOAD Oct 31 05:25:12.780000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001eb848 items=0 ppid=3744 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638356366656332363232373836336134623739373261303135383332 Oct 31 05:25:12.823229 env[1193]: time="2025-10-31T05:25:12.823096070Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:25:12.823595 env[1193]: time="2025-10-31T05:25:12.823524054Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:25:12.823684 env[1193]: time="2025-10-31T05:25:12.823634949Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:25:12.824751 env[1193]: time="2025-10-31T05:25:12.824657663Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909 pid=3818 runtime=io.containerd.runc.v2 Oct 31 05:25:12.854629 systemd-networkd[1013]: cali00ed381f29d: Link UP Oct 31 05:25:12.869590 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 31 05:25:12.870129 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali00ed381f29d: link becomes ready Oct 31 05:25:12.863309 systemd-networkd[1013]: cali00ed381f29d: Gained carrier Oct 31 05:25:12.868236 systemd[1]: Started cri-containerd-7d732184bd739357fe1457f0e45255aafa202eebbeb7df0ffaef6c433e62ea86.scope. Oct 31 05:25:12.903317 env[1193]: time="2025-10-31T05:25:12.903148178Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:25:12.903317 env[1193]: time="2025-10-31T05:25:12.903239120Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:25:12.903317 env[1193]: time="2025-10-31T05:25:12.903257832Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:25:12.910563 env[1193]: time="2025-10-31T05:25:12.910497125Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:12.910719 env[1193]: time="2025-10-31T05:25:12.908462123Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5 pid=3850 runtime=io.containerd.runc.v2 Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:11.582 [INFO][3533] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:11.678 [INFO][3533] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0 goldmane-7c778bb748- calico-system bc04009c-ce79-4cda-91a6-dd78e1ed2ba7 970 0 2025-10-31 05:24:38 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:7c778bb748 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s srv-clgmo.gb1.brightbox.com goldmane-7c778bb748-4spgj eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali00ed381f29d [] [] }} ContainerID="43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" Namespace="calico-system" Pod="goldmane-7c778bb748-4spgj" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-" Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:11.678 [INFO][3533] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" Namespace="calico-system" Pod="goldmane-7c778bb748-4spgj" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.202 [INFO][3616] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" HandleID="k8s-pod-network.43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" Workload="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.203 [INFO][3616] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" HandleID="k8s-pod-network.43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" Workload="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000326c00), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-clgmo.gb1.brightbox.com", "pod":"goldmane-7c778bb748-4spgj", "timestamp":"2025-10-31 05:25:12.20246898 +0000 UTC"}, Hostname:"srv-clgmo.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.205 [INFO][3616] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.684 [INFO][3616] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.684 [INFO][3616] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-clgmo.gb1.brightbox.com' Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.722 [INFO][3616] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.744 [INFO][3616] ipam/ipam.go 394: Looking up existing affinities for host host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.786 [INFO][3616] ipam/ipam.go 511: Trying affinity for 192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.793 [INFO][3616] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.797 [INFO][3616] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.797 [INFO][3616] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.806 [INFO][3616] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0 Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.817 [INFO][3616] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.834 [INFO][3616] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.71.134/26] block=192.168.71.128/26 handle="k8s-pod-network.43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.834 [INFO][3616] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.134/26] handle="k8s-pod-network.43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.834 [INFO][3616] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:12.944208 env[1193]: 2025-10-31 05:25:12.834 [INFO][3616] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.71.134/26] IPv6=[] ContainerID="43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" HandleID="k8s-pod-network.43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" Workload="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:12.946123 env[1193]: 2025-10-31 05:25:12.838 [INFO][3533] cni-plugin/k8s.go 418: Populated endpoint ContainerID="43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" Namespace="calico-system" Pod="goldmane-7c778bb748-4spgj" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0", GenerateName:"goldmane-7c778bb748-", Namespace:"calico-system", SelfLink:"", UID:"bc04009c-ce79-4cda-91a6-dd78e1ed2ba7", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"7c778bb748", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"", Pod:"goldmane-7c778bb748-4spgj", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.71.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali00ed381f29d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:12.946123 env[1193]: 2025-10-31 05:25:12.839 [INFO][3533] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.134/32] ContainerID="43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" Namespace="calico-system" Pod="goldmane-7c778bb748-4spgj" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:12.946123 env[1193]: 2025-10-31 05:25:12.839 [INFO][3533] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali00ed381f29d ContainerID="43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" Namespace="calico-system" Pod="goldmane-7c778bb748-4spgj" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:12.946123 env[1193]: 2025-10-31 05:25:12.875 [INFO][3533] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" Namespace="calico-system" Pod="goldmane-7c778bb748-4spgj" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:12.946123 env[1193]: 2025-10-31 05:25:12.876 [INFO][3533] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" Namespace="calico-system" Pod="goldmane-7c778bb748-4spgj" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0", GenerateName:"goldmane-7c778bb748-", Namespace:"calico-system", SelfLink:"", UID:"bc04009c-ce79-4cda-91a6-dd78e1ed2ba7", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"7c778bb748", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0", Pod:"goldmane-7c778bb748-4spgj", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.71.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali00ed381f29d", MAC:"ae:99:fd:ef:9d:7d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:12.946123 env[1193]: 2025-10-31 05:25:12.932 [INFO][3533] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0" Namespace="calico-system" Pod="goldmane-7c778bb748-4spgj" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:12.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.968000 audit: BPF prog-id=157 op=LOAD Oct 31 05:25:12.970000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.970000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3665 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764373332313834626437333933353766653134353766306534353235 Oct 31 05:25:12.970000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.970000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3665 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764373332313834626437333933353766653134353766306534353235 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit: BPF prog-id=158 op=LOAD Oct 31 05:25:12.973000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002070b0 items=0 ppid=3665 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764373332313834626437333933353766653134353766306534353235 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit: BPF prog-id=159 op=LOAD Oct 31 05:25:12.973000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002070f8 items=0 ppid=3665 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764373332313834626437333933353766653134353766306534353235 Oct 31 05:25:12.973000 audit: BPF prog-id=159 op=UNLOAD Oct 31 05:25:12.973000 audit: BPF prog-id=158 op=UNLOAD Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { perfmon } for pid=3830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit[3830]: AVC avc: denied { bpf } for pid=3830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:12.973000 audit: BPF prog-id=160 op=LOAD Oct 31 05:25:12.973000 audit[3830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000207508 items=0 ppid=3665 pid=3830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:12.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764373332313834626437333933353766653134353766306534353235 Oct 31 05:25:12.982724 env[1193]: time="2025-10-31T05:25:12.979612556Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 05:25:12.982880 kubelet[2031]: E1031 05:25:12.980165 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:25:12.982880 kubelet[2031]: E1031 05:25:12.980299 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:25:12.982880 kubelet[2031]: E1031 05:25:12.981050 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container whisker-backend start failed in pod whisker-6c6db879c4-hvpcf_calico-system(c5bf3236-396f-4d92-8de8-ce437ec49156): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:12.983675 kubelet[2031]: E1031 05:25:12.983581 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6c6db879c4-hvpcf" podUID="c5bf3236-396f-4d92-8de8-ce437ec49156" Oct 31 05:25:12.996940 systemd[1]: Started cri-containerd-af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5.scope. Oct 31 05:25:13.040077 systemd[1]: Started cri-containerd-af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909.scope. Oct 31 05:25:13.061173 systemd[1]: run-netns-cni\x2d23a854d0\x2dad49\x2dfdc8\x2dce04\x2de57f74c03a25.mount: Deactivated successfully. Oct 31 05:25:13.102094 systemd-networkd[1013]: cali430526e3b0f: Link UP Oct 31 05:25:13.103930 systemd-networkd[1013]: cali430526e3b0f: Gained carrier Oct 31 05:25:13.108203 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali430526e3b0f: link becomes ready Oct 31 05:25:13.130156 systemd-networkd[1013]: cali7ca9ddb495f: Gained IPv6LL Oct 31 05:25:13.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.152000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.152000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.152000 audit: BPF prog-id=161 op=LOAD Oct 31 05:25:13.153000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.153000 audit[3871]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3850 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166333730393438663133336437636265633732326434663965303935 Oct 31 05:25:13.153000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.153000 audit[3871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3850 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166333730393438663133336437636265633732326434663965303935 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit: BPF prog-id=162 op=LOAD Oct 31 05:25:13.154000 audit[3871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00035c170 items=0 ppid=3850 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166333730393438663133336437636265633732326434663965303935 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit: BPF prog-id=163 op=LOAD Oct 31 05:25:13.154000 audit[3871]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00035c1b8 items=0 ppid=3850 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166333730393438663133336437636265633732326434663965303935 Oct 31 05:25:13.154000 audit: BPF prog-id=163 op=UNLOAD Oct 31 05:25:13.154000 audit: BPF prog-id=162 op=UNLOAD Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { perfmon } for pid=3871 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit[3871]: AVC avc: denied { bpf } for pid=3871 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.154000 audit: BPF prog-id=164 op=LOAD Oct 31 05:25:13.154000 audit[3871]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00035c5c8 items=0 ppid=3850 pid=3871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166333730393438663133336437636265633732326434663965303935 Oct 31 05:25:13.170593 env[1193]: time="2025-10-31T05:25:13.170516095Z" level=info msg="StartContainer for \"7d732184bd739357fe1457f0e45255aafa202eebbeb7df0ffaef6c433e62ea86\" returns successfully" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:12.518 [INFO][3647] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0 coredns-66bc5c9577- kube-system 0c9303bc-5dc8-420a-b98f-17f88112d207 977 0 2025-10-31 05:24:20 +0000 UTC map[k8s-app:kube-dns pod-template-hash:66bc5c9577 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-clgmo.gb1.brightbox.com coredns-66bc5c9577-4k4fh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali430526e3b0f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 } {liveness-probe TCP 8080 0 } {readiness-probe TCP 8181 0 }] [] }} ContainerID="3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" Namespace="kube-system" Pod="coredns-66bc5c9577-4k4fh" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:12.519 [INFO][3647] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" Namespace="kube-system" Pod="coredns-66bc5c9577-4k4fh" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:12.791 [INFO][3767] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" HandleID="k8s-pod-network.3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:12.792 [INFO][3767] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" HandleID="k8s-pod-network.3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cdc50), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-clgmo.gb1.brightbox.com", "pod":"coredns-66bc5c9577-4k4fh", "timestamp":"2025-10-31 05:25:12.791956569 +0000 UTC"}, Hostname:"srv-clgmo.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:12.792 [INFO][3767] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:12.834 [INFO][3767] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:12.835 [INFO][3767] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-clgmo.gb1.brightbox.com' Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:12.875 [INFO][3767] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:12.941 [INFO][3767] ipam/ipam.go 394: Looking up existing affinities for host host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:12.975 [INFO][3767] ipam/ipam.go 511: Trying affinity for 192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:12.990 [INFO][3767] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:13.005 [INFO][3767] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:13.005 [INFO][3767] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:13.016 [INFO][3767] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3 Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:13.034 [INFO][3767] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:13.070 [INFO][3767] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.71.135/26] block=192.168.71.128/26 handle="k8s-pod-network.3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:13.070 [INFO][3767] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.135/26] handle="k8s-pod-network.3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:13.070 [INFO][3767] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:13.186649 env[1193]: 2025-10-31 05:25:13.070 [INFO][3767] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.71.135/26] IPv6=[] ContainerID="3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" HandleID="k8s-pod-network.3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:13.188090 env[1193]: 2025-10-31 05:25:13.075 [INFO][3647] cni-plugin/k8s.go 418: Populated endpoint ContainerID="3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" Namespace="kube-system" Pod="coredns-66bc5c9577-4k4fh" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0", GenerateName:"coredns-66bc5c9577-", Namespace:"kube-system", SelfLink:"", UID:"0c9303bc-5dc8-420a-b98f-17f88112d207", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"66bc5c9577", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"", Pod:"coredns-66bc5c9577-4k4fh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali430526e3b0f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"liveness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1f90, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"readiness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1ff5, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:13.188090 env[1193]: 2025-10-31 05:25:13.075 [INFO][3647] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.135/32] ContainerID="3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" Namespace="kube-system" Pod="coredns-66bc5c9577-4k4fh" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:13.188090 env[1193]: 2025-10-31 05:25:13.075 [INFO][3647] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali430526e3b0f ContainerID="3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" Namespace="kube-system" Pod="coredns-66bc5c9577-4k4fh" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:13.188090 env[1193]: 2025-10-31 05:25:13.115 [INFO][3647] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" Namespace="kube-system" Pod="coredns-66bc5c9577-4k4fh" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:13.188090 env[1193]: 2025-10-31 05:25:13.139 [INFO][3647] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" Namespace="kube-system" Pod="coredns-66bc5c9577-4k4fh" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0", GenerateName:"coredns-66bc5c9577-", Namespace:"kube-system", SelfLink:"", UID:"0c9303bc-5dc8-420a-b98f-17f88112d207", ResourceVersion:"977", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"66bc5c9577", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3", Pod:"coredns-66bc5c9577-4k4fh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali430526e3b0f", MAC:"6a:37:a7:d3:ae:af", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"liveness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1f90, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"readiness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1ff5, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:13.188545 env[1193]: 2025-10-31 05:25:13.179 [INFO][3647] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3" Namespace="kube-system" Pod="coredns-66bc5c9577-4k4fh" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:13.204460 env[1193]: time="2025-10-31T05:25:13.204281490Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:25:13.204819 env[1193]: time="2025-10-31T05:25:13.204749584Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:25:13.205215 env[1193]: time="2025-10-31T05:25:13.205146862Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:25:13.210176 env[1193]: time="2025-10-31T05:25:13.210072975Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0 pid=3913 runtime=io.containerd.runc.v2 Oct 31 05:25:13.250922 env[1193]: time="2025-10-31T05:25:13.250853197Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cc6545496-7xfb2,Uid:f505ca8a-1440-4ca4-ac04-92eb3b2080ce,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c\"" Oct 31 05:25:13.253832 env[1193]: time="2025-10-31T05:25:13.253792621Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:25:13.270736 env[1193]: time="2025-10-31T05:25:13.263936459Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:25:13.270736 env[1193]: time="2025-10-31T05:25:13.264052342Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:25:13.270736 env[1193]: time="2025-10-31T05:25:13.264071953Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:25:13.270736 env[1193]: time="2025-10-31T05:25:13.264386276Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3 pid=3962 runtime=io.containerd.runc.v2 Oct 31 05:25:13.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.272000 audit: BPF prog-id=165 op=LOAD Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3818 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313432303063326133333431303364323765616565346635663663 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3818 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313432303063326133333431303364323765616565346635663663 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit: BPF prog-id=166 op=LOAD Oct 31 05:25:13.273000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000304db0 items=0 ppid=3818 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313432303063326133333431303364323765616565346635663663 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit: BPF prog-id=167 op=LOAD Oct 31 05:25:13.273000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000304df8 items=0 ppid=3818 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313432303063326133333431303364323765616565346635663663 Oct 31 05:25:13.273000 audit: BPF prog-id=167 op=UNLOAD Oct 31 05:25:13.273000 audit: BPF prog-id=166 op=UNLOAD Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { perfmon } for pid=3858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit[3858]: AVC avc: denied { bpf } for pid=3858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.273000 audit: BPF prog-id=168 op=LOAD Oct 31 05:25:13.273000 audit[3858]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000305208 items=0 ppid=3818 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313432303063326133333431303364323765616565346635663663 Oct 31 05:25:13.356660 kubelet[2031]: E1031 05:25:13.356567 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6c6db879c4-hvpcf" podUID="c5bf3236-396f-4d92-8de8-ce437ec49156" Oct 31 05:25:13.398195 systemd[1]: Started cri-containerd-43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0.scope. Oct 31 05:25:13.457681 systemd[1]: Started cri-containerd-3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3.scope. Oct 31 05:25:13.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.519000 audit: BPF prog-id=169 op=LOAD Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3962 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653135326333656639636565613138626137666630336331633938 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3962 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653135326333656639636565613138626137666630336331633938 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit: BPF prog-id=170 op=LOAD Oct 31 05:25:13.520000 audit[3975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003465d0 items=0 ppid=3962 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653135326333656639636565613138626137666630336331633938 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit: BPF prog-id=171 op=LOAD Oct 31 05:25:13.520000 audit[3975]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000346618 items=0 ppid=3962 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653135326333656639636565613138626137666630336331633938 Oct 31 05:25:13.520000 audit: BPF prog-id=171 op=UNLOAD Oct 31 05:25:13.520000 audit: BPF prog-id=170 op=UNLOAD Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { perfmon } for pid=3975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit[3975]: AVC avc: denied { bpf } for pid=3975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.520000 audit: BPF prog-id=172 op=LOAD Oct 31 05:25:13.520000 audit[3975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000346a28 items=0 ppid=3962 pid=3975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653135326333656639636565613138626137666630336331633938 Oct 31 05:25:13.540068 kubelet[2031]: I1031 05:25:13.537016 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-66bc5c9577-ngmnt" podStartSLOduration=53.536936587 podStartE2EDuration="53.536936587s" podCreationTimestamp="2025-10-31 05:24:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:25:13.388663678 +0000 UTC m=+56.881397937" watchObservedRunningTime="2025-10-31 05:25:13.536936587 +0000 UTC m=+57.029670835" Oct 31 05:25:13.584499 env[1193]: time="2025-10-31T05:25:13.584435411Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:13.586597 env[1193]: time="2025-10-31T05:25:13.586522778Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:25:13.587841 kubelet[2031]: E1031 05:25:13.587081 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:25:13.587841 kubelet[2031]: E1031 05:25:13.587153 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:25:13.587841 kubelet[2031]: E1031 05:25:13.587377 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-apiserver start failed in pod calico-apiserver-5cc6545496-7xfb2_calico-apiserver(f505ca8a-1440-4ca4-ac04-92eb3b2080ce): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:13.587841 kubelet[2031]: E1031 05:25:13.587449 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" podUID="f505ca8a-1440-4ca4-ac04-92eb3b2080ce" Oct 31 05:25:13.609084 env[1193]: time="2025-10-31T05:25:13.609009425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-66bc5c9577-4k4fh,Uid:0c9303bc-5dc8-420a-b98f-17f88112d207,Namespace:kube-system,Attempt:1,} returns sandbox id \"3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3\"" Oct 31 05:25:13.618518 env[1193]: time="2025-10-31T05:25:13.618455644Z" level=info msg="CreateContainer within sandbox \"3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 31 05:25:13.647717 env[1193]: time="2025-10-31T05:25:13.647632443Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5cc6545496-bzmv2,Uid:81bbb4a4-a415-4abc-a7fd-1a75817e45aa,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5\"" Oct 31 05:25:13.652361 env[1193]: time="2025-10-31T05:25:13.652281899Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:25:13.658281 systemd-networkd[1013]: calicdc9190db0e: Link UP Oct 31 05:25:13.677967 env[1193]: time="2025-10-31T05:25:13.676655845Z" level=info msg="CreateContainer within sandbox \"3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"df7c8a9fb589371a6df93cea9f0d162ef91b9a99de52e1391be90c3a0bf44b9e\"" Oct 31 05:25:13.678782 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicdc9190db0e: link becomes ready Oct 31 05:25:13.678443 systemd-networkd[1013]: calicdc9190db0e: Gained carrier Oct 31 05:25:13.690048 env[1193]: time="2025-10-31T05:25:13.689978307Z" level=info msg="StartContainer for \"df7c8a9fb589371a6df93cea9f0d162ef91b9a99de52e1391be90c3a0bf44b9e\"" Oct 31 05:25:13.704000 audit[3863]: AVC avc: denied { getattr } for pid=3863 comm="coredns" path="cgroup:[4026532864]" dev="nsfs" ino=4026532864 scontext=system_u:system_r:svirt_lxc_net_t:s0:c152,c829 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 31 05:25:13.704000 audit[3863]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00014eb70 a2=c0004ccfa8 a3=0 items=0 ppid=3665 pid=3863 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c152,c829 key=(null) Oct 31 05:25:13.704000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 31 05:25:13.719000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.719000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.719000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.719000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.719000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.719000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.719000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.719000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.719000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.719000 audit: BPF prog-id=173 op=LOAD Oct 31 05:25:13.719000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffee698e800 a2=94 a3=1 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.719000 audit: BPF prog-id=173 op=UNLOAD Oct 31 05:25:13.719000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.719000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffee698e8d0 a2=50 a3=7ffee698e9b0 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:12.964 [INFO][3783] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0 csi-node-driver- calico-system a6a56ae4-0d29-4361-8d53-116b2173dd54 978 0 2025-10-31 05:24:40 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:9d99788f7 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-clgmo.gb1.brightbox.com csi-node-driver-cprzg eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calicdc9190db0e [] [] }} ContainerID="c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" Namespace="calico-system" Pod="csi-node-driver-cprzg" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-" Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:12.964 [INFO][3783] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" Namespace="calico-system" Pod="csi-node-driver-cprzg" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.426 [INFO][3892] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" HandleID="k8s-pod-network.c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" Workload="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.433 [INFO][3892] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" HandleID="k8s-pod-network.c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" Workload="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00034c270), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-clgmo.gb1.brightbox.com", "pod":"csi-node-driver-cprzg", "timestamp":"2025-10-31 05:25:13.42654835 +0000 UTC"}, Hostname:"srv-clgmo.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.433 [INFO][3892] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.433 [INFO][3892] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.433 [INFO][3892] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-clgmo.gb1.brightbox.com' Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.513 [INFO][3892] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.559 [INFO][3892] ipam/ipam.go 394: Looking up existing affinities for host host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.576 [INFO][3892] ipam/ipam.go 511: Trying affinity for 192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.582 [INFO][3892] ipam/ipam.go 158: Attempting to load block cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.592 [INFO][3892] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.71.128/26 host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.593 [INFO][3892] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.71.128/26 handle="k8s-pod-network.c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.599 [INFO][3892] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9 Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.619 [INFO][3892] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.71.128/26 handle="k8s-pod-network.c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.644 [INFO][3892] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.71.136/26] block=192.168.71.128/26 handle="k8s-pod-network.c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.644 [INFO][3892] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.71.136/26] handle="k8s-pod-network.c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" host="srv-clgmo.gb1.brightbox.com" Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.645 [INFO][3892] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:13.727158 env[1193]: 2025-10-31 05:25:13.645 [INFO][3892] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.71.136/26] IPv6=[] ContainerID="c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" HandleID="k8s-pod-network.c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" Workload="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:13.728386 env[1193]: 2025-10-31 05:25:13.652 [INFO][3783] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" Namespace="calico-system" Pod="csi-node-driver-cprzg" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a6a56ae4-0d29-4361-8d53-116b2173dd54", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-cprzg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.71.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicdc9190db0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:13.728386 env[1193]: 2025-10-31 05:25:13.652 [INFO][3783] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.71.136/32] ContainerID="c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" Namespace="calico-system" Pod="csi-node-driver-cprzg" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:13.728386 env[1193]: 2025-10-31 05:25:13.652 [INFO][3783] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicdc9190db0e ContainerID="c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" Namespace="calico-system" Pod="csi-node-driver-cprzg" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:13.728386 env[1193]: 2025-10-31 05:25:13.678 [INFO][3783] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" Namespace="calico-system" Pod="csi-node-driver-cprzg" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:13.728386 env[1193]: 2025-10-31 05:25:13.692 [INFO][3783] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" Namespace="calico-system" Pod="csi-node-driver-cprzg" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a6a56ae4-0d29-4361-8d53-116b2173dd54", ResourceVersion:"978", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9", Pod:"csi-node-driver-cprzg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.71.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicdc9190db0e", MAC:"2a:db:c3:d6:2c:64", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:13.728386 env[1193]: 2025-10-31 05:25:13.722 [INFO][3783] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9" Namespace="calico-system" Pod="csi-node-driver-cprzg" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:13.775641 systemd[1]: Started cri-containerd-df7c8a9fb589371a6df93cea9f0d162ef91b9a99de52e1391be90c3a0bf44b9e.scope. Oct 31 05:25:13.780640 env[1193]: time="2025-10-31T05:25:13.780548479Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65f7799b87-47jbs,Uid:440bdb2f-ff72-44c2-b0bc-e953f311f252,Namespace:calico-system,Attempt:1,} returns sandbox id \"af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909\"" Oct 31 05:25:13.782480 env[1193]: time="2025-10-31T05:25:13.781465668Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 31 05:25:13.782480 env[1193]: time="2025-10-31T05:25:13.781543240Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 31 05:25:13.782480 env[1193]: time="2025-10-31T05:25:13.781562342Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 31 05:25:13.782480 env[1193]: time="2025-10-31T05:25:13.781854899Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9 pid=4049 runtime=io.containerd.runc.v2 Oct 31 05:25:13.813886 systemd[1]: Started cri-containerd-c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9.scope. Oct 31 05:25:13.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.820000 audit: BPF prog-id=174 op=LOAD Oct 31 05:25:13.821000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.821000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3913 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623838663732353561393966363038373230663130346666363864 Oct 31 05:25:13.822000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.822000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3913 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623838663732353561393966363038373230663130346666363864 Oct 31 05:25:13.822000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.822000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.822000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.822000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.822000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.822000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.822000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.822000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.822000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.822000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.822000 audit: BPF prog-id=175 op=LOAD Oct 31 05:25:13.822000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038a0d0 items=0 ppid=3913 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623838663732353561393966363038373230663130346666363864 Oct 31 05:25:13.824000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.824000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.824000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.824000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.824000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.824000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.824000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.824000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.824000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.824000 audit: BPF prog-id=176 op=LOAD Oct 31 05:25:13.824000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038a118 items=0 ppid=3913 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623838663732353561393966363038373230663130346666363864 Oct 31 05:25:13.828000 audit: BPF prog-id=176 op=UNLOAD Oct 31 05:25:13.828000 audit: BPF prog-id=175 op=UNLOAD Oct 31 05:25:13.828000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.828000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.828000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.828000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.828000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.828000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.828000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.828000 audit[3945]: AVC avc: denied { perfmon } for pid=3945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.828000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.828000 audit[3945]: AVC avc: denied { bpf } for pid=3945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.828000 audit: BPF prog-id=177 op=LOAD Oct 31 05:25:13.828000 audit[3945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038a528 items=0 ppid=3913 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623838663732353561393966363038373230663130346666363864 Oct 31 05:25:13.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.837000 audit: BPF prog-id=178 op=LOAD Oct 31 05:25:13.838000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.838000 audit[4033]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3962 pid=4033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466376338613966623538393337316136646639336365613966306431 Oct 31 05:25:13.838000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.838000 audit[4033]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3962 pid=4033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466376338613966623538393337316136646639336365613966306431 Oct 31 05:25:13.839000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.839000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.839000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.839000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.839000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.839000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.839000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.839000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.839000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.839000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.839000 audit: BPF prog-id=179 op=LOAD Oct 31 05:25:13.839000 audit[4033]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e4cb0 items=0 ppid=3962 pid=4033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466376338613966623538393337316136646639336365613966306431 Oct 31 05:25:13.840000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.840000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.840000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.840000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.840000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.840000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.840000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.840000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.840000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.840000 audit: BPF prog-id=180 op=LOAD Oct 31 05:25:13.840000 audit[4033]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e4cf8 items=0 ppid=3962 pid=4033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466376338613966623538393337316136646639336365613966306431 Oct 31 05:25:13.842000 audit: BPF prog-id=180 op=UNLOAD Oct 31 05:25:13.843000 audit: BPF prog-id=179 op=UNLOAD Oct 31 05:25:13.843000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.843000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.843000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.843000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.843000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.843000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.843000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.843000 audit[4033]: AVC avc: denied { perfmon } for pid=4033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.843000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.843000 audit[4033]: AVC avc: denied { bpf } for pid=4033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.843000 audit: BPF prog-id=181 op=LOAD Oct 31 05:25:13.843000 audit[4033]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e5108 items=0 ppid=3962 pid=4033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466376338613966623538393337316136646639336365613966306431 Oct 31 05:25:13.856000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.856000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee698e810 a2=28 a3=0 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.856000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.856000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.856000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee698e840 a2=28 a3=0 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.856000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.857000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.857000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee698e750 a2=28 a3=0 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.857000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.858000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.858000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee698e860 a2=28 a3=0 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.858000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.858000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.858000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee698e840 a2=28 a3=0 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.858000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.859000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.859000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee698e830 a2=28 a3=0 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.859000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.859000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.859000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee698e860 a2=28 a3=0 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.859000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.860000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.860000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee698e840 a2=28 a3=0 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.860000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.861000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.861000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee698e860 a2=28 a3=0 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.861000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.861000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.861000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee698e830 a2=28 a3=0 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.861000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.862000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.862000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffee698e8a0 a2=28 a3=0 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.865000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.865000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee698e650 a2=50 a3=1 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.865000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.866000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.866000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.866000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.866000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.866000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.866000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.866000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.866000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.866000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.866000 audit: BPF prog-id=182 op=LOAD Oct 31 05:25:13.866000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee698e650 a2=94 a3=5 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.866000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.867000 audit: BPF prog-id=182 op=UNLOAD Oct 31 05:25:13.867000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.867000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffee698e700 a2=50 a3=1 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.867000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.868000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.868000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffee698e820 a2=4 a3=38 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.868000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.869000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.869000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.869000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.869000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.869000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.869000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.869000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.869000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.869000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.869000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.869000 audit[3742]: AVC avc: denied { confidentiality } for pid=3742 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:25:13.869000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee698e870 a2=94 a3=6 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.869000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.872000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.872000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.872000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.872000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.872000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.872000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.872000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.872000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.872000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.872000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.872000 audit[3742]: AVC avc: denied { confidentiality } for pid=3742 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:25:13.872000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee698e020 a2=94 a3=88 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.872000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.874000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.874000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.874000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.874000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.874000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.874000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.874000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.874000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.874000 audit[3742]: AVC avc: denied { perfmon } for pid=3742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.874000 audit[3742]: AVC avc: denied { bpf } for pid=3742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.874000 audit[3742]: AVC avc: denied { confidentiality } for pid=3742 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:25:13.874000 audit[3742]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffee698e020 a2=94 a3=88 items=0 ppid=3249 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.874000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 31 05:25:13.889728 systemd-networkd[1013]: calie49dac0f8cd: Gained IPv6LL Oct 31 05:25:13.894000 audit[4078]: NETFILTER_CFG table=filter:101 family=2 entries=20 op=nft_register_rule pid=4078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:25:13.894000 audit[4078]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffd88c7230 a2=0 a3=7fffd88c721c items=0 ppid=2149 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.894000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:25:13.900288 env[1193]: time="2025-10-31T05:25:13.900230724Z" level=info msg="StartContainer for \"df7c8a9fb589371a6df93cea9f0d162ef91b9a99de52e1391be90c3a0bf44b9e\" returns successfully" Oct 31 05:25:13.903000 audit[4078]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=4078 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:25:13.903000 audit[4078]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffd88c7230 a2=0 a3=0 items=0 ppid=2149 pid=4078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:25:13.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.933000 audit: BPF prog-id=183 op=LOAD Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4049 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337386132353237346633626639326133373134323930393764666334 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4049 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337386132353237346633626639326133373134323930393764666334 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit: BPF prog-id=184 op=LOAD Oct 31 05:25:13.934000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024550 items=0 ppid=4049 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337386132353237346633626639326133373134323930393764666334 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit: BPF prog-id=185 op=LOAD Oct 31 05:25:13.934000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024598 items=0 ppid=4049 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337386132353237346633626639326133373134323930393764666334 Oct 31 05:25:13.934000 audit: BPF prog-id=185 op=UNLOAD Oct 31 05:25:13.934000 audit: BPF prog-id=184 op=UNLOAD Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:13.934000 audit: BPF prog-id=186 op=LOAD Oct 31 05:25:13.934000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000249a8 items=0 ppid=4049 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:13.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337386132353237346633626639326133373134323930393764666334 Oct 31 05:25:13.969000 audit[4069]: AVC avc: denied { getattr } for pid=4069 comm="coredns" path="cgroup:[4026532887]" dev="nsfs" ino=4026532887 scontext=system_u:system_r:svirt_lxc_net_t:s0:c564,c673 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 31 05:25:13.969000 audit[4069]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000058ff0 a2=c000133148 a3=0 items=0 ppid=3962 pid=4069 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c564,c673 key=(null) Oct 31 05:25:13.969000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 31 05:25:13.983139 env[1193]: time="2025-10-31T05:25:13.983050327Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:13.984730 env[1193]: time="2025-10-31T05:25:13.984635784Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:25:13.986146 kubelet[2031]: E1031 05:25:13.985031 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:25:13.986146 kubelet[2031]: E1031 05:25:13.985106 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:25:13.986146 kubelet[2031]: E1031 05:25:13.985300 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-apiserver start failed in pod calico-apiserver-5cc6545496-bzmv2_calico-apiserver(81bbb4a4-a415-4abc-a7fd-1a75817e45aa): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:13.986146 kubelet[2031]: E1031 05:25:13.985378 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" podUID="81bbb4a4-a415-4abc-a7fd-1a75817e45aa" Oct 31 05:25:13.986748 env[1193]: time="2025-10-31T05:25:13.986235398Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 05:25:14.000273 env[1193]: time="2025-10-31T05:25:14.000042824Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-cprzg,Uid:a6a56ae4-0d29-4361-8d53-116b2173dd54,Namespace:calico-system,Attempt:1,} returns sandbox id \"c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9\"" Oct 31 05:25:14.024000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.024000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.024000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.024000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.024000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.024000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.024000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.024000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.024000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.024000 audit: BPF prog-id=187 op=LOAD Oct 31 05:25:14.024000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc0b8ebe30 a2=98 a3=1999999999999999 items=0 ppid=3249 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.024000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 05:25:14.027000 audit: BPF prog-id=187 op=UNLOAD Oct 31 05:25:14.027000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.027000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.027000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.027000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.027000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.027000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.027000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.027000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.027000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.027000 audit: BPF prog-id=188 op=LOAD Oct 31 05:25:14.027000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc0b8ebd10 a2=94 a3=ffff items=0 ppid=3249 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.027000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 05:25:14.036000 audit: BPF prog-id=188 op=UNLOAD Oct 31 05:25:14.044000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.044000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.044000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.044000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.044000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.044000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.044000 audit[4104]: AVC avc: denied { perfmon } for pid=4104 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.044000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.044000 audit[4104]: AVC avc: denied { bpf } for pid=4104 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.044000 audit: BPF prog-id=189 op=LOAD Oct 31 05:25:14.044000 audit[4104]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc0b8ebd50 a2=94 a3=7ffc0b8ebf30 items=0 ppid=3249 pid=4104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.044000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 31 05:25:14.049000 audit: BPF prog-id=189 op=UNLOAD Oct 31 05:25:14.059144 systemd[1]: run-containerd-runc-k8s.io-43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0-runc.7DDfMK.mount: Deactivated successfully. Oct 31 05:25:14.134113 env[1193]: time="2025-10-31T05:25:14.134035163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-7c778bb748-4spgj,Uid:bc04009c-ce79-4cda-91a6-dd78e1ed2ba7,Namespace:calico-system,Attempt:1,} returns sandbox id \"43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0\"" Oct 31 05:25:14.238811 systemd-networkd[1013]: vxlan.calico: Link UP Oct 31 05:25:14.238832 systemd-networkd[1013]: vxlan.calico: Gained carrier Oct 31 05:25:14.274674 systemd-networkd[1013]: cali00ed381f29d: Gained IPv6LL Oct 31 05:25:14.299319 env[1193]: time="2025-10-31T05:25:14.299236239Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:14.301272 env[1193]: time="2025-10-31T05:25:14.301185644Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 05:25:14.301949 kubelet[2031]: E1031 05:25:14.301868 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:25:14.302055 kubelet[2031]: E1031 05:25:14.301964 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:25:14.302350 kubelet[2031]: E1031 05:25:14.302302 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-kube-controllers start failed in pod calico-kube-controllers-65f7799b87-47jbs_calico-system(440bdb2f-ff72-44c2-b0bc-e953f311f252): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:14.302501 kubelet[2031]: E1031 05:25:14.302415 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" podUID="440bdb2f-ff72-44c2-b0bc-e953f311f252" Oct 31 05:25:14.303198 env[1193]: time="2025-10-31T05:25:14.303162606Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 05:25:14.335000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.335000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.335000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.335000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.335000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.335000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.335000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.335000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.335000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.335000 audit: BPF prog-id=190 op=LOAD Oct 31 05:25:14.335000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc7456f2c0 a2=98 a3=20 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.335000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.335000 audit: BPF prog-id=190 op=UNLOAD Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit: BPF prog-id=191 op=LOAD Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc7456f0d0 a2=94 a3=54428f items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit: BPF prog-id=191 op=UNLOAD Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit: BPF prog-id=192 op=LOAD Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc7456f100 a2=94 a3=2 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit: BPF prog-id=192 op=UNLOAD Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc7456efd0 a2=28 a3=0 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7456f000 a2=28 a3=0 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7456ef10 a2=28 a3=0 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc7456f020 a2=28 a3=0 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc7456f000 a2=28 a3=0 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc7456eff0 a2=28 a3=0 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc7456f020 a2=28 a3=0 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7456f000 a2=28 a3=0 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7456f020 a2=28 a3=0 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc7456eff0 a2=28 a3=0 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc7456f060 a2=28 a3=0 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.336000 audit: BPF prog-id=193 op=LOAD Oct 31 05:25:14.336000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc7456eed0 a2=94 a3=0 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.336000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.337000 audit: BPF prog-id=193 op=UNLOAD Oct 31 05:25:14.337000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.337000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc7456eec0 a2=50 a3=2800 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.337000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc7456eec0 a2=50 a3=2800 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit: BPF prog-id=194 op=LOAD Oct 31 05:25:14.338000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc7456e6e0 a2=94 a3=2 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.338000 audit: BPF prog-id=194 op=UNLOAD Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { perfmon } for pid=4141 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit[4141]: AVC avc: denied { bpf } for pid=4141 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.338000 audit: BPF prog-id=195 op=LOAD Oct 31 05:25:14.338000 audit[4141]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc7456e7e0 a2=94 a3=30 items=0 ppid=3249 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.338000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit: BPF prog-id=196 op=LOAD Oct 31 05:25:14.350000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd4c3b2320 a2=98 a3=0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.350000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.350000 audit: BPF prog-id=196 op=UNLOAD Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit: BPF prog-id=197 op=LOAD Oct 31 05:25:14.350000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4c3b2110 a2=94 a3=54428f items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.350000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.350000 audit: BPF prog-id=197 op=UNLOAD Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.350000 audit: BPF prog-id=198 op=LOAD Oct 31 05:25:14.350000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4c3b2140 a2=94 a3=2 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.350000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.350000 audit: BPF prog-id=198 op=UNLOAD Oct 31 05:25:14.397743 kubelet[2031]: E1031 05:25:14.367978 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" podUID="440bdb2f-ff72-44c2-b0bc-e953f311f252" Oct 31 05:25:14.397743 kubelet[2031]: E1031 05:25:14.395663 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" podUID="f505ca8a-1440-4ca4-ac04-92eb3b2080ce" Oct 31 05:25:14.399219 kubelet[2031]: E1031 05:25:14.399156 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" podUID="81bbb4a4-a415-4abc-a7fd-1a75817e45aa" Oct 31 05:25:14.529724 systemd-networkd[1013]: cali13c4f7a2fb4: Gained IPv6LL Oct 31 05:25:14.530195 systemd-networkd[1013]: califfd5571249d: Gained IPv6LL Oct 31 05:25:14.609349 env[1193]: time="2025-10-31T05:25:14.609243900Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:14.610654 env[1193]: time="2025-10-31T05:25:14.610558415Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 05:25:14.611203 kubelet[2031]: E1031 05:25:14.611146 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:25:14.611928 kubelet[2031]: E1031 05:25:14.611884 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:25:14.614382 env[1193]: time="2025-10-31T05:25:14.614300776Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 05:25:14.614795 kubelet[2031]: E1031 05:25:14.614706 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-cprzg_calico-system(a6a56ae4-0d29-4361-8d53-116b2173dd54): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:14.695000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.695000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.695000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.695000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.695000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.695000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.695000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.695000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.695000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.695000 audit: BPF prog-id=199 op=LOAD Oct 31 05:25:14.695000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd4c3b2000 a2=94 a3=1 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.695000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.696000 audit: BPF prog-id=199 op=UNLOAD Oct 31 05:25:14.696000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.696000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd4c3b20d0 a2=50 a3=7ffd4c3b21b0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.696000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.709000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.709000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4c3b2010 a2=28 a3=0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.709000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.709000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.709000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4c3b2040 a2=28 a3=0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.709000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.710000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.710000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4c3b1f50 a2=28 a3=0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.710000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.710000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.710000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4c3b2060 a2=28 a3=0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.710000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.711000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.711000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4c3b2040 a2=28 a3=0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.711000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.711000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4c3b2030 a2=28 a3=0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.711000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.711000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4c3b2060 a2=28 a3=0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.712000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.712000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4c3b2040 a2=28 a3=0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.712000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.712000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.712000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4c3b2060 a2=28 a3=0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.712000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.713000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.713000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd4c3b2030 a2=28 a3=0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.713000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.713000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.713000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd4c3b20a0 a2=28 a3=0 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.713000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.714000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.714000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd4c3b1e50 a2=50 a3=1 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.714000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.714000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.714000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.714000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.714000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.714000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.714000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.714000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.714000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.714000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.714000 audit: BPF prog-id=200 op=LOAD Oct 31 05:25:14.714000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd4c3b1e50 a2=94 a3=5 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.714000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.715000 audit: BPF prog-id=200 op=UNLOAD Oct 31 05:25:14.715000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.715000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd4c3b1f00 a2=50 a3=1 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.715000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.716000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.716000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd4c3b2020 a2=4 a3=38 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.716000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.716000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.716000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.716000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.716000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.716000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.716000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.716000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.716000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.716000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.716000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.716000 audit[4143]: AVC avc: denied { confidentiality } for pid=4143 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:25:14.716000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd4c3b2070 a2=94 a3=6 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.716000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { confidentiality } for pid=4143 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:25:14.718000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd4c3b1820 a2=94 a3=88 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { confidentiality } for pid=4143 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 31 05:25:14.718000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd4c3b1820 a2=94 a3=88 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.718000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.718000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd4c3b3250 a2=10 a3=f8f00800 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.718000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.719000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.719000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd4c3b30f0 a2=10 a3=3 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.719000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.719000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.719000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd4c3b3090 a2=10 a3=3 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.719000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.719000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 31 05:25:14.719000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd4c3b3090 a2=10 a3=7 items=0 ppid=3249 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.719000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 31 05:25:14.727000 audit: BPF prog-id=195 op=UNLOAD Oct 31 05:25:14.785781 systemd-networkd[1013]: cali430526e3b0f: Gained IPv6LL Oct 31 05:25:14.895000 audit[4187]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=4187 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:25:14.895000 audit[4187]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd654b28c0 a2=0 a3=7ffd654b28ac items=0 ppid=3249 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.895000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:25:14.897000 audit[4188]: NETFILTER_CFG table=nat:104 family=2 entries=15 op=nft_register_chain pid=4188 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:25:14.897000 audit[4188]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe1dfb54c0 a2=0 a3=7ffe1dfb54ac items=0 ppid=3249 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.897000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:25:14.900000 audit[4190]: NETFILTER_CFG table=mangle:105 family=2 entries=16 op=nft_register_chain pid=4190 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:25:14.900000 audit[4190]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcb12209b0 a2=0 a3=7ffcb122099c items=0 ppid=3249 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.900000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:25:14.940821 env[1193]: time="2025-10-31T05:25:14.940670386Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:14.942217 env[1193]: time="2025-10-31T05:25:14.942104499Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 05:25:14.942782 kubelet[2031]: E1031 05:25:14.942677 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:25:14.942878 kubelet[2031]: E1031 05:25:14.942803 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:25:14.943099 kubelet[2031]: E1031 05:25:14.943063 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container goldmane start failed in pod goldmane-7c778bb748-4spgj_calico-system(bc04009c-ce79-4cda-91a6-dd78e1ed2ba7): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:14.943193 kubelet[2031]: E1031 05:25:14.943133 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-7c778bb748-4spgj" podUID="bc04009c-ce79-4cda-91a6-dd78e1ed2ba7" Oct 31 05:25:14.944694 env[1193]: time="2025-10-31T05:25:14.944166436Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 05:25:14.918000 audit[4192]: NETFILTER_CFG table=filter:106 family=2 entries=315 op=nft_register_chain pid=4192 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 31 05:25:14.918000 audit[4192]: SYSCALL arch=c000003e syscall=46 success=yes exit=187764 a0=3 a1=7ffdb287ab40 a2=0 a3=7ffdb287ab2c items=0 ppid=3249 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:14.918000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 31 05:25:15.041771 systemd-networkd[1013]: calicdc9190db0e: Gained IPv6LL Oct 31 05:25:15.136000 audit[4207]: NETFILTER_CFG table=filter:107 family=2 entries=17 op=nft_register_rule pid=4207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:25:15.136000 audit[4207]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff4cf73960 a2=0 a3=7fff4cf7394c items=0 ppid=2149 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:15.136000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:25:15.151000 audit[4207]: NETFILTER_CFG table=nat:108 family=2 entries=47 op=nft_register_chain pid=4207 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:25:15.151000 audit[4207]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff4cf73960 a2=0 a3=7fff4cf7394c items=0 ppid=2149 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:15.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:25:15.253138 env[1193]: time="2025-10-31T05:25:15.252631252Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:15.254615 env[1193]: time="2025-10-31T05:25:15.254459551Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 05:25:15.255057 kubelet[2031]: E1031 05:25:15.254975 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:25:15.255159 kubelet[2031]: E1031 05:25:15.255063 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:25:15.255246 kubelet[2031]: E1031 05:25:15.255206 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-cprzg_calico-system(a6a56ae4-0d29-4361-8d53-116b2173dd54): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:15.255388 kubelet[2031]: E1031 05:25:15.255272 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:25:15.398023 kubelet[2031]: E1031 05:25:15.397808 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:25:15.403178 kubelet[2031]: E1031 05:25:15.402354 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-7c778bb748-4spgj" podUID="bc04009c-ce79-4cda-91a6-dd78e1ed2ba7" Oct 31 05:25:15.404662 kubelet[2031]: E1031 05:25:15.404258 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" podUID="440bdb2f-ff72-44c2-b0bc-e953f311f252" Oct 31 05:25:15.404662 kubelet[2031]: E1031 05:25:15.404524 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" podUID="81bbb4a4-a415-4abc-a7fd-1a75817e45aa" Oct 31 05:25:15.428732 kubelet[2031]: I1031 05:25:15.428639 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-66bc5c9577-4k4fh" podStartSLOduration=55.428613196 podStartE2EDuration="55.428613196s" podCreationTimestamp="2025-10-31 05:24:20 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-31 05:25:14.542355772 +0000 UTC m=+58.035090032" watchObservedRunningTime="2025-10-31 05:25:15.428613196 +0000 UTC m=+58.921347451" Oct 31 05:25:16.001595 systemd-networkd[1013]: vxlan.calico: Gained IPv6LL Oct 31 05:25:16.182000 audit[4210]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=4210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:25:16.182000 audit[4210]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe8bb89de0 a2=0 a3=7ffe8bb89dcc items=0 ppid=2149 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:16.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:25:16.188000 audit[4210]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:25:16.188000 audit[4210]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe8bb89de0 a2=0 a3=7ffe8bb89dcc items=0 ppid=2149 pid=4210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:16.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:25:16.791937 env[1193]: time="2025-10-31T05:25:16.791782804Z" level=info msg="StopPodSandbox for \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\"" Oct 31 05:25:17.067622 env[1193]: 2025-10-31 05:25:16.941 [WARNING][4221] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0", GenerateName:"goldmane-7c778bb748-", Namespace:"calico-system", SelfLink:"", UID:"bc04009c-ce79-4cda-91a6-dd78e1ed2ba7", ResourceVersion:"1086", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"7c778bb748", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0", Pod:"goldmane-7c778bb748-4spgj", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.71.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali00ed381f29d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:17.067622 env[1193]: 2025-10-31 05:25:16.942 [INFO][4221] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:25:17.067622 env[1193]: 2025-10-31 05:25:16.942 [INFO][4221] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" iface="eth0" netns="" Oct 31 05:25:17.067622 env[1193]: 2025-10-31 05:25:16.942 [INFO][4221] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:25:17.067622 env[1193]: 2025-10-31 05:25:16.942 [INFO][4221] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:25:17.067622 env[1193]: 2025-10-31 05:25:17.029 [INFO][4228] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" HandleID="k8s-pod-network.d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Workload="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:17.067622 env[1193]: 2025-10-31 05:25:17.029 [INFO][4228] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:17.067622 env[1193]: 2025-10-31 05:25:17.030 [INFO][4228] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:17.067622 env[1193]: 2025-10-31 05:25:17.050 [WARNING][4228] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" HandleID="k8s-pod-network.d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Workload="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:17.067622 env[1193]: 2025-10-31 05:25:17.051 [INFO][4228] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" HandleID="k8s-pod-network.d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Workload="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:17.067622 env[1193]: 2025-10-31 05:25:17.056 [INFO][4228] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:17.067622 env[1193]: 2025-10-31 05:25:17.062 [INFO][4221] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:25:17.068743 env[1193]: time="2025-10-31T05:25:17.067158858Z" level=info msg="TearDown network for sandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\" successfully" Oct 31 05:25:17.068840 env[1193]: time="2025-10-31T05:25:17.068750811Z" level=info msg="StopPodSandbox for \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\" returns successfully" Oct 31 05:25:17.115435 env[1193]: time="2025-10-31T05:25:17.115023344Z" level=info msg="RemovePodSandbox for \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\"" Oct 31 05:25:17.115435 env[1193]: time="2025-10-31T05:25:17.115095167Z" level=info msg="Forcibly stopping sandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\"" Oct 31 05:25:17.261857 env[1193]: 2025-10-31 05:25:17.190 [WARNING][4245] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0", GenerateName:"goldmane-7c778bb748-", Namespace:"calico-system", SelfLink:"", UID:"bc04009c-ce79-4cda-91a6-dd78e1ed2ba7", ResourceVersion:"1086", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"7c778bb748", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"43b88f7255a99f608720f104ff68db731de19f4c9d968d5e7f6ad3593fcc71c0", Pod:"goldmane-7c778bb748-4spgj", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.71.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali00ed381f29d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:17.261857 env[1193]: 2025-10-31 05:25:17.190 [INFO][4245] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:25:17.261857 env[1193]: 2025-10-31 05:25:17.190 [INFO][4245] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" iface="eth0" netns="" Oct 31 05:25:17.261857 env[1193]: 2025-10-31 05:25:17.190 [INFO][4245] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:25:17.261857 env[1193]: 2025-10-31 05:25:17.190 [INFO][4245] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:25:17.261857 env[1193]: 2025-10-31 05:25:17.232 [INFO][4253] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" HandleID="k8s-pod-network.d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Workload="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:17.261857 env[1193]: 2025-10-31 05:25:17.233 [INFO][4253] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:17.261857 env[1193]: 2025-10-31 05:25:17.233 [INFO][4253] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:17.261857 env[1193]: 2025-10-31 05:25:17.253 [WARNING][4253] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" HandleID="k8s-pod-network.d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Workload="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:17.261857 env[1193]: 2025-10-31 05:25:17.253 [INFO][4253] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" HandleID="k8s-pod-network.d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Workload="srv--clgmo.gb1.brightbox.com-k8s-goldmane--7c778bb748--4spgj-eth0" Oct 31 05:25:17.261857 env[1193]: 2025-10-31 05:25:17.257 [INFO][4253] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:17.261857 env[1193]: 2025-10-31 05:25:17.259 [INFO][4245] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594" Oct 31 05:25:17.262850 env[1193]: time="2025-10-31T05:25:17.262491623Z" level=info msg="TearDown network for sandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\" successfully" Oct 31 05:25:17.268080 env[1193]: time="2025-10-31T05:25:17.268035188Z" level=info msg="RemovePodSandbox \"d142267d69985976043314c300a1810404546a73a18ca1bf231c46845c393594\" returns successfully" Oct 31 05:25:17.269256 env[1193]: time="2025-10-31T05:25:17.269202485Z" level=info msg="StopPodSandbox for \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\"" Oct 31 05:25:17.433254 env[1193]: 2025-10-31 05:25:17.350 [WARNING][4268] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a6a56ae4-0d29-4361-8d53-116b2173dd54", ResourceVersion:"1081", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9", Pod:"csi-node-driver-cprzg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.71.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicdc9190db0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:17.433254 env[1193]: 2025-10-31 05:25:17.350 [INFO][4268] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:25:17.433254 env[1193]: 2025-10-31 05:25:17.351 [INFO][4268] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" iface="eth0" netns="" Oct 31 05:25:17.433254 env[1193]: 2025-10-31 05:25:17.351 [INFO][4268] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:25:17.433254 env[1193]: 2025-10-31 05:25:17.351 [INFO][4268] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:25:17.433254 env[1193]: 2025-10-31 05:25:17.391 [INFO][4276] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" HandleID="k8s-pod-network.9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Workload="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:17.433254 env[1193]: 2025-10-31 05:25:17.391 [INFO][4276] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:17.433254 env[1193]: 2025-10-31 05:25:17.391 [INFO][4276] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:17.433254 env[1193]: 2025-10-31 05:25:17.413 [WARNING][4276] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" HandleID="k8s-pod-network.9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Workload="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:17.433254 env[1193]: 2025-10-31 05:25:17.414 [INFO][4276] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" HandleID="k8s-pod-network.9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Workload="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:17.433254 env[1193]: 2025-10-31 05:25:17.417 [INFO][4276] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:17.433254 env[1193]: 2025-10-31 05:25:17.421 [INFO][4268] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:25:17.433254 env[1193]: time="2025-10-31T05:25:17.431948782Z" level=info msg="TearDown network for sandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\" successfully" Oct 31 05:25:17.433254 env[1193]: time="2025-10-31T05:25:17.432137856Z" level=info msg="StopPodSandbox for \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\" returns successfully" Oct 31 05:25:17.438735 env[1193]: time="2025-10-31T05:25:17.438687375Z" level=info msg="RemovePodSandbox for \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\"" Oct 31 05:25:17.438947 env[1193]: time="2025-10-31T05:25:17.438887443Z" level=info msg="Forcibly stopping sandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\"" Oct 31 05:25:17.584823 env[1193]: 2025-10-31 05:25:17.525 [WARNING][4291] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"a6a56ae4-0d29-4361-8d53-116b2173dd54", ResourceVersion:"1081", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"9d99788f7", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"c78a25274f3bf92a371429097dfc4d1886f4b153b5878dd7856d65130799e6b9", Pod:"csi-node-driver-cprzg", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.71.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calicdc9190db0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:17.584823 env[1193]: 2025-10-31 05:25:17.526 [INFO][4291] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:25:17.584823 env[1193]: 2025-10-31 05:25:17.526 [INFO][4291] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" iface="eth0" netns="" Oct 31 05:25:17.584823 env[1193]: 2025-10-31 05:25:17.526 [INFO][4291] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:25:17.584823 env[1193]: 2025-10-31 05:25:17.526 [INFO][4291] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:25:17.584823 env[1193]: 2025-10-31 05:25:17.556 [INFO][4298] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" HandleID="k8s-pod-network.9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Workload="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:17.584823 env[1193]: 2025-10-31 05:25:17.557 [INFO][4298] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:17.584823 env[1193]: 2025-10-31 05:25:17.557 [INFO][4298] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:17.584823 env[1193]: 2025-10-31 05:25:17.576 [WARNING][4298] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" HandleID="k8s-pod-network.9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Workload="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:17.584823 env[1193]: 2025-10-31 05:25:17.576 [INFO][4298] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" HandleID="k8s-pod-network.9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Workload="srv--clgmo.gb1.brightbox.com-k8s-csi--node--driver--cprzg-eth0" Oct 31 05:25:17.584823 env[1193]: 2025-10-31 05:25:17.580 [INFO][4298] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:17.584823 env[1193]: 2025-10-31 05:25:17.582 [INFO][4291] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424" Oct 31 05:25:17.586129 env[1193]: time="2025-10-31T05:25:17.586075251Z" level=info msg="TearDown network for sandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\" successfully" Oct 31 05:25:17.590035 env[1193]: time="2025-10-31T05:25:17.589970794Z" level=info msg="RemovePodSandbox \"9a3dc4622aa379deafc097eaf230c801c83a89c2754f8025f3b5d42c559be424\" returns successfully" Oct 31 05:25:17.591289 env[1193]: time="2025-10-31T05:25:17.591253098Z" level=info msg="StopPodSandbox for \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\"" Oct 31 05:25:17.701292 env[1193]: 2025-10-31 05:25:17.644 [WARNING][4312] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0", GenerateName:"calico-apiserver-5cc6545496-", Namespace:"calico-apiserver", SelfLink:"", UID:"f505ca8a-1440-4ca4-ac04-92eb3b2080ce", ResourceVersion:"1054", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cc6545496", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c", Pod:"calico-apiserver-5cc6545496-7xfb2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie49dac0f8cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:17.701292 env[1193]: 2025-10-31 05:25:17.644 [INFO][4312] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:25:17.701292 env[1193]: 2025-10-31 05:25:17.645 [INFO][4312] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" iface="eth0" netns="" Oct 31 05:25:17.701292 env[1193]: 2025-10-31 05:25:17.645 [INFO][4312] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:25:17.701292 env[1193]: 2025-10-31 05:25:17.645 [INFO][4312] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:25:17.701292 env[1193]: 2025-10-31 05:25:17.678 [INFO][4319] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" HandleID="k8s-pod-network.2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:17.701292 env[1193]: 2025-10-31 05:25:17.682 [INFO][4319] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:17.701292 env[1193]: 2025-10-31 05:25:17.682 [INFO][4319] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:17.701292 env[1193]: 2025-10-31 05:25:17.692 [WARNING][4319] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" HandleID="k8s-pod-network.2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:17.701292 env[1193]: 2025-10-31 05:25:17.692 [INFO][4319] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" HandleID="k8s-pod-network.2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:17.701292 env[1193]: 2025-10-31 05:25:17.694 [INFO][4319] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:17.701292 env[1193]: 2025-10-31 05:25:17.696 [INFO][4312] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:25:17.702247 env[1193]: time="2025-10-31T05:25:17.702193435Z" level=info msg="TearDown network for sandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\" successfully" Oct 31 05:25:17.703278 env[1193]: time="2025-10-31T05:25:17.702416513Z" level=info msg="StopPodSandbox for \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\" returns successfully" Oct 31 05:25:17.703705 env[1193]: time="2025-10-31T05:25:17.703668229Z" level=info msg="RemovePodSandbox for \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\"" Oct 31 05:25:17.703886 env[1193]: time="2025-10-31T05:25:17.703829594Z" level=info msg="Forcibly stopping sandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\"" Oct 31 05:25:17.845948 env[1193]: 2025-10-31 05:25:17.769 [WARNING][4334] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0", GenerateName:"calico-apiserver-5cc6545496-", Namespace:"calico-apiserver", SelfLink:"", UID:"f505ca8a-1440-4ca4-ac04-92eb3b2080ce", ResourceVersion:"1054", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cc6545496", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"f85cfec26227863a4b7972a015832f10a74fc2c612a4be24362d68310ef8713c", Pod:"calico-apiserver-5cc6545496-7xfb2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie49dac0f8cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:17.845948 env[1193]: 2025-10-31 05:25:17.772 [INFO][4334] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:25:17.845948 env[1193]: 2025-10-31 05:25:17.772 [INFO][4334] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" iface="eth0" netns="" Oct 31 05:25:17.845948 env[1193]: 2025-10-31 05:25:17.772 [INFO][4334] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:25:17.845948 env[1193]: 2025-10-31 05:25:17.772 [INFO][4334] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:25:17.845948 env[1193]: 2025-10-31 05:25:17.811 [INFO][4341] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" HandleID="k8s-pod-network.2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:17.845948 env[1193]: 2025-10-31 05:25:17.812 [INFO][4341] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:17.845948 env[1193]: 2025-10-31 05:25:17.812 [INFO][4341] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:17.845948 env[1193]: 2025-10-31 05:25:17.830 [WARNING][4341] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" HandleID="k8s-pod-network.2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:17.845948 env[1193]: 2025-10-31 05:25:17.831 [INFO][4341] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" HandleID="k8s-pod-network.2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--7xfb2-eth0" Oct 31 05:25:17.845948 env[1193]: 2025-10-31 05:25:17.835 [INFO][4341] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:17.845948 env[1193]: 2025-10-31 05:25:17.840 [INFO][4334] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95" Oct 31 05:25:17.847713 env[1193]: time="2025-10-31T05:25:17.846045902Z" level=info msg="TearDown network for sandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\" successfully" Oct 31 05:25:17.852220 env[1193]: time="2025-10-31T05:25:17.852169797Z" level=info msg="RemovePodSandbox \"2c5eab4c446c2621b48308a67159de6ab0c1e14786b018ed2d53b3d745a34e95\" returns successfully" Oct 31 05:25:17.854523 env[1193]: time="2025-10-31T05:25:17.854236921Z" level=info msg="StopPodSandbox for \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\"" Oct 31 05:25:18.010435 env[1193]: 2025-10-31 05:25:17.946 [WARNING][4358] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0", GenerateName:"coredns-66bc5c9577-", Namespace:"kube-system", SelfLink:"", UID:"0c9303bc-5dc8-420a-b98f-17f88112d207", ResourceVersion:"1059", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"66bc5c9577", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3", Pod:"coredns-66bc5c9577-4k4fh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali430526e3b0f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"liveness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1f90, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"readiness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1ff5, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:18.010435 env[1193]: 2025-10-31 05:25:17.947 [INFO][4358] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:25:18.010435 env[1193]: 2025-10-31 05:25:17.947 [INFO][4358] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" iface="eth0" netns="" Oct 31 05:25:18.010435 env[1193]: 2025-10-31 05:25:17.947 [INFO][4358] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:25:18.010435 env[1193]: 2025-10-31 05:25:17.947 [INFO][4358] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:25:18.010435 env[1193]: 2025-10-31 05:25:17.985 [INFO][4365] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" HandleID="k8s-pod-network.0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:18.010435 env[1193]: 2025-10-31 05:25:17.985 [INFO][4365] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:18.010435 env[1193]: 2025-10-31 05:25:17.985 [INFO][4365] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:18.010435 env[1193]: 2025-10-31 05:25:17.997 [WARNING][4365] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" HandleID="k8s-pod-network.0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:18.010435 env[1193]: 2025-10-31 05:25:17.997 [INFO][4365] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" HandleID="k8s-pod-network.0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:18.010435 env[1193]: 2025-10-31 05:25:18.000 [INFO][4365] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:18.010435 env[1193]: 2025-10-31 05:25:18.006 [INFO][4358] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:25:18.010435 env[1193]: time="2025-10-31T05:25:18.008880471Z" level=info msg="TearDown network for sandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\" successfully" Oct 31 05:25:18.010435 env[1193]: time="2025-10-31T05:25:18.008930344Z" level=info msg="StopPodSandbox for \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\" returns successfully" Oct 31 05:25:18.012582 env[1193]: time="2025-10-31T05:25:18.012544041Z" level=info msg="RemovePodSandbox for \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\"" Oct 31 05:25:18.012983 env[1193]: time="2025-10-31T05:25:18.012914160Z" level=info msg="Forcibly stopping sandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\"" Oct 31 05:25:18.139437 env[1193]: 2025-10-31 05:25:18.078 [WARNING][4380] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0", GenerateName:"coredns-66bc5c9577-", Namespace:"kube-system", SelfLink:"", UID:"0c9303bc-5dc8-420a-b98f-17f88112d207", ResourceVersion:"1059", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"66bc5c9577", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"3de152c3ef9ceea18ba7ff03c1c98d4733b53645cad9019c90defbfc3dcd71c3", Pod:"coredns-66bc5c9577-4k4fh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali430526e3b0f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"liveness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1f90, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"readiness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1ff5, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:18.139437 env[1193]: 2025-10-31 05:25:18.078 [INFO][4380] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:25:18.139437 env[1193]: 2025-10-31 05:25:18.078 [INFO][4380] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" iface="eth0" netns="" Oct 31 05:25:18.139437 env[1193]: 2025-10-31 05:25:18.078 [INFO][4380] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:25:18.139437 env[1193]: 2025-10-31 05:25:18.079 [INFO][4380] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:25:18.139437 env[1193]: 2025-10-31 05:25:18.113 [INFO][4387] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" HandleID="k8s-pod-network.0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:18.139437 env[1193]: 2025-10-31 05:25:18.113 [INFO][4387] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:18.139437 env[1193]: 2025-10-31 05:25:18.113 [INFO][4387] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:18.139437 env[1193]: 2025-10-31 05:25:18.124 [WARNING][4387] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" HandleID="k8s-pod-network.0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:18.139437 env[1193]: 2025-10-31 05:25:18.124 [INFO][4387] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" HandleID="k8s-pod-network.0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--4k4fh-eth0" Oct 31 05:25:18.139437 env[1193]: 2025-10-31 05:25:18.127 [INFO][4387] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:18.139437 env[1193]: 2025-10-31 05:25:18.136 [INFO][4380] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd" Oct 31 05:25:18.140921 env[1193]: time="2025-10-31T05:25:18.140869544Z" level=info msg="TearDown network for sandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\" successfully" Oct 31 05:25:18.141000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:18.144399 kernel: kauditd_printk_skb: 1049 callbacks suppressed Oct 31 05:25:18.144547 kernel: audit: type=1400 audit(1761888318.141:1330): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:18.146650 env[1193]: time="2025-10-31T05:25:18.146612595Z" level=info msg="RemovePodSandbox \"0cd06ae795ad9f8a22d3bff6a5e665c4315025cc4441c7930482d50ebbe625bd\" returns successfully" Oct 31 05:25:18.148151 env[1193]: time="2025-10-31T05:25:18.148113564Z" level=info msg="StopPodSandbox for \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\"" Oct 31 05:25:18.141000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c38f60 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:25:18.160446 kernel: audit: type=1300 audit(1761888318.141:1330): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c38f60 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:25:18.141000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:25:18.168501 kernel: audit: type=1327 audit(1761888318.141:1330): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:25:18.158000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:18.182376 kernel: audit: type=1400 audit(1761888318.158:1331): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:18.158000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002c38f80 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:25:18.192395 kernel: audit: type=1300 audit(1761888318.158:1331): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002c38f80 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:25:18.158000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:25:18.200388 kernel: audit: type=1327 audit(1761888318.158:1331): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:25:18.159000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:18.159000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0030d2540 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:25:18.214887 kernel: audit: type=1400 audit(1761888318.159:1332): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:18.215022 kernel: audit: type=1300 audit(1761888318.159:1332): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0030d2540 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:25:18.159000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:25:18.167000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:18.229900 kernel: audit: type=1327 audit(1761888318.159:1332): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:25:18.230025 kernel: audit: type=1400 audit(1761888318.167:1333): avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:25:18.167000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0030d2560 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:25:18.167000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:25:18.277893 env[1193]: 2025-10-31 05:25:18.231 [WARNING][4404] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-whisker--6566988f9b--tzkgd-eth0" Oct 31 05:25:18.277893 env[1193]: 2025-10-31 05:25:18.231 [INFO][4404] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:18.277893 env[1193]: 2025-10-31 05:25:18.231 [INFO][4404] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" iface="eth0" netns="" Oct 31 05:25:18.277893 env[1193]: 2025-10-31 05:25:18.231 [INFO][4404] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:18.277893 env[1193]: 2025-10-31 05:25:18.231 [INFO][4404] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:18.277893 env[1193]: 2025-10-31 05:25:18.260 [INFO][4411] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" HandleID="k8s-pod-network.6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Workload="srv--clgmo.gb1.brightbox.com-k8s-whisker--6566988f9b--tzkgd-eth0" Oct 31 05:25:18.277893 env[1193]: 2025-10-31 05:25:18.260 [INFO][4411] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:18.277893 env[1193]: 2025-10-31 05:25:18.261 [INFO][4411] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:18.277893 env[1193]: 2025-10-31 05:25:18.270 [WARNING][4411] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" HandleID="k8s-pod-network.6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Workload="srv--clgmo.gb1.brightbox.com-k8s-whisker--6566988f9b--tzkgd-eth0" Oct 31 05:25:18.277893 env[1193]: 2025-10-31 05:25:18.271 [INFO][4411] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" HandleID="k8s-pod-network.6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Workload="srv--clgmo.gb1.brightbox.com-k8s-whisker--6566988f9b--tzkgd-eth0" Oct 31 05:25:18.277893 env[1193]: 2025-10-31 05:25:18.273 [INFO][4411] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:18.277893 env[1193]: 2025-10-31 05:25:18.275 [INFO][4404] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:18.279074 env[1193]: time="2025-10-31T05:25:18.279006124Z" level=info msg="TearDown network for sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\" successfully" Oct 31 05:25:18.279248 env[1193]: time="2025-10-31T05:25:18.279211982Z" level=info msg="StopPodSandbox for \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\" returns successfully" Oct 31 05:25:18.280476 env[1193]: time="2025-10-31T05:25:18.280432328Z" level=info msg="RemovePodSandbox for \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\"" Oct 31 05:25:18.280733 env[1193]: time="2025-10-31T05:25:18.280641130Z" level=info msg="Forcibly stopping sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\"" Oct 31 05:25:18.389126 env[1193]: 2025-10-31 05:25:18.340 [WARNING][4425] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" WorkloadEndpoint="srv--clgmo.gb1.brightbox.com-k8s-whisker--6566988f9b--tzkgd-eth0" Oct 31 05:25:18.389126 env[1193]: 2025-10-31 05:25:18.340 [INFO][4425] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:18.389126 env[1193]: 2025-10-31 05:25:18.340 [INFO][4425] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" iface="eth0" netns="" Oct 31 05:25:18.389126 env[1193]: 2025-10-31 05:25:18.340 [INFO][4425] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:18.389126 env[1193]: 2025-10-31 05:25:18.340 [INFO][4425] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:18.389126 env[1193]: 2025-10-31 05:25:18.369 [INFO][4432] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" HandleID="k8s-pod-network.6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Workload="srv--clgmo.gb1.brightbox.com-k8s-whisker--6566988f9b--tzkgd-eth0" Oct 31 05:25:18.389126 env[1193]: 2025-10-31 05:25:18.369 [INFO][4432] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:18.389126 env[1193]: 2025-10-31 05:25:18.370 [INFO][4432] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:18.389126 env[1193]: 2025-10-31 05:25:18.382 [WARNING][4432] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" HandleID="k8s-pod-network.6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Workload="srv--clgmo.gb1.brightbox.com-k8s-whisker--6566988f9b--tzkgd-eth0" Oct 31 05:25:18.389126 env[1193]: 2025-10-31 05:25:18.382 [INFO][4432] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" HandleID="k8s-pod-network.6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Workload="srv--clgmo.gb1.brightbox.com-k8s-whisker--6566988f9b--tzkgd-eth0" Oct 31 05:25:18.389126 env[1193]: 2025-10-31 05:25:18.385 [INFO][4432] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:18.389126 env[1193]: 2025-10-31 05:25:18.387 [INFO][4425] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff" Oct 31 05:25:18.390608 env[1193]: time="2025-10-31T05:25:18.389718347Z" level=info msg="TearDown network for sandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\" successfully" Oct 31 05:25:18.401778 env[1193]: time="2025-10-31T05:25:18.401702744Z" level=info msg="RemovePodSandbox \"6679819051a7da07596cfc1cff58cb28f237d30b3cfde1512868e839002de6ff\" returns successfully" Oct 31 05:25:18.402911 env[1193]: time="2025-10-31T05:25:18.402875852Z" level=info msg="StopPodSandbox for \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\"" Oct 31 05:25:18.543904 env[1193]: 2025-10-31 05:25:18.481 [WARNING][4447] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0", GenerateName:"calico-kube-controllers-65f7799b87-", Namespace:"calico-system", SelfLink:"", UID:"440bdb2f-ff72-44c2-b0bc-e953f311f252", ResourceVersion:"1091", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65f7799b87", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909", Pod:"calico-kube-controllers-65f7799b87-47jbs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.71.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali13c4f7a2fb4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:18.543904 env[1193]: 2025-10-31 05:25:18.482 [INFO][4447] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:25:18.543904 env[1193]: 2025-10-31 05:25:18.482 [INFO][4447] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" iface="eth0" netns="" Oct 31 05:25:18.543904 env[1193]: 2025-10-31 05:25:18.482 [INFO][4447] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:25:18.543904 env[1193]: 2025-10-31 05:25:18.482 [INFO][4447] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:25:18.543904 env[1193]: 2025-10-31 05:25:18.522 [INFO][4454] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" HandleID="k8s-pod-network.8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:18.543904 env[1193]: 2025-10-31 05:25:18.523 [INFO][4454] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:18.543904 env[1193]: 2025-10-31 05:25:18.523 [INFO][4454] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:18.543904 env[1193]: 2025-10-31 05:25:18.533 [WARNING][4454] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" HandleID="k8s-pod-network.8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:18.543904 env[1193]: 2025-10-31 05:25:18.534 [INFO][4454] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" HandleID="k8s-pod-network.8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:18.543904 env[1193]: 2025-10-31 05:25:18.536 [INFO][4454] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:18.543904 env[1193]: 2025-10-31 05:25:18.541 [INFO][4447] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:25:18.545183 env[1193]: time="2025-10-31T05:25:18.545135597Z" level=info msg="TearDown network for sandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\" successfully" Oct 31 05:25:18.545486 env[1193]: time="2025-10-31T05:25:18.545452718Z" level=info msg="StopPodSandbox for \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\" returns successfully" Oct 31 05:25:18.546710 env[1193]: time="2025-10-31T05:25:18.546668988Z" level=info msg="RemovePodSandbox for \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\"" Oct 31 05:25:18.546949 env[1193]: time="2025-10-31T05:25:18.546878277Z" level=info msg="Forcibly stopping sandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\"" Oct 31 05:25:18.654890 env[1193]: 2025-10-31 05:25:18.604 [WARNING][4468] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0", GenerateName:"calico-kube-controllers-65f7799b87-", Namespace:"calico-system", SelfLink:"", UID:"440bdb2f-ff72-44c2-b0bc-e953f311f252", ResourceVersion:"1091", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65f7799b87", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"af14200c2a334103d27eaee4f5f6c9bf9f262c7c26bb5c99e7cb6369f23db909", Pod:"calico-kube-controllers-65f7799b87-47jbs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.71.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali13c4f7a2fb4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:18.654890 env[1193]: 2025-10-31 05:25:18.605 [INFO][4468] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:25:18.654890 env[1193]: 2025-10-31 05:25:18.605 [INFO][4468] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" iface="eth0" netns="" Oct 31 05:25:18.654890 env[1193]: 2025-10-31 05:25:18.605 [INFO][4468] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:25:18.654890 env[1193]: 2025-10-31 05:25:18.605 [INFO][4468] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:25:18.654890 env[1193]: 2025-10-31 05:25:18.637 [INFO][4475] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" HandleID="k8s-pod-network.8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:18.654890 env[1193]: 2025-10-31 05:25:18.637 [INFO][4475] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:18.654890 env[1193]: 2025-10-31 05:25:18.637 [INFO][4475] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:18.654890 env[1193]: 2025-10-31 05:25:18.648 [WARNING][4475] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" HandleID="k8s-pod-network.8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:18.654890 env[1193]: 2025-10-31 05:25:18.648 [INFO][4475] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" HandleID="k8s-pod-network.8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--kube--controllers--65f7799b87--47jbs-eth0" Oct 31 05:25:18.654890 env[1193]: 2025-10-31 05:25:18.650 [INFO][4475] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:18.654890 env[1193]: 2025-10-31 05:25:18.652 [INFO][4468] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936" Oct 31 05:25:18.655783 env[1193]: time="2025-10-31T05:25:18.654919475Z" level=info msg="TearDown network for sandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\" successfully" Oct 31 05:25:18.659007 env[1193]: time="2025-10-31T05:25:18.658956623Z" level=info msg="RemovePodSandbox \"8920865e95d9364c43d71e98263870976cfd688976e35370dc00e4afd52a4936\" returns successfully" Oct 31 05:25:18.659983 env[1193]: time="2025-10-31T05:25:18.659938412Z" level=info msg="StopPodSandbox for \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\"" Oct 31 05:25:18.773484 env[1193]: 2025-10-31 05:25:18.718 [WARNING][4490] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0", GenerateName:"calico-apiserver-5cc6545496-", Namespace:"calico-apiserver", SelfLink:"", UID:"81bbb4a4-a415-4abc-a7fd-1a75817e45aa", ResourceVersion:"1083", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cc6545496", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5", Pod:"calico-apiserver-5cc6545496-bzmv2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califfd5571249d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:18.773484 env[1193]: 2025-10-31 05:25:18.719 [INFO][4490] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:25:18.773484 env[1193]: 2025-10-31 05:25:18.719 [INFO][4490] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" iface="eth0" netns="" Oct 31 05:25:18.773484 env[1193]: 2025-10-31 05:25:18.719 [INFO][4490] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:25:18.773484 env[1193]: 2025-10-31 05:25:18.719 [INFO][4490] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:25:18.773484 env[1193]: 2025-10-31 05:25:18.748 [INFO][4497] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" HandleID="k8s-pod-network.298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:18.773484 env[1193]: 2025-10-31 05:25:18.748 [INFO][4497] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:18.773484 env[1193]: 2025-10-31 05:25:18.749 [INFO][4497] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:18.773484 env[1193]: 2025-10-31 05:25:18.762 [WARNING][4497] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" HandleID="k8s-pod-network.298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:18.773484 env[1193]: 2025-10-31 05:25:18.762 [INFO][4497] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" HandleID="k8s-pod-network.298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:18.773484 env[1193]: 2025-10-31 05:25:18.769 [INFO][4497] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:18.773484 env[1193]: 2025-10-31 05:25:18.771 [INFO][4490] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:25:18.774506 env[1193]: time="2025-10-31T05:25:18.774443504Z" level=info msg="TearDown network for sandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\" successfully" Oct 31 05:25:18.774604 env[1193]: time="2025-10-31T05:25:18.774501592Z" level=info msg="StopPodSandbox for \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\" returns successfully" Oct 31 05:25:18.775659 env[1193]: time="2025-10-31T05:25:18.775618861Z" level=info msg="RemovePodSandbox for \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\"" Oct 31 05:25:18.775881 env[1193]: time="2025-10-31T05:25:18.775797402Z" level=info msg="Forcibly stopping sandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\"" Oct 31 05:25:18.888604 env[1193]: 2025-10-31 05:25:18.832 [WARNING][4511] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0", GenerateName:"calico-apiserver-5cc6545496-", Namespace:"calico-apiserver", SelfLink:"", UID:"81bbb4a4-a415-4abc-a7fd-1a75817e45aa", ResourceVersion:"1083", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5cc6545496", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"af370948f133d7cbec722d4f9e0957256487bc1573587765e101a2d260fc14d5", Pod:"calico-apiserver-5cc6545496-bzmv2", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.71.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califfd5571249d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:18.888604 env[1193]: 2025-10-31 05:25:18.833 [INFO][4511] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:25:18.888604 env[1193]: 2025-10-31 05:25:18.833 [INFO][4511] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" iface="eth0" netns="" Oct 31 05:25:18.888604 env[1193]: 2025-10-31 05:25:18.833 [INFO][4511] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:25:18.888604 env[1193]: 2025-10-31 05:25:18.833 [INFO][4511] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:25:18.888604 env[1193]: 2025-10-31 05:25:18.866 [INFO][4518] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" HandleID="k8s-pod-network.298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:18.888604 env[1193]: 2025-10-31 05:25:18.866 [INFO][4518] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:18.888604 env[1193]: 2025-10-31 05:25:18.866 [INFO][4518] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:18.888604 env[1193]: 2025-10-31 05:25:18.878 [WARNING][4518] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" HandleID="k8s-pod-network.298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:18.888604 env[1193]: 2025-10-31 05:25:18.878 [INFO][4518] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" HandleID="k8s-pod-network.298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Workload="srv--clgmo.gb1.brightbox.com-k8s-calico--apiserver--5cc6545496--bzmv2-eth0" Oct 31 05:25:18.888604 env[1193]: 2025-10-31 05:25:18.882 [INFO][4518] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:18.888604 env[1193]: 2025-10-31 05:25:18.884 [INFO][4511] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e" Oct 31 05:25:18.890176 env[1193]: time="2025-10-31T05:25:18.890100868Z" level=info msg="TearDown network for sandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\" successfully" Oct 31 05:25:18.894846 env[1193]: time="2025-10-31T05:25:18.894795541Z" level=info msg="RemovePodSandbox \"298138e4c062df567fbe6232b938773ef98f8d2d1a69896a381577b8e80ec34e\" returns successfully" Oct 31 05:25:18.895939 env[1193]: time="2025-10-31T05:25:18.895875934Z" level=info msg="StopPodSandbox for \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\"" Oct 31 05:25:19.027188 env[1193]: 2025-10-31 05:25:18.964 [WARNING][4532] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0", GenerateName:"coredns-66bc5c9577-", Namespace:"kube-system", SelfLink:"", UID:"d9c3f104-ec6e-4a81-b201-05d6bbc995ee", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"66bc5c9577", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf", Pod:"coredns-66bc5c9577-ngmnt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ca9ddb495f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"liveness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1f90, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"readiness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1ff5, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:19.027188 env[1193]: 2025-10-31 05:25:18.965 [INFO][4532] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:25:19.027188 env[1193]: 2025-10-31 05:25:18.965 [INFO][4532] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" iface="eth0" netns="" Oct 31 05:25:19.027188 env[1193]: 2025-10-31 05:25:18.965 [INFO][4532] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:25:19.027188 env[1193]: 2025-10-31 05:25:18.965 [INFO][4532] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:25:19.027188 env[1193]: 2025-10-31 05:25:18.999 [INFO][4539] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" HandleID="k8s-pod-network.49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:19.027188 env[1193]: 2025-10-31 05:25:18.999 [INFO][4539] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:19.027188 env[1193]: 2025-10-31 05:25:19.000 [INFO][4539] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:19.027188 env[1193]: 2025-10-31 05:25:19.014 [WARNING][4539] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" HandleID="k8s-pod-network.49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:19.027188 env[1193]: 2025-10-31 05:25:19.015 [INFO][4539] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" HandleID="k8s-pod-network.49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:19.027188 env[1193]: 2025-10-31 05:25:19.022 [INFO][4539] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:19.027188 env[1193]: 2025-10-31 05:25:19.024 [INFO][4532] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:25:19.028417 env[1193]: time="2025-10-31T05:25:19.028362457Z" level=info msg="TearDown network for sandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\" successfully" Oct 31 05:25:19.028555 env[1193]: time="2025-10-31T05:25:19.028521216Z" level=info msg="StopPodSandbox for \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\" returns successfully" Oct 31 05:25:19.029397 env[1193]: time="2025-10-31T05:25:19.029359155Z" level=info msg="RemovePodSandbox for \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\"" Oct 31 05:25:19.029505 env[1193]: time="2025-10-31T05:25:19.029413953Z" level=info msg="Forcibly stopping sandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\"" Oct 31 05:25:19.151036 env[1193]: 2025-10-31 05:25:19.090 [WARNING][4553] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0", GenerateName:"coredns-66bc5c9577-", Namespace:"kube-system", SelfLink:"", UID:"d9c3f104-ec6e-4a81-b201-05d6bbc995ee", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2025, time.October, 31, 5, 24, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"66bc5c9577", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-clgmo.gb1.brightbox.com", ContainerID:"e0447c60cb161c4d5547c2d5b186725e5cc5abd6831524b8339ef6d6d7bd6adf", Pod:"coredns-66bc5c9577-ngmnt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.71.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali7ca9ddb495f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"liveness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1f90, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"readiness-probe", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x1ff5, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 31 05:25:19.151036 env[1193]: 2025-10-31 05:25:19.090 [INFO][4553] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:25:19.151036 env[1193]: 2025-10-31 05:25:19.091 [INFO][4553] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" iface="eth0" netns="" Oct 31 05:25:19.151036 env[1193]: 2025-10-31 05:25:19.091 [INFO][4553] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:25:19.151036 env[1193]: 2025-10-31 05:25:19.091 [INFO][4553] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:25:19.151036 env[1193]: 2025-10-31 05:25:19.125 [INFO][4562] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" HandleID="k8s-pod-network.49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:19.151036 env[1193]: 2025-10-31 05:25:19.125 [INFO][4562] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 31 05:25:19.151036 env[1193]: 2025-10-31 05:25:19.125 [INFO][4562] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 31 05:25:19.151036 env[1193]: 2025-10-31 05:25:19.144 [WARNING][4562] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" HandleID="k8s-pod-network.49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:19.151036 env[1193]: 2025-10-31 05:25:19.144 [INFO][4562] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" HandleID="k8s-pod-network.49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Workload="srv--clgmo.gb1.brightbox.com-k8s-coredns--66bc5c9577--ngmnt-eth0" Oct 31 05:25:19.151036 env[1193]: 2025-10-31 05:25:19.147 [INFO][4562] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 31 05:25:19.151036 env[1193]: 2025-10-31 05:25:19.149 [INFO][4553] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e" Oct 31 05:25:19.152649 env[1193]: time="2025-10-31T05:25:19.150986965Z" level=info msg="TearDown network for sandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\" successfully" Oct 31 05:25:19.156737 env[1193]: time="2025-10-31T05:25:19.156697542Z" level=info msg="RemovePodSandbox \"49b28f9a3023138282e7ee60e9545b793a82bec98c2a32e43cbb20601135377e\" returns successfully" Oct 31 05:25:25.955146 env[1193]: time="2025-10-31T05:25:25.954948435Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 05:25:26.277632 env[1193]: time="2025-10-31T05:25:26.277185403Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:26.279009 env[1193]: time="2025-10-31T05:25:26.278913436Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 05:25:26.279673 kubelet[2031]: E1031 05:25:26.279578 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:25:26.280696 kubelet[2031]: E1031 05:25:26.279691 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:25:26.280696 kubelet[2031]: E1031 05:25:26.280050 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container goldmane start failed in pod goldmane-7c778bb748-4spgj_calico-system(bc04009c-ce79-4cda-91a6-dd78e1ed2ba7): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:26.280696 kubelet[2031]: E1031 05:25:26.280130 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-7c778bb748-4spgj" podUID="bc04009c-ce79-4cda-91a6-dd78e1ed2ba7" Oct 31 05:25:26.281668 env[1193]: time="2025-10-31T05:25:26.281292858Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:25:26.584896 env[1193]: time="2025-10-31T05:25:26.584721989Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:26.586083 env[1193]: time="2025-10-31T05:25:26.586020687Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:25:26.586464 kubelet[2031]: E1031 05:25:26.586395 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:25:26.586589 kubelet[2031]: E1031 05:25:26.586478 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:25:26.586675 kubelet[2031]: E1031 05:25:26.586628 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-apiserver start failed in pod calico-apiserver-5cc6545496-7xfb2_calico-apiserver(f505ca8a-1440-4ca4-ac04-92eb3b2080ce): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:26.586766 kubelet[2031]: E1031 05:25:26.586696 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" podUID="f505ca8a-1440-4ca4-ac04-92eb3b2080ce" Oct 31 05:25:27.952265 env[1193]: time="2025-10-31T05:25:27.952168239Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:25:28.265536 env[1193]: time="2025-10-31T05:25:28.265291062Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:28.267375 env[1193]: time="2025-10-31T05:25:28.267283989Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:25:28.268549 kubelet[2031]: E1031 05:25:28.267804 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:25:28.268549 kubelet[2031]: E1031 05:25:28.267875 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:25:28.268549 kubelet[2031]: E1031 05:25:28.267999 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-apiserver start failed in pod calico-apiserver-5cc6545496-bzmv2_calico-apiserver(81bbb4a4-a415-4abc-a7fd-1a75817e45aa): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:28.268549 kubelet[2031]: E1031 05:25:28.268057 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" podUID="81bbb4a4-a415-4abc-a7fd-1a75817e45aa" Oct 31 05:25:28.953402 env[1193]: time="2025-10-31T05:25:28.953247016Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 05:25:29.262044 env[1193]: time="2025-10-31T05:25:29.261783783Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:29.263225 env[1193]: time="2025-10-31T05:25:29.263126547Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 05:25:29.263626 kubelet[2031]: E1031 05:25:29.263563 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:25:29.263792 kubelet[2031]: E1031 05:25:29.263636 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:25:29.264107 kubelet[2031]: E1031 05:25:29.264070 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container whisker start failed in pod whisker-6c6db879c4-hvpcf_calico-system(c5bf3236-396f-4d92-8de8-ce437ec49156): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:29.264210 env[1193]: time="2025-10-31T05:25:29.264157230Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 05:25:29.564492 env[1193]: time="2025-10-31T05:25:29.564291958Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:29.566112 env[1193]: time="2025-10-31T05:25:29.566025696Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 05:25:29.566466 kubelet[2031]: E1031 05:25:29.566394 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:25:29.566999 kubelet[2031]: E1031 05:25:29.566940 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:25:29.567898 kubelet[2031]: E1031 05:25:29.567255 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-kube-controllers start failed in pod calico-kube-controllers-65f7799b87-47jbs_calico-system(440bdb2f-ff72-44c2-b0bc-e953f311f252): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:29.567898 kubelet[2031]: E1031 05:25:29.567435 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" podUID="440bdb2f-ff72-44c2-b0bc-e953f311f252" Oct 31 05:25:29.568235 env[1193]: time="2025-10-31T05:25:29.567596059Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 05:25:29.876364 env[1193]: time="2025-10-31T05:25:29.876118564Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:29.878284 env[1193]: time="2025-10-31T05:25:29.878221068Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 05:25:29.878653 kubelet[2031]: E1031 05:25:29.878585 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:25:29.878860 kubelet[2031]: E1031 05:25:29.878817 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:25:29.879308 kubelet[2031]: E1031 05:25:29.879263 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-cprzg_calico-system(a6a56ae4-0d29-4361-8d53-116b2173dd54): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:29.880693 env[1193]: time="2025-10-31T05:25:29.880649851Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 05:25:30.184376 env[1193]: time="2025-10-31T05:25:30.184000802Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:30.185589 env[1193]: time="2025-10-31T05:25:30.185478426Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 05:25:30.185936 kubelet[2031]: E1031 05:25:30.185873 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:25:30.186126 kubelet[2031]: E1031 05:25:30.186092 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:25:30.186792 env[1193]: time="2025-10-31T05:25:30.186751182Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 05:25:30.187198 kubelet[2031]: E1031 05:25:30.187110 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container whisker-backend start failed in pod whisker-6c6db879c4-hvpcf_calico-system(c5bf3236-396f-4d92-8de8-ce437ec49156): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:30.189045 kubelet[2031]: E1031 05:25:30.187304 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6c6db879c4-hvpcf" podUID="c5bf3236-396f-4d92-8de8-ce437ec49156" Oct 31 05:25:30.505646 env[1193]: time="2025-10-31T05:25:30.505319221Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:30.512352 env[1193]: time="2025-10-31T05:25:30.512247828Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 05:25:30.512716 kubelet[2031]: E1031 05:25:30.512648 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:25:30.513033 kubelet[2031]: E1031 05:25:30.512983 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:25:30.513375 kubelet[2031]: E1031 05:25:30.513308 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-cprzg_calico-system(a6a56ae4-0d29-4361-8d53-116b2173dd54): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:30.513673 kubelet[2031]: E1031 05:25:30.513603 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:25:36.954397 kubelet[2031]: E1031 05:25:36.954179 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-7c778bb748-4spgj" podUID="bc04009c-ce79-4cda-91a6-dd78e1ed2ba7" Oct 31 05:25:39.352862 systemd[1]: run-containerd-runc-k8s.io-7b873f716d7a294c417b9f7188ba936f919094ee13d09cffe1e3f5f75c9670e9-runc.9vgIPP.mount: Deactivated successfully. Oct 31 05:25:39.952703 kubelet[2031]: E1031 05:25:39.952626 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" podUID="81bbb4a4-a415-4abc-a7fd-1a75817e45aa" Oct 31 05:25:40.953958 kubelet[2031]: E1031 05:25:40.953837 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6c6db879c4-hvpcf" podUID="c5bf3236-396f-4d92-8de8-ce437ec49156" Oct 31 05:25:41.977161 kubelet[2031]: E1031 05:25:41.977011 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" podUID="440bdb2f-ff72-44c2-b0bc-e953f311f252" Oct 31 05:25:41.979102 kubelet[2031]: E1031 05:25:41.979019 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" podUID="f505ca8a-1440-4ca4-ac04-92eb3b2080ce" Oct 31 05:25:43.145008 systemd[1]: Started sshd@15-10.230.36.102:22-139.178.68.195:53300.service. Oct 31 05:25:43.149277 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 31 05:25:43.149468 kernel: audit: type=1130 audit(1761888343.146:1334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.36.102:22-139.178.68.195:53300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:25:43.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.36.102:22-139.178.68.195:53300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:25:43.955722 kubelet[2031]: E1031 05:25:43.955550 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:25:44.131000 audit[4622]: USER_ACCT pid=4622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:44.133084 sshd[4622]: Accepted publickey for core from 139.178.68.195 port 53300 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:25:44.139365 kernel: audit: type=1101 audit(1761888344.131:1335): pid=4622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:44.141000 audit[4622]: CRED_ACQ pid=4622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:44.150391 kernel: audit: type=1103 audit(1761888344.141:1336): pid=4622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:44.155428 kernel: audit: type=1006 audit(1761888344.141:1337): pid=4622 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 31 05:25:44.141000 audit[4622]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd8db5bf0 a2=3 a3=0 items=0 ppid=1 pid=4622 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:44.141000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:25:44.165153 kernel: audit: type=1300 audit(1761888344.141:1337): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd8db5bf0 a2=3 a3=0 items=0 ppid=1 pid=4622 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:44.165517 kernel: audit: type=1327 audit(1761888344.141:1337): proctitle=737368643A20636F7265205B707269765D Oct 31 05:25:44.165808 sshd[4622]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:25:44.185297 systemd-logind[1187]: New session 10 of user core. Oct 31 05:25:44.186159 systemd[1]: Started session-10.scope. Oct 31 05:25:44.196000 audit[4622]: USER_START pid=4622 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:44.199000 audit[4625]: CRED_ACQ pid=4625 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:44.211198 kernel: audit: type=1105 audit(1761888344.196:1338): pid=4622 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:44.211347 kernel: audit: type=1103 audit(1761888344.199:1339): pid=4625 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:45.530487 sshd[4622]: pam_unix(sshd:session): session closed for user core Oct 31 05:25:45.540614 kernel: audit: type=1106 audit(1761888345.532:1340): pid=4622 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:45.540740 kernel: audit: type=1104 audit(1761888345.533:1341): pid=4622 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:45.532000 audit[4622]: USER_END pid=4622 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:45.533000 audit[4622]: CRED_DISP pid=4622 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:45.542601 systemd[1]: sshd@15-10.230.36.102:22-139.178.68.195:53300.service: Deactivated successfully. Oct 31 05:25:45.544031 systemd[1]: session-10.scope: Deactivated successfully. Oct 31 05:25:45.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.36.102:22-139.178.68.195:53300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:25:45.549044 systemd-logind[1187]: Session 10 logged out. Waiting for processes to exit. Oct 31 05:25:45.550634 systemd-logind[1187]: Removed session 10. Oct 31 05:25:50.686774 systemd[1]: Started sshd@16-10.230.36.102:22-139.178.68.195:55762.service. Oct 31 05:25:50.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.36.102:22-139.178.68.195:55762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:25:50.692959 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 05:25:50.693078 kernel: audit: type=1130 audit(1761888350.687:1343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.36.102:22-139.178.68.195:55762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:25:50.959418 env[1193]: time="2025-10-31T05:25:50.959126370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 05:25:51.283540 env[1193]: time="2025-10-31T05:25:51.283376103Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:51.284754 env[1193]: time="2025-10-31T05:25:51.284681037Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 05:25:51.286663 kubelet[2031]: E1031 05:25:51.286540 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:25:51.287509 kubelet[2031]: E1031 05:25:51.287471 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:25:51.287964 kubelet[2031]: E1031 05:25:51.287829 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container goldmane start failed in pod goldmane-7c778bb748-4spgj_calico-system(bc04009c-ce79-4cda-91a6-dd78e1ed2ba7): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:51.288176 kubelet[2031]: E1031 05:25:51.288125 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-7c778bb748-4spgj" podUID="bc04009c-ce79-4cda-91a6-dd78e1ed2ba7" Oct 31 05:25:51.685000 audit[4636]: USER_ACCT pid=4636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:51.687125 sshd[4636]: Accepted publickey for core from 139.178.68.195 port 55762 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:25:51.711359 kernel: audit: type=1101 audit(1761888351.685:1344): pid=4636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:51.711000 audit[4636]: CRED_ACQ pid=4636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:51.713662 sshd[4636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:25:51.720412 kernel: audit: type=1103 audit(1761888351.711:1345): pid=4636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:51.711000 audit[4636]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffef9b3ba0 a2=3 a3=0 items=0 ppid=1 pid=4636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:51.732001 kernel: audit: type=1006 audit(1761888351.711:1346): pid=4636 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Oct 31 05:25:51.733548 kernel: audit: type=1300 audit(1761888351.711:1346): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffef9b3ba0 a2=3 a3=0 items=0 ppid=1 pid=4636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:51.733632 kernel: audit: type=1327 audit(1761888351.711:1346): proctitle=737368643A20636F7265205B707269765D Oct 31 05:25:51.711000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:25:51.745618 systemd[1]: Started session-11.scope. Oct 31 05:25:51.747737 systemd-logind[1187]: New session 11 of user core. Oct 31 05:25:51.756000 audit[4636]: USER_START pid=4636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:51.767123 kernel: audit: type=1105 audit(1761888351.756:1347): pid=4636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:51.767216 kernel: audit: type=1103 audit(1761888351.765:1348): pid=4640 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:51.765000 audit[4640]: CRED_ACQ pid=4640 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:52.503286 sshd[4636]: pam_unix(sshd:session): session closed for user core Oct 31 05:25:52.503000 audit[4636]: USER_END pid=4636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:52.508000 audit[4636]: CRED_DISP pid=4636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:52.514338 systemd[1]: sshd@16-10.230.36.102:22-139.178.68.195:55762.service: Deactivated successfully. Oct 31 05:25:52.515528 systemd[1]: session-11.scope: Deactivated successfully. Oct 31 05:25:52.519280 kernel: audit: type=1106 audit(1761888352.503:1349): pid=4636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:52.519407 kernel: audit: type=1104 audit(1761888352.508:1350): pid=4636 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:52.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.36.102:22-139.178.68.195:55762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:25:52.521021 systemd-logind[1187]: Session 11 logged out. Waiting for processes to exit. Oct 31 05:25:52.523634 systemd-logind[1187]: Removed session 11. Oct 31 05:25:52.959509 env[1193]: time="2025-10-31T05:25:52.959047648Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:25:53.265068 env[1193]: time="2025-10-31T05:25:53.264892994Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:53.267273 env[1193]: time="2025-10-31T05:25:53.267193721Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:25:53.267912 kubelet[2031]: E1031 05:25:53.267838 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:25:53.268527 kubelet[2031]: E1031 05:25:53.268490 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:25:53.269483 kubelet[2031]: E1031 05:25:53.269446 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-apiserver start failed in pod calico-apiserver-5cc6545496-7xfb2_calico-apiserver(f505ca8a-1440-4ca4-ac04-92eb3b2080ce): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:53.269694 kubelet[2031]: E1031 05:25:53.269648 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" podUID="f505ca8a-1440-4ca4-ac04-92eb3b2080ce" Oct 31 05:25:53.953900 env[1193]: time="2025-10-31T05:25:53.953487912Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 05:25:54.277129 env[1193]: time="2025-10-31T05:25:54.276665900Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:54.278631 env[1193]: time="2025-10-31T05:25:54.278375889Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 05:25:54.278950 kubelet[2031]: E1031 05:25:54.278898 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:25:54.279882 kubelet[2031]: E1031 05:25:54.279555 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:25:54.280067 env[1193]: time="2025-10-31T05:25:54.280009194Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:25:54.280370 kubelet[2031]: E1031 05:25:54.280302 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-kube-controllers start failed in pod calico-kube-controllers-65f7799b87-47jbs_calico-system(440bdb2f-ff72-44c2-b0bc-e953f311f252): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:54.280525 kubelet[2031]: E1031 05:25:54.280388 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" podUID="440bdb2f-ff72-44c2-b0bc-e953f311f252" Oct 31 05:25:54.583417 env[1193]: time="2025-10-31T05:25:54.583182137Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:54.585114 env[1193]: time="2025-10-31T05:25:54.584886855Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:25:54.585564 kubelet[2031]: E1031 05:25:54.585490 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:25:54.585801 kubelet[2031]: E1031 05:25:54.585761 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:25:54.586099 kubelet[2031]: E1031 05:25:54.586044 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-apiserver start failed in pod calico-apiserver-5cc6545496-bzmv2_calico-apiserver(81bbb4a4-a415-4abc-a7fd-1a75817e45aa): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:54.586478 kubelet[2031]: E1031 05:25:54.586282 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" podUID="81bbb4a4-a415-4abc-a7fd-1a75817e45aa" Oct 31 05:25:54.957901 env[1193]: time="2025-10-31T05:25:54.957470919Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 05:25:55.267375 env[1193]: time="2025-10-31T05:25:55.267148408Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:55.269058 env[1193]: time="2025-10-31T05:25:55.268975125Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 05:25:55.269586 kubelet[2031]: E1031 05:25:55.269527 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:25:55.269830 kubelet[2031]: E1031 05:25:55.269796 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:25:55.270566 kubelet[2031]: E1031 05:25:55.270521 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container whisker start failed in pod whisker-6c6db879c4-hvpcf_calico-system(c5bf3236-396f-4d92-8de8-ce437ec49156): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:55.272046 env[1193]: time="2025-10-31T05:25:55.271995151Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 05:25:55.583396 env[1193]: time="2025-10-31T05:25:55.583197195Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:55.585242 env[1193]: time="2025-10-31T05:25:55.585136017Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 05:25:55.585713 kubelet[2031]: E1031 05:25:55.585642 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:25:55.586418 kubelet[2031]: E1031 05:25:55.585760 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:25:55.586418 kubelet[2031]: E1031 05:25:55.585978 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container whisker-backend start failed in pod whisker-6c6db879c4-hvpcf_calico-system(c5bf3236-396f-4d92-8de8-ce437ec49156): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:55.586418 kubelet[2031]: E1031 05:25:55.586097 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6c6db879c4-hvpcf" podUID="c5bf3236-396f-4d92-8de8-ce437ec49156" Oct 31 05:25:56.954162 env[1193]: time="2025-10-31T05:25:56.953832704Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 05:25:57.269030 env[1193]: time="2025-10-31T05:25:57.268761385Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:57.270225 env[1193]: time="2025-10-31T05:25:57.270086249Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 05:25:57.270587 kubelet[2031]: E1031 05:25:57.270534 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:25:57.271054 kubelet[2031]: E1031 05:25:57.270597 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:25:57.271054 kubelet[2031]: E1031 05:25:57.270750 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-cprzg_calico-system(a6a56ae4-0d29-4361-8d53-116b2173dd54): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:57.272172 env[1193]: time="2025-10-31T05:25:57.272116134Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 05:25:57.600682 env[1193]: time="2025-10-31T05:25:57.600502475Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:25:57.603808 env[1193]: time="2025-10-31T05:25:57.603739640Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 05:25:57.604150 kubelet[2031]: E1031 05:25:57.604076 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:25:57.604396 kubelet[2031]: E1031 05:25:57.604324 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:25:57.605324 kubelet[2031]: E1031 05:25:57.605274 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-cprzg_calico-system(a6a56ae4-0d29-4361-8d53-116b2173dd54): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 05:25:57.605663 kubelet[2031]: E1031 05:25:57.605593 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:25:57.654683 systemd[1]: Started sshd@17-10.230.36.102:22-139.178.68.195:53146.service. Oct 31 05:25:57.658831 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 31 05:25:57.658944 kernel: audit: type=1130 audit(1761888357.653:1352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.36.102:22-139.178.68.195:53146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:25:57.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.36.102:22-139.178.68.195:53146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:25:58.588000 audit[4659]: USER_ACCT pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:58.590344 sshd[4659]: Accepted publickey for core from 139.178.68.195 port 53146 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:25:58.597355 kernel: audit: type=1101 audit(1761888358.588:1353): pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:58.597000 audit[4659]: CRED_ACQ pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:58.599719 sshd[4659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:25:58.606540 kernel: audit: type=1103 audit(1761888358.597:1354): pid=4659 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:58.606651 kernel: audit: type=1006 audit(1761888358.597:1355): pid=4659 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Oct 31 05:25:58.597000 audit[4659]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca79001d0 a2=3 a3=0 items=0 ppid=1 pid=4659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:58.619465 kernel: audit: type=1300 audit(1761888358.597:1355): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca79001d0 a2=3 a3=0 items=0 ppid=1 pid=4659 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:25:58.619576 kernel: audit: type=1327 audit(1761888358.597:1355): proctitle=737368643A20636F7265205B707269765D Oct 31 05:25:58.597000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:25:58.618840 systemd[1]: Started session-12.scope. Oct 31 05:25:58.620897 systemd-logind[1187]: New session 12 of user core. Oct 31 05:25:58.628000 audit[4659]: USER_START pid=4659 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:58.632000 audit[4661]: CRED_ACQ pid=4661 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:58.644172 kernel: audit: type=1105 audit(1761888358.628:1356): pid=4659 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:58.644417 kernel: audit: type=1103 audit(1761888358.632:1357): pid=4661 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:59.337986 sshd[4659]: pam_unix(sshd:session): session closed for user core Oct 31 05:25:59.339000 audit[4659]: USER_END pid=4659 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:59.339000 audit[4659]: CRED_DISP pid=4659 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:59.350529 systemd-logind[1187]: Session 12 logged out. Waiting for processes to exit. Oct 31 05:25:59.355187 kernel: audit: type=1106 audit(1761888359.339:1358): pid=4659 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:59.355303 kernel: audit: type=1104 audit(1761888359.339:1359): pid=4659 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:25:59.353426 systemd[1]: sshd@17-10.230.36.102:22-139.178.68.195:53146.service: Deactivated successfully. Oct 31 05:25:59.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.36.102:22-139.178.68.195:53146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:25:59.354595 systemd[1]: session-12.scope: Deactivated successfully. Oct 31 05:25:59.356810 systemd-logind[1187]: Removed session 12. Oct 31 05:25:59.488833 systemd[1]: Started sshd@18-10.230.36.102:22-139.178.68.195:53162.service. Oct 31 05:25:59.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.36.102:22-139.178.68.195:53162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:00.408000 audit[4672]: USER_ACCT pid=4672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:00.410003 sshd[4672]: Accepted publickey for core from 139.178.68.195 port 53162 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:26:00.410000 audit[4672]: CRED_ACQ pid=4672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:00.410000 audit[4672]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe69b29b30 a2=3 a3=0 items=0 ppid=1 pid=4672 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:00.410000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:00.412983 sshd[4672]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:26:00.421184 systemd-logind[1187]: New session 13 of user core. Oct 31 05:26:00.421362 systemd[1]: Started session-13.scope. Oct 31 05:26:00.430000 audit[4672]: USER_START pid=4672 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:00.433000 audit[4674]: CRED_ACQ pid=4674 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:01.222017 sshd[4672]: pam_unix(sshd:session): session closed for user core Oct 31 05:26:01.223000 audit[4672]: USER_END pid=4672 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:01.223000 audit[4672]: CRED_DISP pid=4672 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:01.227532 systemd[1]: sshd@18-10.230.36.102:22-139.178.68.195:53162.service: Deactivated successfully. Oct 31 05:26:01.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.36.102:22-139.178.68.195:53162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:01.228745 systemd[1]: session-13.scope: Deactivated successfully. Oct 31 05:26:01.229760 systemd-logind[1187]: Session 13 logged out. Waiting for processes to exit. Oct 31 05:26:01.231435 systemd-logind[1187]: Removed session 13. Oct 31 05:26:01.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.36.102:22-139.178.68.195:53166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:01.371535 systemd[1]: Started sshd@19-10.230.36.102:22-139.178.68.195:53166.service. Oct 31 05:26:02.288885 sshd[4682]: Accepted publickey for core from 139.178.68.195 port 53166 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:26:02.287000 audit[4682]: USER_ACCT pid=4682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:02.289000 audit[4682]: CRED_ACQ pid=4682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:02.289000 audit[4682]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe855bf230 a2=3 a3=0 items=0 ppid=1 pid=4682 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:02.289000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:02.292232 sshd[4682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:26:02.300470 systemd-logind[1187]: New session 14 of user core. Oct 31 05:26:02.302183 systemd[1]: Started session-14.scope. Oct 31 05:26:02.310000 audit[4682]: USER_START pid=4682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:02.314000 audit[4684]: CRED_ACQ pid=4684 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:02.952368 kubelet[2031]: E1031 05:26:02.952257 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-7c778bb748-4spgj" podUID="bc04009c-ce79-4cda-91a6-dd78e1ed2ba7" Oct 31 05:26:03.030186 sshd[4682]: pam_unix(sshd:session): session closed for user core Oct 31 05:26:03.036896 kernel: kauditd_printk_skb: 20 callbacks suppressed Oct 31 05:26:03.037152 kernel: audit: type=1106 audit(1761888363.031:1376): pid=4682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:03.031000 audit[4682]: USER_END pid=4682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:03.041909 systemd[1]: sshd@19-10.230.36.102:22-139.178.68.195:53166.service: Deactivated successfully. Oct 31 05:26:03.044273 systemd[1]: session-14.scope: Deactivated successfully. Oct 31 05:26:03.031000 audit[4682]: CRED_DISP pid=4682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:03.046036 systemd-logind[1187]: Session 14 logged out. Waiting for processes to exit. Oct 31 05:26:03.048015 systemd-logind[1187]: Removed session 14. Oct 31 05:26:03.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.36.102:22-139.178.68.195:53166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:03.056982 kernel: audit: type=1104 audit(1761888363.031:1377): pid=4682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:03.057098 kernel: audit: type=1131 audit(1761888363.041:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.36.102:22-139.178.68.195:53166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:04.953760 kubelet[2031]: E1031 05:26:04.953487 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" podUID="f505ca8a-1440-4ca4-ac04-92eb3b2080ce" Oct 31 05:26:05.955461 kubelet[2031]: E1031 05:26:05.955375 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6c6db879c4-hvpcf" podUID="c5bf3236-396f-4d92-8de8-ce437ec49156" Oct 31 05:26:08.185005 systemd[1]: Started sshd@20-10.230.36.102:22-139.178.68.195:47620.service. Oct 31 05:26:08.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.36.102:22-139.178.68.195:47620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:08.194367 kernel: audit: type=1130 audit(1761888368.186:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.36.102:22-139.178.68.195:47620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:08.953721 kubelet[2031]: E1031 05:26:08.953627 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" podUID="440bdb2f-ff72-44c2-b0bc-e953f311f252" Oct 31 05:26:08.957187 kubelet[2031]: E1031 05:26:08.956640 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:26:08.960447 kubelet[2031]: E1031 05:26:08.960393 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" podUID="81bbb4a4-a415-4abc-a7fd-1a75817e45aa" Oct 31 05:26:09.122000 audit[4700]: USER_ACCT pid=4700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:09.131767 sshd[4700]: Accepted publickey for core from 139.178.68.195 port 47620 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:26:09.132729 kernel: audit: type=1101 audit(1761888369.122:1380): pid=4700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:09.134778 sshd[4700]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:26:09.132000 audit[4700]: CRED_ACQ pid=4700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:09.146058 kernel: audit: type=1103 audit(1761888369.132:1381): pid=4700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:09.146186 kernel: audit: type=1006 audit(1761888369.132:1382): pid=4700 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 31 05:26:09.132000 audit[4700]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6c792ff0 a2=3 a3=0 items=0 ppid=1 pid=4700 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:09.154369 kernel: audit: type=1300 audit(1761888369.132:1382): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6c792ff0 a2=3 a3=0 items=0 ppid=1 pid=4700 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:09.132000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:09.159368 kernel: audit: type=1327 audit(1761888369.132:1382): proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:09.162686 systemd-logind[1187]: New session 15 of user core. Oct 31 05:26:09.163960 systemd[1]: Started session-15.scope. Oct 31 05:26:09.171000 audit[4700]: USER_START pid=4700 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:09.181527 kernel: audit: type=1105 audit(1761888369.171:1383): pid=4700 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:09.180000 audit[4702]: CRED_ACQ pid=4702 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:09.188381 kernel: audit: type=1103 audit(1761888369.180:1384): pid=4702 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:09.350320 systemd[1]: run-containerd-runc-k8s.io-7b873f716d7a294c417b9f7188ba936f919094ee13d09cffe1e3f5f75c9670e9-runc.9yWleU.mount: Deactivated successfully. Oct 31 05:26:09.943270 sshd[4700]: pam_unix(sshd:session): session closed for user core Oct 31 05:26:09.944000 audit[4700]: USER_END pid=4700 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:09.954374 kernel: audit: type=1106 audit(1761888369.944:1385): pid=4700 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:09.952000 audit[4700]: CRED_DISP pid=4700 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:09.955997 systemd[1]: sshd@20-10.230.36.102:22-139.178.68.195:47620.service: Deactivated successfully. Oct 31 05:26:09.957451 systemd[1]: session-15.scope: Deactivated successfully. Oct 31 05:26:09.962355 kernel: audit: type=1104 audit(1761888369.952:1386): pid=4700 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:09.962755 systemd-logind[1187]: Session 15 logged out. Waiting for processes to exit. Oct 31 05:26:09.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.36.102:22-139.178.68.195:47620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:09.964166 systemd-logind[1187]: Removed session 15. Oct 31 05:26:11.076000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=522574 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:26:11.076000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:26:11.076000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020b1180 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:26:11.076000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:26:11.076000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d2d500 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:26:11.076000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:26:11.807000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=522570 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:26:11.807000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7e a1=c00e948180 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:26:11.807000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:26:11.812000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:26:11.812000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c00f0e01c0 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:26:11.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:26:11.812000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=522574 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:26:11.812000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7e a1=c00e9481b0 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:26:11.812000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:26:11.813000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:26:11.813000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c00f0e01e0 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:26:11.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:26:11.813000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=522574 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:26:11.813000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c00df60420 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:26:11.813000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:26:11.819000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=522576 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:26:11.819000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c00df604e0 a2=fc6 a3=0 items=0 ppid=1721 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c668 key=(null) Oct 31 05:26:11.819000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E33362E313032002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 31 05:26:15.092648 systemd[1]: Started sshd@21-10.230.36.102:22-139.178.68.195:53236.service. Oct 31 05:26:15.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.36.102:22-139.178.68.195:53236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:15.095317 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 31 05:26:15.095519 kernel: audit: type=1130 audit(1761888375.092:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.36.102:22-139.178.68.195:53236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:16.007000 audit[4736]: USER_ACCT pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:16.011106 sshd[4736]: Accepted publickey for core from 139.178.68.195 port 53236 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:26:16.016460 kernel: audit: type=1101 audit(1761888376.007:1397): pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:16.023634 kernel: audit: type=1103 audit(1761888376.015:1398): pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:16.015000 audit[4736]: CRED_ACQ pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:16.017648 sshd[4736]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:26:16.015000 audit[4736]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd50174940 a2=3 a3=0 items=0 ppid=1 pid=4736 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:16.034870 kernel: audit: type=1006 audit(1761888376.015:1399): pid=4736 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Oct 31 05:26:16.034992 kernel: audit: type=1300 audit(1761888376.015:1399): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd50174940 a2=3 a3=0 items=0 ppid=1 pid=4736 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:16.015000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:16.039363 kernel: audit: type=1327 audit(1761888376.015:1399): proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:16.043170 systemd-logind[1187]: New session 16 of user core. Oct 31 05:26:16.044898 systemd[1]: Started session-16.scope. Oct 31 05:26:16.052000 audit[4736]: USER_START pid=4736 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:16.054000 audit[4738]: CRED_ACQ pid=4738 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:16.070466 kernel: audit: type=1105 audit(1761888376.052:1400): pid=4736 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:16.070586 kernel: audit: type=1103 audit(1761888376.054:1401): pid=4738 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:16.744358 sshd[4736]: pam_unix(sshd:session): session closed for user core Oct 31 05:26:16.745000 audit[4736]: USER_END pid=4736 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:16.749179 systemd[1]: sshd@21-10.230.36.102:22-139.178.68.195:53236.service: Deactivated successfully. Oct 31 05:26:16.750614 systemd[1]: session-16.scope: Deactivated successfully. Oct 31 05:26:16.754352 kernel: audit: type=1106 audit(1761888376.745:1402): pid=4736 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:16.754938 systemd-logind[1187]: Session 16 logged out. Waiting for processes to exit. Oct 31 05:26:16.745000 audit[4736]: CRED_DISP pid=4736 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:16.762366 kernel: audit: type=1104 audit(1761888376.745:1403): pid=4736 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:16.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.36.102:22-139.178.68.195:53236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:16.762852 systemd-logind[1187]: Removed session 16. Oct 31 05:26:16.962845 kubelet[2031]: E1031 05:26:16.962741 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-7c778bb748-4spgj" podUID="bc04009c-ce79-4cda-91a6-dd78e1ed2ba7" Oct 31 05:26:18.168000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:26:18.168000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:26:18.168000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013d9f00 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:26:18.168000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:26:18.168000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0020b1b60 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:26:18.168000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:26:18.169000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:26:18.169000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0020b1ba0 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:26:18.169000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:26:18.173000 audit[1893]: AVC avc: denied { watch } for pid=1893 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=522568 scontext=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 31 05:26:18.173000 audit[1893]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001bf2360 a2=fc6 a3=0 items=0 ppid=1747 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c283,c588 key=(null) Oct 31 05:26:18.173000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 31 05:26:18.952941 kubelet[2031]: E1031 05:26:18.952880 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" podUID="f505ca8a-1440-4ca4-ac04-92eb3b2080ce" Oct 31 05:26:19.953826 kubelet[2031]: E1031 05:26:19.953738 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" podUID="81bbb4a4-a415-4abc-a7fd-1a75817e45aa" Oct 31 05:26:19.955201 kubelet[2031]: E1031 05:26:19.955141 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6c6db879c4-hvpcf" podUID="c5bf3236-396f-4d92-8de8-ce437ec49156" Oct 31 05:26:21.893362 systemd[1]: Started sshd@22-10.230.36.102:22-139.178.68.195:53248.service. Oct 31 05:26:21.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.36.102:22-139.178.68.195:53248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:21.899055 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 31 05:26:21.899207 kernel: audit: type=1130 audit(1761888381.892:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.36.102:22-139.178.68.195:53248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:22.818000 audit[4752]: USER_ACCT pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:22.820699 sshd[4752]: Accepted publickey for core from 139.178.68.195 port 53248 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:26:22.827361 kernel: audit: type=1101 audit(1761888382.818:1410): pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:22.826000 audit[4752]: CRED_ACQ pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:22.828517 sshd[4752]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:26:22.834380 kernel: audit: type=1103 audit(1761888382.826:1411): pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:22.861179 kernel: audit: type=1006 audit(1761888382.826:1412): pid=4752 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Oct 31 05:26:22.861290 kernel: audit: type=1300 audit(1761888382.826:1412): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe69b4cb20 a2=3 a3=0 items=0 ppid=1 pid=4752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:22.826000 audit[4752]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe69b4cb20 a2=3 a3=0 items=0 ppid=1 pid=4752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:22.826000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:22.865370 kernel: audit: type=1327 audit(1761888382.826:1412): proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:22.869358 systemd-logind[1187]: New session 17 of user core. Oct 31 05:26:22.871663 systemd[1]: Started session-17.scope. Oct 31 05:26:22.879000 audit[4752]: USER_START pid=4752 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:22.889613 kernel: audit: type=1105 audit(1761888382.879:1413): pid=4752 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:22.888000 audit[4754]: CRED_ACQ pid=4754 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:22.896381 kernel: audit: type=1103 audit(1761888382.888:1414): pid=4754 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:23.576734 sshd[4752]: pam_unix(sshd:session): session closed for user core Oct 31 05:26:23.577000 audit[4752]: USER_END pid=4752 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:23.584259 systemd[1]: sshd@22-10.230.36.102:22-139.178.68.195:53248.service: Deactivated successfully. Oct 31 05:26:23.586796 systemd-logind[1187]: Session 17 logged out. Waiting for processes to exit. Oct 31 05:26:23.591358 kernel: audit: type=1106 audit(1761888383.577:1415): pid=4752 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:23.577000 audit[4752]: CRED_DISP pid=4752 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:23.591996 systemd[1]: session-17.scope: Deactivated successfully. Oct 31 05:26:23.594102 systemd-logind[1187]: Removed session 17. Oct 31 05:26:23.598361 kernel: audit: type=1104 audit(1761888383.577:1416): pid=4752 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:23.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.36.102:22-139.178.68.195:53248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:23.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.230.36.102:22-139.178.68.195:41600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:23.723759 systemd[1]: Started sshd@23-10.230.36.102:22-139.178.68.195:41600.service. Oct 31 05:26:23.953390 kubelet[2031]: E1031 05:26:23.953276 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" podUID="440bdb2f-ff72-44c2-b0bc-e953f311f252" Oct 31 05:26:23.954465 kubelet[2031]: E1031 05:26:23.954241 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:26:24.620000 audit[4764]: USER_ACCT pid=4764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:24.622642 sshd[4764]: Accepted publickey for core from 139.178.68.195 port 41600 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:26:24.622000 audit[4764]: CRED_ACQ pid=4764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:24.623000 audit[4764]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0ed6d8f0 a2=3 a3=0 items=0 ppid=1 pid=4764 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:24.623000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:24.625512 sshd[4764]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:26:24.633482 systemd-logind[1187]: New session 18 of user core. Oct 31 05:26:24.634429 systemd[1]: Started session-18.scope. Oct 31 05:26:24.643000 audit[4764]: USER_START pid=4764 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:24.645000 audit[4766]: CRED_ACQ pid=4766 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:25.786590 sshd[4764]: pam_unix(sshd:session): session closed for user core Oct 31 05:26:25.788000 audit[4764]: USER_END pid=4764 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:25.789000 audit[4764]: CRED_DISP pid=4764 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:25.792292 systemd[1]: sshd@23-10.230.36.102:22-139.178.68.195:41600.service: Deactivated successfully. Oct 31 05:26:25.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.230.36.102:22-139.178.68.195:41600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:25.793719 systemd[1]: session-18.scope: Deactivated successfully. Oct 31 05:26:25.794688 systemd-logind[1187]: Session 18 logged out. Waiting for processes to exit. Oct 31 05:26:25.795997 systemd-logind[1187]: Removed session 18. Oct 31 05:26:25.935979 systemd[1]: Started sshd@24-10.230.36.102:22-139.178.68.195:41608.service. Oct 31 05:26:25.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.230.36.102:22-139.178.68.195:41608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:26.856689 sshd[4774]: Accepted publickey for core from 139.178.68.195 port 41608 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:26:26.855000 audit[4774]: USER_ACCT pid=4774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:26.857000 audit[4774]: CRED_ACQ pid=4774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:26.858000 audit[4774]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc862ce440 a2=3 a3=0 items=0 ppid=1 pid=4774 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:26.858000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:26.860273 sshd[4774]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:26:26.867863 systemd-logind[1187]: New session 19 of user core. Oct 31 05:26:26.868794 systemd[1]: Started session-19.scope. Oct 31 05:26:26.876000 audit[4774]: USER_START pid=4774 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:26.878000 audit[4776]: CRED_ACQ pid=4776 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:28.262398 kernel: kauditd_printk_skb: 20 callbacks suppressed Oct 31 05:26:28.262748 kernel: audit: type=1325 audit(1761888388.255:1433): table=filter:111 family=2 entries=26 op=nft_register_rule pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:26:28.255000 audit[4786]: NETFILTER_CFG table=filter:111 family=2 entries=26 op=nft_register_rule pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:26:28.255000 audit[4786]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fff460431f0 a2=0 a3=7fff460431dc items=0 ppid=2149 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:28.271427 kernel: audit: type=1300 audit(1761888388.255:1433): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7fff460431f0 a2=0 a3=7fff460431dc items=0 ppid=2149 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:28.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:26:28.275078 kernel: audit: type=1327 audit(1761888388.255:1433): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:26:28.274000 audit[4786]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:26:28.274000 audit[4786]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff460431f0 a2=0 a3=0 items=0 ppid=2149 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:28.288733 kernel: audit: type=1325 audit(1761888388.274:1434): table=nat:112 family=2 entries=20 op=nft_register_rule pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:26:28.288848 kernel: audit: type=1300 audit(1761888388.274:1434): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff460431f0 a2=0 a3=0 items=0 ppid=2149 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:28.288913 kernel: audit: type=1327 audit(1761888388.274:1434): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:26:28.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:26:28.384919 sshd[4774]: pam_unix(sshd:session): session closed for user core Oct 31 05:26:28.387000 audit[4774]: USER_END pid=4774 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:28.400406 kernel: audit: type=1106 audit(1761888388.387:1435): pid=4774 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:28.401792 kernel: audit: type=1104 audit(1761888388.387:1436): pid=4774 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:28.387000 audit[4774]: CRED_DISP pid=4774 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:28.408179 systemd[1]: sshd@24-10.230.36.102:22-139.178.68.195:41608.service: Deactivated successfully. Oct 31 05:26:28.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.230.36.102:22-139.178.68.195:41608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:28.409553 systemd[1]: session-19.scope: Deactivated successfully. Oct 31 05:26:28.416219 systemd-logind[1187]: Session 19 logged out. Waiting for processes to exit. Oct 31 05:26:28.416763 kernel: audit: type=1131 audit(1761888388.407:1437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.230.36.102:22-139.178.68.195:41608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:28.418746 systemd-logind[1187]: Removed session 19. Oct 31 05:26:28.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.230.36.102:22-139.178.68.195:41620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:28.536904 systemd[1]: Started sshd@25-10.230.36.102:22-139.178.68.195:41620.service. Oct 31 05:26:28.543367 kernel: audit: type=1130 audit(1761888388.535:1438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.230.36.102:22-139.178.68.195:41620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:29.318000 audit[4792]: NETFILTER_CFG table=filter:113 family=2 entries=38 op=nft_register_rule pid=4792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:26:29.318000 audit[4792]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffd2e0b9550 a2=0 a3=7ffd2e0b953c items=0 ppid=2149 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:29.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:26:29.323000 audit[4792]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4792 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:26:29.323000 audit[4792]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd2e0b9550 a2=0 a3=0 items=0 ppid=2149 pid=4792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:29.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:26:29.461000 audit[4789]: USER_ACCT pid=4789 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:29.462898 sshd[4789]: Accepted publickey for core from 139.178.68.195 port 41620 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:26:29.463000 audit[4789]: CRED_ACQ pid=4789 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:29.463000 audit[4789]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd65655a30 a2=3 a3=0 items=0 ppid=1 pid=4789 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:29.463000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:29.466583 sshd[4789]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:26:29.475056 systemd-logind[1187]: New session 20 of user core. Oct 31 05:26:29.476114 systemd[1]: Started session-20.scope. Oct 31 05:26:29.484000 audit[4789]: USER_START pid=4789 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:29.487000 audit[4793]: CRED_ACQ pid=4793 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:30.512261 sshd[4789]: pam_unix(sshd:session): session closed for user core Oct 31 05:26:30.514000 audit[4789]: USER_END pid=4789 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:30.514000 audit[4789]: CRED_DISP pid=4789 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:30.518518 systemd[1]: sshd@25-10.230.36.102:22-139.178.68.195:41620.service: Deactivated successfully. Oct 31 05:26:30.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.230.36.102:22-139.178.68.195:41620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:30.520163 systemd[1]: session-20.scope: Deactivated successfully. Oct 31 05:26:30.521306 systemd-logind[1187]: Session 20 logged out. Waiting for processes to exit. Oct 31 05:26:30.522939 systemd-logind[1187]: Removed session 20. Oct 31 05:26:30.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.230.36.102:22-139.178.68.195:41632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:30.661804 systemd[1]: Started sshd@26-10.230.36.102:22-139.178.68.195:41632.service. Oct 31 05:26:30.960099 kubelet[2031]: E1031 05:26:30.959997 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" podUID="f505ca8a-1440-4ca4-ac04-92eb3b2080ce" Oct 31 05:26:31.584655 sshd[4801]: Accepted publickey for core from 139.178.68.195 port 41632 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:26:31.583000 audit[4801]: USER_ACCT pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:31.585000 audit[4801]: CRED_ACQ pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:31.586000 audit[4801]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdee07910 a2=3 a3=0 items=0 ppid=1 pid=4801 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:31.586000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:31.588559 sshd[4801]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:26:31.597405 systemd-logind[1187]: New session 21 of user core. Oct 31 05:26:31.599569 systemd[1]: Started session-21.scope. Oct 31 05:26:31.607000 audit[4801]: USER_START pid=4801 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:31.609000 audit[4803]: CRED_ACQ pid=4803 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:31.957119 env[1193]: time="2025-10-31T05:26:31.956215202Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 31 05:26:31.958544 kubelet[2031]: E1031 05:26:31.958462 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6c6db879c4-hvpcf" podUID="c5bf3236-396f-4d92-8de8-ce437ec49156" Oct 31 05:26:32.272518 env[1193]: time="2025-10-31T05:26:32.272308918Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:26:32.274226 env[1193]: time="2025-10-31T05:26:32.274092418Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 31 05:26:32.277290 kubelet[2031]: E1031 05:26:32.274588 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:26:32.277834 kubelet[2031]: E1031 05:26:32.277301 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 31 05:26:32.277834 kubelet[2031]: E1031 05:26:32.277550 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container goldmane start failed in pod goldmane-7c778bb748-4spgj_calico-system(bc04009c-ce79-4cda-91a6-dd78e1ed2ba7): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 31 05:26:32.277834 kubelet[2031]: E1031 05:26:32.277627 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-7c778bb748-4spgj" podUID="bc04009c-ce79-4cda-91a6-dd78e1ed2ba7" Oct 31 05:26:32.664465 sshd[4801]: pam_unix(sshd:session): session closed for user core Oct 31 05:26:32.666000 audit[4801]: USER_END pid=4801 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:32.666000 audit[4801]: CRED_DISP pid=4801 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:32.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.230.36.102:22-139.178.68.195:41632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:32.669841 systemd[1]: sshd@26-10.230.36.102:22-139.178.68.195:41632.service: Deactivated successfully. Oct 31 05:26:32.671189 systemd[1]: session-21.scope: Deactivated successfully. Oct 31 05:26:32.672006 systemd-logind[1187]: Session 21 logged out. Waiting for processes to exit. Oct 31 05:26:32.673729 systemd-logind[1187]: Removed session 21. Oct 31 05:26:33.952680 kubelet[2031]: E1031 05:26:33.952615 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" podUID="81bbb4a4-a415-4abc-a7fd-1a75817e45aa" Oct 31 05:26:35.260000 audit[4821]: NETFILTER_CFG table=filter:115 family=2 entries=26 op=nft_register_rule pid=4821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:26:35.266797 kernel: kauditd_printk_skb: 27 callbacks suppressed Oct 31 05:26:35.266963 kernel: audit: type=1325 audit(1761888395.260:1458): table=filter:115 family=2 entries=26 op=nft_register_rule pid=4821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:26:35.260000 audit[4821]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe3a97b110 a2=0 a3=7ffe3a97b0fc items=0 ppid=2149 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:35.280393 kernel: audit: type=1300 audit(1761888395.260:1458): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe3a97b110 a2=0 a3=7ffe3a97b0fc items=0 ppid=2149 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:35.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:26:35.289063 kernel: audit: type=1327 audit(1761888395.260:1458): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:26:35.289190 kernel: audit: type=1325 audit(1761888395.282:1459): table=nat:116 family=2 entries=104 op=nft_register_chain pid=4821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:26:35.282000 audit[4821]: NETFILTER_CFG table=nat:116 family=2 entries=104 op=nft_register_chain pid=4821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 31 05:26:35.282000 audit[4821]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffe3a97b110 a2=0 a3=7ffe3a97b0fc items=0 ppid=2149 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:35.299380 kernel: audit: type=1300 audit(1761888395.282:1459): arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffe3a97b110 a2=0 a3=7ffe3a97b0fc items=0 ppid=2149 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:35.299494 kernel: audit: type=1327 audit(1761888395.282:1459): proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:26:35.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D2D6E6F666C757368002D2D636F756E74657273 Oct 31 05:26:36.956793 kubelet[2031]: E1031 05:26:36.956316 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54" Oct 31 05:26:37.820299 systemd[1]: Started sshd@27-10.230.36.102:22-139.178.68.195:56014.service. Oct 31 05:26:37.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.230.36.102:22-139.178.68.195:56014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:37.828358 kernel: audit: type=1130 audit(1761888397.820:1460): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.230.36.102:22-139.178.68.195:56014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:38.793000 audit[4823]: USER_ACCT pid=4823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:38.795222 sshd[4823]: Accepted publickey for core from 139.178.68.195 port 56014 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:26:38.801357 kernel: audit: type=1101 audit(1761888398.793:1461): pid=4823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:38.802000 audit[4823]: CRED_ACQ pid=4823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:38.805245 sshd[4823]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:26:38.811357 kernel: audit: type=1103 audit(1761888398.802:1462): pid=4823 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:38.818363 kernel: audit: type=1006 audit(1761888398.802:1463): pid=4823 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Oct 31 05:26:38.821953 systemd-logind[1187]: New session 22 of user core. Oct 31 05:26:38.802000 audit[4823]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc88842680 a2=3 a3=0 items=0 ppid=1 pid=4823 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:38.802000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:38.825914 systemd[1]: Started session-22.scope. Oct 31 05:26:38.836000 audit[4823]: USER_START pid=4823 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:38.838000 audit[4826]: CRED_ACQ pid=4826 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:38.952866 env[1193]: time="2025-10-31T05:26:38.952755594Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 31 05:26:39.255593 env[1193]: time="2025-10-31T05:26:39.255435471Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:26:39.257453 env[1193]: time="2025-10-31T05:26:39.257349736Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 31 05:26:39.257931 kubelet[2031]: E1031 05:26:39.257838 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:26:39.258691 kubelet[2031]: E1031 05:26:39.258639 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 31 05:26:39.259662 kubelet[2031]: E1031 05:26:39.259616 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-kube-controllers start failed in pod calico-kube-controllers-65f7799b87-47jbs_calico-system(440bdb2f-ff72-44c2-b0bc-e953f311f252): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 31 05:26:39.259920 kubelet[2031]: E1031 05:26:39.259874 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-65f7799b87-47jbs" podUID="440bdb2f-ff72-44c2-b0bc-e953f311f252" Oct 31 05:26:39.706575 sshd[4823]: pam_unix(sshd:session): session closed for user core Oct 31 05:26:39.709000 audit[4823]: USER_END pid=4823 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:39.709000 audit[4823]: CRED_DISP pid=4823 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:39.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.230.36.102:22-139.178.68.195:56014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:39.721163 systemd[1]: sshd@27-10.230.36.102:22-139.178.68.195:56014.service: Deactivated successfully. Oct 31 05:26:39.723988 systemd[1]: session-22.scope: Deactivated successfully. Oct 31 05:26:39.724807 systemd-logind[1187]: Session 22 logged out. Waiting for processes to exit. Oct 31 05:26:39.728643 systemd-logind[1187]: Removed session 22. Oct 31 05:26:41.968580 env[1193]: time="2025-10-31T05:26:41.968466868Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:26:42.271525 env[1193]: time="2025-10-31T05:26:42.271293603Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:26:42.272840 env[1193]: time="2025-10-31T05:26:42.272759124Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:26:42.273604 kubelet[2031]: E1031 05:26:42.273466 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:26:42.274413 kubelet[2031]: E1031 05:26:42.274368 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:26:42.276088 kubelet[2031]: E1031 05:26:42.276041 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-apiserver start failed in pod calico-apiserver-5cc6545496-7xfb2_calico-apiserver(f505ca8a-1440-4ca4-ac04-92eb3b2080ce): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:26:42.276348 kubelet[2031]: E1031 05:26:42.276289 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-7xfb2" podUID="f505ca8a-1440-4ca4-ac04-92eb3b2080ce" Oct 31 05:26:44.857776 systemd[1]: Started sshd@28-10.230.36.102:22-139.178.68.195:53702.service. Oct 31 05:26:44.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.230.36.102:22-139.178.68.195:53702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:44.859768 kernel: kauditd_printk_skb: 7 callbacks suppressed Oct 31 05:26:44.860472 kernel: audit: type=1130 audit(1761888404.856:1469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.230.36.102:22-139.178.68.195:53702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:45.826000 audit[4868]: USER_ACCT pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:45.830369 sshd[4868]: Accepted publickey for core from 139.178.68.195 port 53702 ssh2: RSA SHA256:SNDspdr08ljC7u6YFsSEbFAM11P2/Di3eXjgL9Yd2IU Oct 31 05:26:45.835356 kernel: audit: type=1101 audit(1761888405.826:1470): pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:45.834000 audit[4868]: CRED_ACQ pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:45.843360 kernel: audit: type=1103 audit(1761888405.834:1471): pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:45.843855 sshd[4868]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 31 05:26:45.849361 kernel: audit: type=1006 audit(1761888405.834:1472): pid=4868 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Oct 31 05:26:45.834000 audit[4868]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3b017dc0 a2=3 a3=0 items=0 ppid=1 pid=4868 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:45.860355 kernel: audit: type=1300 audit(1761888405.834:1472): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3b017dc0 a2=3 a3=0 items=0 ppid=1 pid=4868 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 31 05:26:45.865136 systemd-logind[1187]: New session 23 of user core. Oct 31 05:26:45.867280 systemd[1]: Started session-23.scope. Oct 31 05:26:45.834000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:45.874470 kernel: audit: type=1327 audit(1761888405.834:1472): proctitle=737368643A20636F7265205B707269765D Oct 31 05:26:45.880000 audit[4868]: USER_START pid=4868 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:45.890466 kernel: audit: type=1105 audit(1761888405.880:1473): pid=4868 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:45.889000 audit[4870]: CRED_ACQ pid=4870 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:45.898425 kernel: audit: type=1103 audit(1761888405.889:1474): pid=4870 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:45.954578 env[1193]: time="2025-10-31T05:26:45.953824265Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 31 05:26:46.259498 env[1193]: time="2025-10-31T05:26:46.259417401Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:26:46.261218 env[1193]: time="2025-10-31T05:26:46.261130850Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 31 05:26:46.262378 kubelet[2031]: E1031 05:26:46.261654 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:26:46.262378 kubelet[2031]: E1031 05:26:46.261794 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 31 05:26:46.262378 kubelet[2031]: E1031 05:26:46.261950 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container whisker start failed in pod whisker-6c6db879c4-hvpcf_calico-system(c5bf3236-396f-4d92-8de8-ce437ec49156): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 31 05:26:46.263409 env[1193]: time="2025-10-31T05:26:46.263170191Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 31 05:26:46.563887 env[1193]: time="2025-10-31T05:26:46.563676338Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:26:46.564847 env[1193]: time="2025-10-31T05:26:46.564778537Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 31 05:26:46.565313 kubelet[2031]: E1031 05:26:46.565232 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:26:46.565714 kubelet[2031]: E1031 05:26:46.565362 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 31 05:26:46.565714 kubelet[2031]: E1031 05:26:46.565550 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container whisker-backend start failed in pod whisker-6c6db879c4-hvpcf_calico-system(c5bf3236-396f-4d92-8de8-ce437ec49156): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 31 05:26:46.565876 kubelet[2031]: E1031 05:26:46.565679 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6c6db879c4-hvpcf" podUID="c5bf3236-396f-4d92-8de8-ce437ec49156" Oct 31 05:26:46.806487 sshd[4868]: pam_unix(sshd:session): session closed for user core Oct 31 05:26:46.807000 audit[4868]: USER_END pid=4868 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:46.817167 systemd[1]: sshd@28-10.230.36.102:22-139.178.68.195:53702.service: Deactivated successfully. Oct 31 05:26:46.817542 kernel: audit: type=1106 audit(1761888406.807:1475): pid=4868 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:46.818459 systemd[1]: session-23.scope: Deactivated successfully. Oct 31 05:26:46.819911 systemd-logind[1187]: Session 23 logged out. Waiting for processes to exit. Oct 31 05:26:46.808000 audit[4868]: CRED_DISP pid=4868 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:46.828019 kernel: audit: type=1104 audit(1761888406.808:1476): pid=4868 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Oct 31 05:26:46.827456 systemd-logind[1187]: Removed session 23. Oct 31 05:26:46.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.230.36.102:22-139.178.68.195:53702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 31 05:26:46.957867 env[1193]: time="2025-10-31T05:26:46.957811817Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 31 05:26:46.958548 kubelet[2031]: E1031 05:26:46.958322 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-7c778bb748-4spgj" podUID="bc04009c-ce79-4cda-91a6-dd78e1ed2ba7" Oct 31 05:26:47.258891 env[1193]: time="2025-10-31T05:26:47.258733502Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:26:47.260560 env[1193]: time="2025-10-31T05:26:47.260477784Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 31 05:26:47.260976 kubelet[2031]: E1031 05:26:47.260905 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:26:47.261097 kubelet[2031]: E1031 05:26:47.261000 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 31 05:26:47.261845 kubelet[2031]: E1031 05:26:47.261150 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-apiserver start failed in pod calico-apiserver-5cc6545496-bzmv2_calico-apiserver(81bbb4a4-a415-4abc-a7fd-1a75817e45aa): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 31 05:26:47.261845 kubelet[2031]: E1031 05:26:47.261236 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-5cc6545496-bzmv2" podUID="81bbb4a4-a415-4abc-a7fd-1a75817e45aa" Oct 31 05:26:48.953451 env[1193]: time="2025-10-31T05:26:48.953354153Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 31 05:26:49.266619 env[1193]: time="2025-10-31T05:26:49.266436048Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:26:49.267846 env[1193]: time="2025-10-31T05:26:49.267768241Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 31 05:26:49.268258 kubelet[2031]: E1031 05:26:49.268180 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:26:49.268953 kubelet[2031]: E1031 05:26:49.268907 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 31 05:26:49.269244 kubelet[2031]: E1031 05:26:49.269204 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container calico-csi start failed in pod csi-node-driver-cprzg_calico-system(a6a56ae4-0d29-4361-8d53-116b2173dd54): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 31 05:26:49.271700 env[1193]: time="2025-10-31T05:26:49.271642392Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 31 05:26:49.577861 env[1193]: time="2025-10-31T05:26:49.577600348Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 31 05:26:49.579601 env[1193]: time="2025-10-31T05:26:49.579519000Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 31 05:26:49.580453 kubelet[2031]: E1031 05:26:49.580301 2031 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:26:49.580603 kubelet[2031]: E1031 05:26:49.580493 2031 kuberuntime_image.go:43] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 31 05:26:49.581651 kubelet[2031]: E1031 05:26:49.581592 2031 kuberuntime_manager.go:1449] "Unhandled Error" err="container csi-node-driver-registrar start failed in pod csi-node-driver-cprzg_calico-system(a6a56ae4-0d29-4361-8d53-116b2173dd54): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 31 05:26:49.581860 kubelet[2031]: E1031 05:26:49.581781 2031 pod_workers.go:1324] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-cprzg" podUID="a6a56ae4-0d29-4361-8d53-116b2173dd54"