Nov 1 00:39:16.078273 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Oct 31 23:02:53 -00 2025 Nov 1 00:39:16.078304 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:39:16.078322 kernel: BIOS-provided physical RAM map: Nov 1 00:39:16.078332 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Nov 1 00:39:16.078341 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000786cdfff] usable Nov 1 00:39:16.078351 kernel: BIOS-e820: [mem 0x00000000786ce000-0x000000007894dfff] reserved Nov 1 00:39:16.078364 kernel: BIOS-e820: [mem 0x000000007894e000-0x000000007895dfff] ACPI data Nov 1 00:39:16.078375 kernel: BIOS-e820: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS Nov 1 00:39:16.078388 kernel: BIOS-e820: [mem 0x00000000789de000-0x000000007c97bfff] usable Nov 1 00:39:16.078399 kernel: BIOS-e820: [mem 0x000000007c97c000-0x000000007c9fffff] reserved Nov 1 00:39:16.078410 kernel: NX (Execute Disable) protection: active Nov 1 00:39:16.078421 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable Nov 1 00:39:16.078432 kernel: e820: update [mem 0x76813018-0x7681be57] usable ==> usable Nov 1 00:39:16.078443 kernel: extended physical RAM map: Nov 1 00:39:16.078460 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable Nov 1 00:39:16.078471 kernel: reserve setup_data: [mem 0x0000000000100000-0x0000000076813017] usable Nov 1 00:39:16.078481 kernel: reserve setup_data: [mem 0x0000000076813018-0x000000007681be57] usable Nov 1 00:39:16.078493 kernel: reserve setup_data: [mem 0x000000007681be58-0x00000000786cdfff] usable Nov 1 00:39:16.078504 kernel: reserve setup_data: [mem 0x00000000786ce000-0x000000007894dfff] reserved Nov 1 00:39:16.078516 kernel: reserve setup_data: [mem 0x000000007894e000-0x000000007895dfff] ACPI data Nov 1 00:39:16.078526 kernel: reserve setup_data: [mem 0x000000007895e000-0x00000000789ddfff] ACPI NVS Nov 1 00:39:16.078538 kernel: reserve setup_data: [mem 0x00000000789de000-0x000000007c97bfff] usable Nov 1 00:39:16.078550 kernel: reserve setup_data: [mem 0x000000007c97c000-0x000000007c9fffff] reserved Nov 1 00:39:16.078560 kernel: efi: EFI v2.70 by EDK II Nov 1 00:39:16.078575 kernel: efi: SMBIOS=0x7886a000 ACPI=0x7895d000 ACPI 2.0=0x7895d014 MEMATTR=0x77003a98 Nov 1 00:39:16.078587 kernel: SMBIOS 2.7 present. Nov 1 00:39:16.078599 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017 Nov 1 00:39:16.078610 kernel: Hypervisor detected: KVM Nov 1 00:39:16.078622 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Nov 1 00:39:16.078634 kernel: kvm-clock: cpu 0, msr 341a0001, primary cpu clock Nov 1 00:39:16.078645 kernel: kvm-clock: using sched offset of 4292235031 cycles Nov 1 00:39:16.078659 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Nov 1 00:39:16.078671 kernel: tsc: Detected 2499.992 MHz processor Nov 1 00:39:16.078683 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Nov 1 00:39:16.078695 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Nov 1 00:39:16.078711 kernel: last_pfn = 0x7c97c max_arch_pfn = 0x400000000 Nov 1 00:39:16.078723 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Nov 1 00:39:16.078735 kernel: Using GB pages for direct mapping Nov 1 00:39:16.078746 kernel: Secure boot disabled Nov 1 00:39:16.078760 kernel: ACPI: Early table checksum verification disabled Nov 1 00:39:16.078777 kernel: ACPI: RSDP 0x000000007895D014 000024 (v02 AMAZON) Nov 1 00:39:16.078791 kernel: ACPI: XSDT 0x000000007895C0E8 00006C (v01 AMAZON AMZNFACP 00000001 01000013) Nov 1 00:39:16.078806 kernel: ACPI: FACP 0x0000000078955000 000114 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001) Nov 1 00:39:16.078819 kernel: ACPI: DSDT 0x0000000078956000 00115A (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001) Nov 1 00:39:16.078852 kernel: ACPI: FACS 0x00000000789D0000 000040 Nov 1 00:39:16.078865 kernel: ACPI: WAET 0x000000007895B000 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001) Nov 1 00:39:16.078878 kernel: ACPI: SLIT 0x000000007895A000 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Nov 1 00:39:16.078891 kernel: ACPI: APIC 0x0000000078959000 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001) Nov 1 00:39:16.078905 kernel: ACPI: SRAT 0x0000000078958000 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001) Nov 1 00:39:16.078922 kernel: ACPI: HPET 0x0000000078954000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001) Nov 1 00:39:16.078935 kernel: ACPI: SSDT 0x0000000078953000 000759 (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Nov 1 00:39:16.078948 kernel: ACPI: SSDT 0x0000000078952000 00007F (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001) Nov 1 00:39:16.078962 kernel: ACPI: BGRT 0x0000000078951000 000038 (v01 AMAZON AMAZON 00000002 01000013) Nov 1 00:39:16.078976 kernel: ACPI: Reserving FACP table memory at [mem 0x78955000-0x78955113] Nov 1 00:39:16.078989 kernel: ACPI: Reserving DSDT table memory at [mem 0x78956000-0x78957159] Nov 1 00:39:16.079002 kernel: ACPI: Reserving FACS table memory at [mem 0x789d0000-0x789d003f] Nov 1 00:39:16.079015 kernel: ACPI: Reserving WAET table memory at [mem 0x7895b000-0x7895b027] Nov 1 00:39:16.079028 kernel: ACPI: Reserving SLIT table memory at [mem 0x7895a000-0x7895a06b] Nov 1 00:39:16.079044 kernel: ACPI: Reserving APIC table memory at [mem 0x78959000-0x78959075] Nov 1 00:39:16.079057 kernel: ACPI: Reserving SRAT table memory at [mem 0x78958000-0x7895809f] Nov 1 00:39:16.079072 kernel: ACPI: Reserving HPET table memory at [mem 0x78954000-0x78954037] Nov 1 00:39:16.079084 kernel: ACPI: Reserving SSDT table memory at [mem 0x78953000-0x78953758] Nov 1 00:39:16.079097 kernel: ACPI: Reserving SSDT table memory at [mem 0x78952000-0x7895207e] Nov 1 00:39:16.079111 kernel: ACPI: Reserving BGRT table memory at [mem 0x78951000-0x78951037] Nov 1 00:39:16.079125 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Nov 1 00:39:16.079138 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Nov 1 00:39:16.079152 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff] Nov 1 00:39:16.079168 kernel: NUMA: Initialized distance table, cnt=1 Nov 1 00:39:16.079181 kernel: NODE_DATA(0) allocated [mem 0x7a8ef000-0x7a8f4fff] Nov 1 00:39:16.079195 kernel: Zone ranges: Nov 1 00:39:16.079208 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Nov 1 00:39:16.079221 kernel: DMA32 [mem 0x0000000001000000-0x000000007c97bfff] Nov 1 00:39:16.079235 kernel: Normal empty Nov 1 00:39:16.079250 kernel: Movable zone start for each node Nov 1 00:39:16.079264 kernel: Early memory node ranges Nov 1 00:39:16.079277 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Nov 1 00:39:16.079293 kernel: node 0: [mem 0x0000000000100000-0x00000000786cdfff] Nov 1 00:39:16.079307 kernel: node 0: [mem 0x00000000789de000-0x000000007c97bfff] Nov 1 00:39:16.079321 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007c97bfff] Nov 1 00:39:16.079334 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Nov 1 00:39:16.079348 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Nov 1 00:39:16.079362 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges Nov 1 00:39:16.079376 kernel: On node 0, zone DMA32: 13956 pages in unavailable ranges Nov 1 00:39:16.079390 kernel: ACPI: PM-Timer IO Port: 0xb008 Nov 1 00:39:16.079403 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Nov 1 00:39:16.079419 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23 Nov 1 00:39:16.079432 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Nov 1 00:39:16.079446 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Nov 1 00:39:16.079459 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Nov 1 00:39:16.079473 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Nov 1 00:39:16.079487 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Nov 1 00:39:16.079501 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Nov 1 00:39:16.079514 kernel: TSC deadline timer available Nov 1 00:39:16.079526 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Nov 1 00:39:16.079540 kernel: [mem 0x7ca00000-0xffffffff] available for PCI devices Nov 1 00:39:16.079556 kernel: Booting paravirtualized kernel on KVM Nov 1 00:39:16.079571 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Nov 1 00:39:16.079586 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Nov 1 00:39:16.079601 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Nov 1 00:39:16.079615 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Nov 1 00:39:16.079630 kernel: pcpu-alloc: [0] 0 1 Nov 1 00:39:16.079643 kernel: kvm-guest: stealtime: cpu 0, msr 7a41c0c0 Nov 1 00:39:16.079656 kernel: kvm-guest: PV spinlocks enabled Nov 1 00:39:16.079672 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Nov 1 00:39:16.079684 kernel: Built 1 zonelists, mobility grouping on. Total pages: 501318 Nov 1 00:39:16.079697 kernel: Policy zone: DMA32 Nov 1 00:39:16.079711 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:39:16.079725 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Nov 1 00:39:16.079738 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Nov 1 00:39:16.079751 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Nov 1 00:39:16.079764 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Nov 1 00:39:16.079780 kernel: Memory: 1876636K/2037804K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 160908K reserved, 0K cma-reserved) Nov 1 00:39:16.079793 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Nov 1 00:39:16.079806 kernel: Kernel/User page tables isolation: enabled Nov 1 00:39:16.079819 kernel: ftrace: allocating 34614 entries in 136 pages Nov 1 00:39:16.081888 kernel: ftrace: allocated 136 pages with 2 groups Nov 1 00:39:16.081912 kernel: rcu: Hierarchical RCU implementation. Nov 1 00:39:16.081926 kernel: rcu: RCU event tracing is enabled. Nov 1 00:39:16.081957 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Nov 1 00:39:16.081970 kernel: Rude variant of Tasks RCU enabled. Nov 1 00:39:16.081986 kernel: Tracing variant of Tasks RCU enabled. Nov 1 00:39:16.082000 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Nov 1 00:39:16.082013 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Nov 1 00:39:16.082032 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Nov 1 00:39:16.082047 kernel: random: crng init done Nov 1 00:39:16.082061 kernel: Console: colour dummy device 80x25 Nov 1 00:39:16.082077 kernel: printk: console [tty0] enabled Nov 1 00:39:16.082092 kernel: printk: console [ttyS0] enabled Nov 1 00:39:16.082108 kernel: ACPI: Core revision 20210730 Nov 1 00:39:16.082125 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns Nov 1 00:39:16.082145 kernel: APIC: Switch to symmetric I/O mode setup Nov 1 00:39:16.082160 kernel: x2apic enabled Nov 1 00:39:16.082175 kernel: Switched APIC routing to physical x2apic. Nov 1 00:39:16.082188 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x24093255d7c, max_idle_ns: 440795319144 ns Nov 1 00:39:16.082203 kernel: Calibrating delay loop (skipped) preset value.. 4999.98 BogoMIPS (lpj=2499992) Nov 1 00:39:16.082218 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Nov 1 00:39:16.082232 kernel: Last level dTLB entries: 4KB 64, 2MB 32, 4MB 32, 1GB 4 Nov 1 00:39:16.082250 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Nov 1 00:39:16.082262 kernel: Spectre V2 : Mitigation: Retpolines Nov 1 00:39:16.082274 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Nov 1 00:39:16.082287 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Nov 1 00:39:16.082301 kernel: RETBleed: Vulnerable Nov 1 00:39:16.082314 kernel: Speculative Store Bypass: Vulnerable Nov 1 00:39:16.082326 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode Nov 1 00:39:16.082340 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Nov 1 00:39:16.082374 kernel: GDS: Unknown: Dependent on hypervisor status Nov 1 00:39:16.082390 kernel: active return thunk: its_return_thunk Nov 1 00:39:16.082403 kernel: ITS: Mitigation: Aligned branch/return thunks Nov 1 00:39:16.082420 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Nov 1 00:39:16.082435 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Nov 1 00:39:16.082450 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Nov 1 00:39:16.082465 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Nov 1 00:39:16.082480 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Nov 1 00:39:16.082494 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Nov 1 00:39:16.082508 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Nov 1 00:39:16.082523 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Nov 1 00:39:16.082538 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers' Nov 1 00:39:16.082552 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Nov 1 00:39:16.082567 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Nov 1 00:39:16.082584 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Nov 1 00:39:16.082599 kernel: x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64 Nov 1 00:39:16.082613 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512 Nov 1 00:39:16.082628 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024 Nov 1 00:39:16.082644 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8 Nov 1 00:39:16.082658 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format. Nov 1 00:39:16.082673 kernel: Freeing SMP alternatives memory: 32K Nov 1 00:39:16.082687 kernel: pid_max: default: 32768 minimum: 301 Nov 1 00:39:16.082702 kernel: LSM: Security Framework initializing Nov 1 00:39:16.082717 kernel: SELinux: Initializing. Nov 1 00:39:16.082732 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Nov 1 00:39:16.082750 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Nov 1 00:39:16.082765 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7) Nov 1 00:39:16.082779 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Nov 1 00:39:16.082794 kernel: signal: max sigframe size: 3632 Nov 1 00:39:16.082809 kernel: rcu: Hierarchical SRCU implementation. Nov 1 00:39:16.082824 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Nov 1 00:39:16.082854 kernel: smp: Bringing up secondary CPUs ... Nov 1 00:39:16.082869 kernel: x86: Booting SMP configuration: Nov 1 00:39:16.082884 kernel: .... node #0, CPUs: #1 Nov 1 00:39:16.082899 kernel: kvm-clock: cpu 1, msr 341a0041, secondary cpu clock Nov 1 00:39:16.082916 kernel: kvm-guest: stealtime: cpu 1, msr 7a51c0c0 Nov 1 00:39:16.082933 kernel: Transient Scheduler Attacks: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Nov 1 00:39:16.082950 kernel: Transient Scheduler Attacks: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Nov 1 00:39:16.082965 kernel: smp: Brought up 1 node, 2 CPUs Nov 1 00:39:16.082980 kernel: smpboot: Max logical packages: 1 Nov 1 00:39:16.082995 kernel: smpboot: Total of 2 processors activated (9999.96 BogoMIPS) Nov 1 00:39:16.083010 kernel: devtmpfs: initialized Nov 1 00:39:16.083025 kernel: x86/mm: Memory block size: 128MB Nov 1 00:39:16.083043 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7895e000-0x789ddfff] (524288 bytes) Nov 1 00:39:16.083058 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Nov 1 00:39:16.083073 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Nov 1 00:39:16.083088 kernel: pinctrl core: initialized pinctrl subsystem Nov 1 00:39:16.083103 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Nov 1 00:39:16.083118 kernel: audit: initializing netlink subsys (disabled) Nov 1 00:39:16.083133 kernel: audit: type=2000 audit(1761957555.762:1): state=initialized audit_enabled=0 res=1 Nov 1 00:39:16.083146 kernel: thermal_sys: Registered thermal governor 'step_wise' Nov 1 00:39:16.083161 kernel: thermal_sys: Registered thermal governor 'user_space' Nov 1 00:39:16.083179 kernel: cpuidle: using governor menu Nov 1 00:39:16.083193 kernel: ACPI: bus type PCI registered Nov 1 00:39:16.083209 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 1 00:39:16.083224 kernel: dca service started, version 1.12.1 Nov 1 00:39:16.083238 kernel: PCI: Using configuration type 1 for base access Nov 1 00:39:16.083254 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Nov 1 00:39:16.083268 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Nov 1 00:39:16.083283 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Nov 1 00:39:16.083297 kernel: ACPI: Added _OSI(Module Device) Nov 1 00:39:16.083310 kernel: ACPI: Added _OSI(Processor Device) Nov 1 00:39:16.083322 kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 1 00:39:16.083335 kernel: ACPI: Added _OSI(Linux-Dell-Video) Nov 1 00:39:16.083348 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Nov 1 00:39:16.083360 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Nov 1 00:39:16.083373 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Nov 1 00:39:16.083387 kernel: ACPI: Interpreter enabled Nov 1 00:39:16.083399 kernel: ACPI: PM: (supports S0 S5) Nov 1 00:39:16.083412 kernel: ACPI: Using IOAPIC for interrupt routing Nov 1 00:39:16.083428 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Nov 1 00:39:16.083440 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Nov 1 00:39:16.083454 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Nov 1 00:39:16.083678 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Nov 1 00:39:16.083807 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Nov 1 00:39:16.083823 kernel: acpiphp: Slot [3] registered Nov 1 00:39:16.083850 kernel: acpiphp: Slot [4] registered Nov 1 00:39:16.083867 kernel: acpiphp: Slot [5] registered Nov 1 00:39:16.083880 kernel: acpiphp: Slot [6] registered Nov 1 00:39:16.083893 kernel: acpiphp: Slot [7] registered Nov 1 00:39:16.083906 kernel: acpiphp: Slot [8] registered Nov 1 00:39:16.083919 kernel: acpiphp: Slot [9] registered Nov 1 00:39:16.083932 kernel: acpiphp: Slot [10] registered Nov 1 00:39:16.083945 kernel: acpiphp: Slot [11] registered Nov 1 00:39:16.083957 kernel: acpiphp: Slot [12] registered Nov 1 00:39:16.083969 kernel: acpiphp: Slot [13] registered Nov 1 00:39:16.083982 kernel: acpiphp: Slot [14] registered Nov 1 00:39:16.083997 kernel: acpiphp: Slot [15] registered Nov 1 00:39:16.084010 kernel: acpiphp: Slot [16] registered Nov 1 00:39:16.084022 kernel: acpiphp: Slot [17] registered Nov 1 00:39:16.084035 kernel: acpiphp: Slot [18] registered Nov 1 00:39:16.084047 kernel: acpiphp: Slot [19] registered Nov 1 00:39:16.084059 kernel: acpiphp: Slot [20] registered Nov 1 00:39:16.084072 kernel: acpiphp: Slot [21] registered Nov 1 00:39:16.084085 kernel: acpiphp: Slot [22] registered Nov 1 00:39:16.084097 kernel: acpiphp: Slot [23] registered Nov 1 00:39:16.084113 kernel: acpiphp: Slot [24] registered Nov 1 00:39:16.084126 kernel: acpiphp: Slot [25] registered Nov 1 00:39:16.084139 kernel: acpiphp: Slot [26] registered Nov 1 00:39:16.084151 kernel: acpiphp: Slot [27] registered Nov 1 00:39:16.084164 kernel: acpiphp: Slot [28] registered Nov 1 00:39:16.084176 kernel: acpiphp: Slot [29] registered Nov 1 00:39:16.084189 kernel: acpiphp: Slot [30] registered Nov 1 00:39:16.084201 kernel: acpiphp: Slot [31] registered Nov 1 00:39:16.084214 kernel: PCI host bridge to bus 0000:00 Nov 1 00:39:16.084337 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Nov 1 00:39:16.084452 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Nov 1 00:39:16.090978 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Nov 1 00:39:16.091136 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Nov 1 00:39:16.091252 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x2000ffffffff window] Nov 1 00:39:16.091369 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Nov 1 00:39:16.091522 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Nov 1 00:39:16.091676 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Nov 1 00:39:16.091816 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000 Nov 1 00:39:16.091966 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Nov 1 00:39:16.092092 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff Nov 1 00:39:16.092215 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff Nov 1 00:39:16.092341 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff Nov 1 00:39:16.092465 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff Nov 1 00:39:16.092597 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff Nov 1 00:39:16.092720 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff Nov 1 00:39:16.092872 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000 Nov 1 00:39:16.092994 kernel: pci 0000:00:03.0: reg 0x10: [mem 0x80000000-0x803fffff pref] Nov 1 00:39:16.093110 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] Nov 1 00:39:16.093228 kernel: pci 0000:00:03.0: BAR 0: assigned to efifb Nov 1 00:39:16.093344 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Nov 1 00:39:16.093476 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Nov 1 00:39:16.093595 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80404000-0x80407fff] Nov 1 00:39:16.093730 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Nov 1 00:39:16.093868 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80400000-0x80403fff] Nov 1 00:39:16.093885 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Nov 1 00:39:16.093899 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Nov 1 00:39:16.093915 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Nov 1 00:39:16.093928 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Nov 1 00:39:16.093941 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Nov 1 00:39:16.093954 kernel: iommu: Default domain type: Translated Nov 1 00:39:16.093966 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Nov 1 00:39:16.094083 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device Nov 1 00:39:16.094202 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Nov 1 00:39:16.094320 kernel: pci 0000:00:03.0: vgaarb: bridge control possible Nov 1 00:39:16.094336 kernel: vgaarb: loaded Nov 1 00:39:16.094352 kernel: pps_core: LinuxPPS API ver. 1 registered Nov 1 00:39:16.094365 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Nov 1 00:39:16.094378 kernel: PTP clock support registered Nov 1 00:39:16.094391 kernel: Registered efivars operations Nov 1 00:39:16.094403 kernel: PCI: Using ACPI for IRQ routing Nov 1 00:39:16.094416 kernel: PCI: pci_cache_line_size set to 64 bytes Nov 1 00:39:16.094430 kernel: e820: reserve RAM buffer [mem 0x76813018-0x77ffffff] Nov 1 00:39:16.094443 kernel: e820: reserve RAM buffer [mem 0x786ce000-0x7bffffff] Nov 1 00:39:16.094455 kernel: e820: reserve RAM buffer [mem 0x7c97c000-0x7fffffff] Nov 1 00:39:16.094470 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Nov 1 00:39:16.094483 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter Nov 1 00:39:16.094496 kernel: clocksource: Switched to clocksource kvm-clock Nov 1 00:39:16.094508 kernel: VFS: Disk quotas dquot_6.6.0 Nov 1 00:39:16.094521 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 1 00:39:16.094534 kernel: pnp: PnP ACPI init Nov 1 00:39:16.094546 kernel: pnp: PnP ACPI: found 5 devices Nov 1 00:39:16.094559 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Nov 1 00:39:16.094572 kernel: NET: Registered PF_INET protocol family Nov 1 00:39:16.094587 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Nov 1 00:39:16.094600 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Nov 1 00:39:16.094613 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Nov 1 00:39:16.094627 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Nov 1 00:39:16.094640 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Nov 1 00:39:16.094653 kernel: TCP: Hash tables configured (established 16384 bind 16384) Nov 1 00:39:16.094666 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Nov 1 00:39:16.094679 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Nov 1 00:39:16.094692 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Nov 1 00:39:16.094707 kernel: NET: Registered PF_XDP protocol family Nov 1 00:39:16.094818 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Nov 1 00:39:16.094938 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Nov 1 00:39:16.095043 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Nov 1 00:39:16.095153 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Nov 1 00:39:16.095256 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x2000ffffffff window] Nov 1 00:39:16.095377 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Nov 1 00:39:16.095498 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Nov 1 00:39:16.095517 kernel: PCI: CLS 0 bytes, default 64 Nov 1 00:39:16.095530 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Nov 1 00:39:16.095543 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x24093255d7c, max_idle_ns: 440795319144 ns Nov 1 00:39:16.095557 kernel: clocksource: Switched to clocksource tsc Nov 1 00:39:16.095569 kernel: Initialise system trusted keyrings Nov 1 00:39:16.095582 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Nov 1 00:39:16.095595 kernel: Key type asymmetric registered Nov 1 00:39:16.095607 kernel: Asymmetric key parser 'x509' registered Nov 1 00:39:16.095622 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Nov 1 00:39:16.095635 kernel: io scheduler mq-deadline registered Nov 1 00:39:16.095648 kernel: io scheduler kyber registered Nov 1 00:39:16.095661 kernel: io scheduler bfq registered Nov 1 00:39:16.095673 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Nov 1 00:39:16.095686 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 1 00:39:16.095699 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Nov 1 00:39:16.095712 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Nov 1 00:39:16.095725 kernel: i8042: Warning: Keylock active Nov 1 00:39:16.095741 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Nov 1 00:39:16.095754 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Nov 1 00:39:16.095895 kernel: rtc_cmos 00:00: RTC can wake from S4 Nov 1 00:39:16.096009 kernel: rtc_cmos 00:00: registered as rtc0 Nov 1 00:39:16.096118 kernel: rtc_cmos 00:00: setting system clock to 2025-11-01T00:39:15 UTC (1761957555) Nov 1 00:39:16.096224 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Nov 1 00:39:16.096239 kernel: intel_pstate: CPU model not supported Nov 1 00:39:16.096253 kernel: efifb: probing for efifb Nov 1 00:39:16.096270 kernel: efifb: framebuffer at 0x80000000, using 1876k, total 1875k Nov 1 00:39:16.096282 kernel: efifb: mode is 800x600x32, linelength=3200, pages=1 Nov 1 00:39:16.096295 kernel: efifb: scrolling: redraw Nov 1 00:39:16.096307 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Nov 1 00:39:16.096320 kernel: Console: switching to colour frame buffer device 100x37 Nov 1 00:39:16.096333 kernel: fb0: EFI VGA frame buffer device Nov 1 00:39:16.096370 kernel: pstore: Registered efi as persistent store backend Nov 1 00:39:16.096386 kernel: NET: Registered PF_INET6 protocol family Nov 1 00:39:16.096399 kernel: Segment Routing with IPv6 Nov 1 00:39:16.096415 kernel: In-situ OAM (IOAM) with IPv6 Nov 1 00:39:16.096428 kernel: NET: Registered PF_PACKET protocol family Nov 1 00:39:16.096441 kernel: Key type dns_resolver registered Nov 1 00:39:16.096454 kernel: IPI shorthand broadcast: enabled Nov 1 00:39:16.096469 kernel: sched_clock: Marking stable (407598845, 147333227)->(627721857, -72789785) Nov 1 00:39:16.096483 kernel: registered taskstats version 1 Nov 1 00:39:16.096496 kernel: Loading compiled-in X.509 certificates Nov 1 00:39:16.096509 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: f2055682e6899ad8548fd369019e7b47939b46a0' Nov 1 00:39:16.096523 kernel: Key type .fscrypt registered Nov 1 00:39:16.096538 kernel: Key type fscrypt-provisioning registered Nov 1 00:39:16.096551 kernel: pstore: Using crash dump compression: deflate Nov 1 00:39:16.096564 kernel: ima: No TPM chip found, activating TPM-bypass! Nov 1 00:39:16.096578 kernel: ima: Allocated hash algorithm: sha1 Nov 1 00:39:16.096591 kernel: ima: No architecture policies found Nov 1 00:39:16.096608 kernel: clk: Disabling unused clocks Nov 1 00:39:16.096621 kernel: Freeing unused kernel image (initmem) memory: 47496K Nov 1 00:39:16.096634 kernel: Write protecting the kernel read-only data: 28672k Nov 1 00:39:16.096648 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Nov 1 00:39:16.096664 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Nov 1 00:39:16.096679 kernel: Run /init as init process Nov 1 00:39:16.096692 kernel: with arguments: Nov 1 00:39:16.096705 kernel: /init Nov 1 00:39:16.096718 kernel: with environment: Nov 1 00:39:16.096731 kernel: HOME=/ Nov 1 00:39:16.096744 kernel: TERM=linux Nov 1 00:39:16.096758 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Nov 1 00:39:16.096774 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:39:16.096793 systemd[1]: Detected virtualization amazon. Nov 1 00:39:16.096807 systemd[1]: Detected architecture x86-64. Nov 1 00:39:16.096820 systemd[1]: Running in initrd. Nov 1 00:39:16.096843 systemd[1]: No hostname configured, using default hostname. Nov 1 00:39:16.096857 systemd[1]: Hostname set to . Nov 1 00:39:16.096872 systemd[1]: Initializing machine ID from VM UUID. Nov 1 00:39:16.096886 systemd[1]: Queued start job for default target initrd.target. Nov 1 00:39:16.096902 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Nov 1 00:39:16.096917 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:39:16.096933 systemd[1]: Reached target cryptsetup.target. Nov 1 00:39:16.096946 systemd[1]: Reached target paths.target. Nov 1 00:39:16.096960 systemd[1]: Reached target slices.target. Nov 1 00:39:16.096977 systemd[1]: Reached target swap.target. Nov 1 00:39:16.096990 systemd[1]: Reached target timers.target. Nov 1 00:39:16.097005 systemd[1]: Listening on iscsid.socket. Nov 1 00:39:16.097019 systemd[1]: Listening on iscsiuio.socket. Nov 1 00:39:16.097033 systemd[1]: Listening on systemd-journald-audit.socket. Nov 1 00:39:16.097047 systemd[1]: Listening on systemd-journald-dev-log.socket. Nov 1 00:39:16.097061 systemd[1]: Listening on systemd-journald.socket. Nov 1 00:39:16.097074 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:39:16.097089 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:39:16.097101 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:39:16.097114 systemd[1]: Reached target sockets.target. Nov 1 00:39:16.097126 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:39:16.097139 systemd[1]: Finished network-cleanup.service. Nov 1 00:39:16.097152 systemd[1]: Starting systemd-fsck-usr.service... Nov 1 00:39:16.097164 systemd[1]: Starting systemd-journald.service... Nov 1 00:39:16.097176 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:39:16.097189 systemd[1]: Starting systemd-resolved.service... Nov 1 00:39:16.097205 systemd[1]: Starting systemd-vconsole-setup.service... Nov 1 00:39:16.097218 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:39:16.097232 kernel: audit: type=1130 audit(1761957556.089:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.097254 systemd-journald[185]: Journal started Nov 1 00:39:16.097340 systemd-journald[185]: Runtime Journal (/run/log/journal/ec255d77fe328f7d3105177cd0600713) is 4.8M, max 38.3M, 33.5M free. Nov 1 00:39:16.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.100976 systemd[1]: Finished systemd-fsck-usr.service. Nov 1 00:39:16.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.113050 kernel: audit: type=1130 audit(1761957556.103:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.113127 systemd[1]: Started systemd-journald.service. Nov 1 00:39:16.113158 systemd-modules-load[186]: Inserted module 'overlay' Nov 1 00:39:16.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.120092 systemd-resolved[187]: Positive Trust Anchors: Nov 1 00:39:16.127363 kernel: audit: type=1130 audit(1761957556.117:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.120348 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:39:16.120409 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:39:16.148983 kernel: audit: type=1130 audit(1761957556.135:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.124354 systemd-resolved[187]: Defaulting to hostname 'linux'. Nov 1 00:39:16.126075 systemd[1]: Finished systemd-vconsole-setup.service. Nov 1 00:39:16.136597 systemd[1]: Started systemd-resolved.service. Nov 1 00:39:16.138025 systemd[1]: Reached target nss-lookup.target. Nov 1 00:39:16.148141 systemd[1]: Starting dracut-cmdline-ask.service... Nov 1 00:39:16.183028 kernel: audit: type=1130 audit(1761957556.136:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.183064 kernel: audit: type=1130 audit(1761957556.175:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.155935 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 00:39:16.175018 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 00:39:16.186139 systemd[1]: Finished dracut-cmdline-ask.service. Nov 1 00:39:16.212999 kernel: audit: type=1130 audit(1761957556.186:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.213039 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Nov 1 00:39:16.213060 kernel: Bridge firewalling registered Nov 1 00:39:16.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.188675 systemd[1]: Starting dracut-cmdline.service... Nov 1 00:39:16.218058 dracut-cmdline[202]: dracut-dracut-053 Nov 1 00:39:16.218058 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Nov 1 00:39:16.218058 dracut-cmdline[202]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 00:39:16.208512 systemd-modules-load[186]: Inserted module 'br_netfilter' Nov 1 00:39:16.251856 kernel: SCSI subsystem initialized Nov 1 00:39:16.273410 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Nov 1 00:39:16.273488 kernel: device-mapper: uevent: version 1.0.3 Nov 1 00:39:16.276362 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Nov 1 00:39:16.280988 systemd-modules-load[186]: Inserted module 'dm_multipath' Nov 1 00:39:16.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.282708 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:39:16.291669 kernel: audit: type=1130 audit(1761957556.283:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.298043 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:39:16.299851 kernel: Loading iSCSI transport class v2.0-870. Nov 1 00:39:16.304931 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:39:16.314753 kernel: audit: type=1130 audit(1761957556.305:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.327863 kernel: iscsi: registered transport (tcp) Nov 1 00:39:16.357449 kernel: iscsi: registered transport (qla4xxx) Nov 1 00:39:16.357548 kernel: QLogic iSCSI HBA Driver Nov 1 00:39:16.399745 systemd[1]: Finished dracut-cmdline.service. Nov 1 00:39:16.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.402037 systemd[1]: Starting dracut-pre-udev.service... Nov 1 00:39:16.465908 kernel: raid6: avx512x4 gen() 14594 MB/s Nov 1 00:39:16.484894 kernel: raid6: avx512x4 xor() 4893 MB/s Nov 1 00:39:16.502870 kernel: raid6: avx512x2 gen() 14352 MB/s Nov 1 00:39:16.520897 kernel: raid6: avx512x2 xor() 21179 MB/s Nov 1 00:39:16.538883 kernel: raid6: avx512x1 gen() 10431 MB/s Nov 1 00:39:16.556876 kernel: raid6: avx512x1 xor() 17897 MB/s Nov 1 00:39:16.574880 kernel: raid6: avx2x4 gen() 12893 MB/s Nov 1 00:39:16.599408 kernel: raid6: avx2x4 xor() 4735 MB/s Nov 1 00:39:16.616985 kernel: raid6: avx2x2 gen() 14768 MB/s Nov 1 00:39:16.634936 kernel: raid6: avx2x2 xor() 17143 MB/s Nov 1 00:39:16.652888 kernel: raid6: avx2x1 gen() 10759 MB/s Nov 1 00:39:16.670883 kernel: raid6: avx2x1 xor() 14966 MB/s Nov 1 00:39:16.690112 kernel: raid6: sse2x4 gen() 6663 MB/s Nov 1 00:39:16.708065 kernel: raid6: sse2x4 xor() 3306 MB/s Nov 1 00:39:16.726013 kernel: raid6: sse2x2 gen() 6285 MB/s Nov 1 00:39:16.743873 kernel: raid6: sse2x2 xor() 4779 MB/s Nov 1 00:39:16.762292 kernel: raid6: sse2x1 gen() 7498 MB/s Nov 1 00:39:16.784009 kernel: raid6: sse2x1 xor() 4108 MB/s Nov 1 00:39:16.784095 kernel: raid6: using algorithm avx2x2 gen() 14768 MB/s Nov 1 00:39:16.784117 kernel: raid6: .... xor() 17143 MB/s, rmw enabled Nov 1 00:39:16.786241 kernel: raid6: using avx512x2 recovery algorithm Nov 1 00:39:16.822862 kernel: xor: automatically using best checksumming function avx Nov 1 00:39:16.956863 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Nov 1 00:39:16.975418 systemd[1]: Finished dracut-pre-udev.service. Nov 1 00:39:16.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:16.975000 audit: BPF prog-id=7 op=LOAD Nov 1 00:39:16.975000 audit: BPF prog-id=8 op=LOAD Nov 1 00:39:16.978375 systemd[1]: Starting systemd-udevd.service... Nov 1 00:39:16.994358 systemd-udevd[384]: Using default interface naming scheme 'v252'. Nov 1 00:39:17.000157 systemd[1]: Started systemd-udevd.service. Nov 1 00:39:17.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:17.006043 systemd[1]: Starting dracut-pre-trigger.service... Nov 1 00:39:17.023223 dracut-pre-trigger[392]: rd.md=0: removing MD RAID activation Nov 1 00:39:17.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:17.060388 systemd[1]: Finished dracut-pre-trigger.service. Nov 1 00:39:17.061773 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:39:17.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:17.109581 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:39:17.174854 kernel: cryptd: max_cpu_qlen set to 1000 Nov 1 00:39:17.212224 kernel: AVX2 version of gcm_enc/dec engaged. Nov 1 00:39:17.212308 kernel: AES CTR mode by8 optimization enabled Nov 1 00:39:17.214198 kernel: nvme nvme0: pci function 0000:00:04.0 Nov 1 00:39:17.215624 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Nov 1 00:39:17.220162 kernel: ena 0000:00:05.0: ENA device version: 0.10 Nov 1 00:39:17.232362 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Nov 1 00:39:17.232549 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy. Nov 1 00:39:17.232689 kernel: nvme nvme0: 2/0/0 default/read/poll queues Nov 1 00:39:17.232981 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80400000, mac addr 06:2d:3a:09:1d:11 Nov 1 00:39:17.240058 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 1 00:39:17.240147 kernel: GPT:9289727 != 33554431 Nov 1 00:39:17.240178 kernel: GPT:Alternate GPT header not at the end of the disk. Nov 1 00:39:17.242624 kernel: GPT:9289727 != 33554431 Nov 1 00:39:17.246148 kernel: GPT: Use GNU Parted to correct GPT errors. Nov 1 00:39:17.246222 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Nov 1 00:39:17.251460 (udev-worker)[433]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:39:17.348859 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/nvme0n1p6 scanned by (udev-worker) (432) Nov 1 00:39:17.398851 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Nov 1 00:39:17.427513 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:39:17.436401 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Nov 1 00:39:17.440343 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Nov 1 00:39:17.452596 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Nov 1 00:39:17.455155 systemd[1]: Starting disk-uuid.service... Nov 1 00:39:17.465418 disk-uuid[592]: Primary Header is updated. Nov 1 00:39:17.465418 disk-uuid[592]: Secondary Entries is updated. Nov 1 00:39:17.465418 disk-uuid[592]: Secondary Header is updated. Nov 1 00:39:17.474907 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Nov 1 00:39:17.482857 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Nov 1 00:39:18.496842 disk-uuid[593]: The operation has completed successfully. Nov 1 00:39:18.498652 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Nov 1 00:39:18.640375 systemd[1]: disk-uuid.service: Deactivated successfully. Nov 1 00:39:18.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:18.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:18.640493 systemd[1]: Finished disk-uuid.service. Nov 1 00:39:18.647696 systemd[1]: Starting verity-setup.service... Nov 1 00:39:18.675952 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Nov 1 00:39:18.773267 systemd[1]: Found device dev-mapper-usr.device. Nov 1 00:39:18.776363 systemd[1]: Mounting sysusr-usr.mount... Nov 1 00:39:18.779745 systemd[1]: Finished verity-setup.service. Nov 1 00:39:18.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:18.882869 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Nov 1 00:39:18.883110 systemd[1]: Mounted sysusr-usr.mount. Nov 1 00:39:18.884009 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Nov 1 00:39:18.885142 systemd[1]: Starting ignition-setup.service... Nov 1 00:39:18.891181 systemd[1]: Starting parse-ip-for-networkd.service... Nov 1 00:39:18.914568 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Nov 1 00:39:18.914644 kernel: BTRFS info (device nvme0n1p6): using free space tree Nov 1 00:39:18.914664 kernel: BTRFS info (device nvme0n1p6): has skinny extents Nov 1 00:39:18.944869 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Nov 1 00:39:18.960083 systemd[1]: mnt-oem.mount: Deactivated successfully. Nov 1 00:39:18.969482 systemd[1]: Finished ignition-setup.service. Nov 1 00:39:18.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:18.971672 systemd[1]: Starting ignition-fetch-offline.service... Nov 1 00:39:18.986447 systemd[1]: Finished parse-ip-for-networkd.service. Nov 1 00:39:18.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:18.987000 audit: BPF prog-id=9 op=LOAD Nov 1 00:39:18.989351 systemd[1]: Starting systemd-networkd.service... Nov 1 00:39:19.024098 systemd-networkd[1106]: lo: Link UP Nov 1 00:39:19.024111 systemd-networkd[1106]: lo: Gained carrier Nov 1 00:39:19.024783 systemd-networkd[1106]: Enumeration completed Nov 1 00:39:19.024946 systemd[1]: Started systemd-networkd.service. Nov 1 00:39:19.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:19.025261 systemd-networkd[1106]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:39:19.028673 systemd[1]: Reached target network.target. Nov 1 00:39:19.029184 systemd-networkd[1106]: eth0: Link UP Nov 1 00:39:19.029191 systemd-networkd[1106]: eth0: Gained carrier Nov 1 00:39:19.034855 systemd[1]: Starting iscsiuio.service... Nov 1 00:39:19.042404 systemd[1]: Started iscsiuio.service. Nov 1 00:39:19.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:19.043973 systemd-networkd[1106]: eth0: DHCPv4 address 172.31.19.190/20, gateway 172.31.16.1 acquired from 172.31.16.1 Nov 1 00:39:19.047367 systemd[1]: Starting iscsid.service... Nov 1 00:39:19.053110 iscsid[1111]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:39:19.053110 iscsid[1111]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Nov 1 00:39:19.053110 iscsid[1111]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Nov 1 00:39:19.053110 iscsid[1111]: If using hardware iscsi like qla4xxx this message can be ignored. Nov 1 00:39:19.053110 iscsid[1111]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Nov 1 00:39:19.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:19.068068 iscsid[1111]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Nov 1 00:39:19.055408 systemd[1]: Started iscsid.service. Nov 1 00:39:19.058009 systemd[1]: Starting dracut-initqueue.service... Nov 1 00:39:19.076335 systemd[1]: Finished dracut-initqueue.service. Nov 1 00:39:19.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:19.077465 systemd[1]: Reached target remote-fs-pre.target. Nov 1 00:39:19.078878 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:39:19.080168 systemd[1]: Reached target remote-fs.target. Nov 1 00:39:19.084378 systemd[1]: Starting dracut-pre-mount.service... Nov 1 00:39:19.094456 systemd[1]: Finished dracut-pre-mount.service. Nov 1 00:39:19.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:19.630665 ignition[1096]: Ignition 2.14.0 Nov 1 00:39:19.630684 ignition[1096]: Stage: fetch-offline Nov 1 00:39:19.630906 ignition[1096]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:39:19.630959 ignition[1096]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:39:19.652379 ignition[1096]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:39:19.653145 ignition[1096]: Ignition finished successfully Nov 1 00:39:19.654747 systemd[1]: Finished ignition-fetch-offline.service. Nov 1 00:39:19.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:19.657038 systemd[1]: Starting ignition-fetch.service... Nov 1 00:39:19.667588 ignition[1130]: Ignition 2.14.0 Nov 1 00:39:19.667601 ignition[1130]: Stage: fetch Nov 1 00:39:19.667819 ignition[1130]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:39:19.667877 ignition[1130]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:39:19.675874 ignition[1130]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:39:19.676709 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:39:19.705550 ignition[1130]: INFO : PUT result: OK Nov 1 00:39:19.715170 ignition[1130]: DEBUG : parsed url from cmdline: "" Nov 1 00:39:19.715170 ignition[1130]: INFO : no config URL provided Nov 1 00:39:19.715170 ignition[1130]: INFO : reading system config file "/usr/lib/ignition/user.ign" Nov 1 00:39:19.715170 ignition[1130]: INFO : no config at "/usr/lib/ignition/user.ign" Nov 1 00:39:19.719138 ignition[1130]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:39:19.719138 ignition[1130]: INFO : PUT result: OK Nov 1 00:39:19.719138 ignition[1130]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Nov 1 00:39:19.719138 ignition[1130]: INFO : GET result: OK Nov 1 00:39:19.719138 ignition[1130]: DEBUG : parsing config with SHA512: 8e1e714899568749245bf1c4be4b874c6827a3a895deb462628bb9dd64a28c7efd72f379ebabf23cf0db56cbe511faf07cad747692c615c5d85f0c3ffa0d158e Nov 1 00:39:19.729006 unknown[1130]: fetched base config from "system" Nov 1 00:39:19.730117 ignition[1130]: fetch: fetch complete Nov 1 00:39:19.729023 unknown[1130]: fetched base config from "system" Nov 1 00:39:19.730124 ignition[1130]: fetch: fetch passed Nov 1 00:39:19.729031 unknown[1130]: fetched user config from "aws" Nov 1 00:39:19.730177 ignition[1130]: Ignition finished successfully Nov 1 00:39:19.736271 systemd[1]: Finished ignition-fetch.service. Nov 1 00:39:19.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:19.738742 systemd[1]: Starting ignition-kargs.service... Nov 1 00:39:19.749820 ignition[1136]: Ignition 2.14.0 Nov 1 00:39:19.749880 ignition[1136]: Stage: kargs Nov 1 00:39:19.750107 ignition[1136]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:39:19.750144 ignition[1136]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:39:19.763606 ignition[1136]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:39:19.764652 ignition[1136]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:39:19.767265 ignition[1136]: INFO : PUT result: OK Nov 1 00:39:19.772401 ignition[1136]: kargs: kargs passed Nov 1 00:39:19.772756 ignition[1136]: Ignition finished successfully Nov 1 00:39:19.775773 systemd[1]: Finished ignition-kargs.service. Nov 1 00:39:19.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:19.779661 systemd[1]: Starting ignition-disks.service... Nov 1 00:39:19.791889 ignition[1142]: Ignition 2.14.0 Nov 1 00:39:19.791902 ignition[1142]: Stage: disks Nov 1 00:39:19.792134 ignition[1142]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:39:19.792170 ignition[1142]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:39:19.800024 ignition[1142]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:39:19.800909 ignition[1142]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:39:19.802044 ignition[1142]: INFO : PUT result: OK Nov 1 00:39:19.805585 ignition[1142]: disks: disks passed Nov 1 00:39:19.805650 ignition[1142]: Ignition finished successfully Nov 1 00:39:19.808582 systemd[1]: Finished ignition-disks.service. Nov 1 00:39:19.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:19.810357 systemd[1]: Reached target initrd-root-device.target. Nov 1 00:39:19.811518 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:39:19.812502 systemd[1]: Reached target local-fs.target. Nov 1 00:39:19.813466 systemd[1]: Reached target sysinit.target. Nov 1 00:39:19.814673 systemd[1]: Reached target basic.target. Nov 1 00:39:19.817084 systemd[1]: Starting systemd-fsck-root.service... Nov 1 00:39:19.850999 systemd-fsck[1150]: ROOT: clean, 637/553520 files, 56032/553472 blocks Nov 1 00:39:19.856492 systemd[1]: Finished systemd-fsck-root.service. Nov 1 00:39:19.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:19.858874 systemd[1]: Mounting sysroot.mount... Nov 1 00:39:19.879870 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Nov 1 00:39:19.880407 systemd[1]: Mounted sysroot.mount. Nov 1 00:39:19.882653 systemd[1]: Reached target initrd-root-fs.target. Nov 1 00:39:19.896013 systemd[1]: Mounting sysroot-usr.mount... Nov 1 00:39:19.898005 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Nov 1 00:39:19.898078 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Nov 1 00:39:19.898119 systemd[1]: Reached target ignition-diskful.target. Nov 1 00:39:19.902918 systemd[1]: Mounted sysroot-usr.mount. Nov 1 00:39:19.923266 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:39:19.926486 systemd[1]: Starting initrd-setup-root.service... Nov 1 00:39:19.939727 initrd-setup-root[1172]: cut: /sysroot/etc/passwd: No such file or directory Nov 1 00:39:19.946862 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/nvme0n1p6 scanned by mount (1167) Nov 1 00:39:19.953562 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Nov 1 00:39:19.953634 kernel: BTRFS info (device nvme0n1p6): using free space tree Nov 1 00:39:19.953646 kernel: BTRFS info (device nvme0n1p6): has skinny extents Nov 1 00:39:19.956012 initrd-setup-root[1196]: cut: /sysroot/etc/group: No such file or directory Nov 1 00:39:19.961869 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Nov 1 00:39:19.963979 initrd-setup-root[1206]: cut: /sysroot/etc/shadow: No such file or directory Nov 1 00:39:19.966951 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:39:19.971891 initrd-setup-root[1214]: cut: /sysroot/etc/gshadow: No such file or directory Nov 1 00:39:20.169664 systemd[1]: Finished initrd-setup-root.service. Nov 1 00:39:20.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:20.172003 systemd[1]: Starting ignition-mount.service... Nov 1 00:39:20.176815 systemd[1]: Starting sysroot-boot.service... Nov 1 00:39:20.189361 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Nov 1 00:39:20.189506 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Nov 1 00:39:20.209875 ignition[1232]: INFO : Ignition 2.14.0 Nov 1 00:39:20.211487 ignition[1232]: INFO : Stage: mount Nov 1 00:39:20.212943 ignition[1232]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:39:20.216843 ignition[1232]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:39:20.228489 ignition[1232]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:39:20.229852 ignition[1232]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:39:20.234778 systemd[1]: Finished sysroot-boot.service. Nov 1 00:39:20.243970 kernel: kauditd_printk_skb: 24 callbacks suppressed Nov 1 00:39:20.244005 kernel: audit: type=1130 audit(1761957560.234:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:20.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:20.244088 ignition[1232]: INFO : PUT result: OK Nov 1 00:39:20.244088 ignition[1232]: INFO : mount: mount passed Nov 1 00:39:20.244088 ignition[1232]: INFO : Ignition finished successfully Nov 1 00:39:20.255997 kernel: audit: type=1130 audit(1761957560.243:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:20.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:20.243759 systemd[1]: Finished ignition-mount.service. Nov 1 00:39:20.246190 systemd[1]: Starting ignition-files.service... Nov 1 00:39:20.259057 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 00:39:20.282121 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by mount (1242) Nov 1 00:39:20.291795 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm Nov 1 00:39:20.291892 kernel: BTRFS info (device nvme0n1p6): using free space tree Nov 1 00:39:20.291913 kernel: BTRFS info (device nvme0n1p6): has skinny extents Nov 1 00:39:20.330935 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Nov 1 00:39:20.336320 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 00:39:20.382135 systemd-networkd[1106]: eth0: Gained IPv6LL Nov 1 00:39:20.383883 ignition[1261]: INFO : Ignition 2.14.0 Nov 1 00:39:20.385182 ignition[1261]: INFO : Stage: files Nov 1 00:39:20.385182 ignition[1261]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:39:20.385182 ignition[1261]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:39:20.410526 ignition[1261]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:39:20.418196 ignition[1261]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:39:20.418196 ignition[1261]: INFO : PUT result: OK Nov 1 00:39:20.425156 ignition[1261]: DEBUG : files: compiled without relabeling support, skipping Nov 1 00:39:20.431750 ignition[1261]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Nov 1 00:39:20.431750 ignition[1261]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Nov 1 00:39:20.436422 ignition[1261]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Nov 1 00:39:20.438186 ignition[1261]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Nov 1 00:39:20.438186 ignition[1261]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Nov 1 00:39:20.438053 unknown[1261]: wrote ssh authorized keys file for user: core Nov 1 00:39:20.443055 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Nov 1 00:39:20.443055 ignition[1261]: INFO : GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 Nov 1 00:39:20.515431 ignition[1261]: INFO : GET result: OK Nov 1 00:39:20.682577 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Nov 1 00:39:20.682577 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Nov 1 00:39:20.688102 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:39:20.694316 ignition[1261]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem159921281" Nov 1 00:39:20.696222 ignition[1261]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem159921281": device or resource busy Nov 1 00:39:20.697871 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem159921281", trying btrfs: device or resource busy Nov 1 00:39:20.699476 ignition[1261]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem159921281" Nov 1 00:39:20.699476 ignition[1261]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem159921281" Nov 1 00:39:20.704166 ignition[1261]: INFO : op(3): [started] unmounting "/mnt/oem159921281" Nov 1 00:39:20.704166 ignition[1261]: INFO : op(3): [finished] unmounting "/mnt/oem159921281" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Nov 1 00:39:20.704166 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Nov 1 00:39:20.704166 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:39:20.744385 ignition[1261]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem520339742" Nov 1 00:39:20.744385 ignition[1261]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem520339742": device or resource busy Nov 1 00:39:20.744385 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem520339742", trying btrfs: device or resource busy Nov 1 00:39:20.744385 ignition[1261]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem520339742" Nov 1 00:39:20.744385 ignition[1261]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem520339742" Nov 1 00:39:20.744385 ignition[1261]: INFO : op(6): [started] unmounting "/mnt/oem520339742" Nov 1 00:39:20.744385 ignition[1261]: INFO : op(6): [finished] unmounting "/mnt/oem520339742" Nov 1 00:39:20.744385 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Nov 1 00:39:20.744385 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Nov 1 00:39:20.744385 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:39:20.744385 ignition[1261]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2839276155" Nov 1 00:39:20.744385 ignition[1261]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2839276155": device or resource busy Nov 1 00:39:20.744385 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2839276155", trying btrfs: device or resource busy Nov 1 00:39:20.744385 ignition[1261]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2839276155" Nov 1 00:39:20.744385 ignition[1261]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2839276155" Nov 1 00:39:20.744385 ignition[1261]: INFO : op(9): [started] unmounting "/mnt/oem2839276155" Nov 1 00:39:20.744385 ignition[1261]: INFO : op(9): [finished] unmounting "/mnt/oem2839276155" Nov 1 00:39:20.744385 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Nov 1 00:39:20.744385 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Nov 1 00:39:20.744385 ignition[1261]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Nov 1 00:39:20.744385 ignition[1261]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3991015339" Nov 1 00:39:20.772769 ignition[1261]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3991015339": device or resource busy Nov 1 00:39:20.772769 ignition[1261]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3991015339", trying btrfs: device or resource busy Nov 1 00:39:20.772769 ignition[1261]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3991015339" Nov 1 00:39:20.772769 ignition[1261]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3991015339" Nov 1 00:39:20.772769 ignition[1261]: INFO : op(c): [started] unmounting "/mnt/oem3991015339" Nov 1 00:39:20.772769 ignition[1261]: INFO : op(c): [finished] unmounting "/mnt/oem3991015339" Nov 1 00:39:20.772769 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Nov 1 00:39:20.772769 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Nov 1 00:39:20.772769 ignition[1261]: INFO : GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Nov 1 00:39:21.194126 ignition[1261]: INFO : GET result: OK Nov 1 00:39:21.689467 ignition[1261]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Nov 1 00:39:21.689467 ignition[1261]: INFO : files: op(f): [started] processing unit "amazon-ssm-agent.service" Nov 1 00:39:21.689467 ignition[1261]: INFO : files: op(f): op(10): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(f): op(10): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(f): [finished] processing unit "amazon-ssm-agent.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(11): [started] processing unit "nvidia.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(11): [finished] processing unit "nvidia.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(12): [started] processing unit "coreos-metadata-sshkeys@.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(12): [finished] processing unit "coreos-metadata-sshkeys@.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(15): [started] setting preset to enabled for "amazon-ssm-agent.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(15): [finished] setting preset to enabled for "amazon-ssm-agent.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(16): [started] setting preset to enabled for "nvidia.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(16): [finished] setting preset to enabled for "nvidia.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(17): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(17): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Nov 1 00:39:21.694663 ignition[1261]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Nov 1 00:39:21.769415 kernel: audit: type=1130 audit(1761957561.702:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.769469 kernel: audit: type=1130 audit(1761957561.725:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.769490 kernel: audit: type=1131 audit(1761957561.725:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.769511 kernel: audit: type=1130 audit(1761957561.741:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.769765 ignition[1261]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:39:21.769765 ignition[1261]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Nov 1 00:39:21.769765 ignition[1261]: INFO : files: files passed Nov 1 00:39:21.769765 ignition[1261]: INFO : Ignition finished successfully Nov 1 00:39:21.701769 systemd[1]: Finished ignition-files.service. Nov 1 00:39:21.791231 kernel: audit: type=1130 audit(1761957561.777:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.791274 kernel: audit: type=1131 audit(1761957561.777:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.709669 systemd[1]: Starting initrd-setup-root-after-ignition.service... Nov 1 00:39:21.793041 initrd-setup-root-after-ignition[1286]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Nov 1 00:39:21.716775 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Nov 1 00:39:21.718233 systemd[1]: Starting ignition-quench.service... Nov 1 00:39:21.725550 systemd[1]: ignition-quench.service: Deactivated successfully. Nov 1 00:39:21.725705 systemd[1]: Finished ignition-quench.service. Nov 1 00:39:21.730576 systemd[1]: Finished initrd-setup-root-after-ignition.service. Nov 1 00:39:21.742662 systemd[1]: Reached target ignition-complete.target. Nov 1 00:39:21.752265 systemd[1]: Starting initrd-parse-etc.service... Nov 1 00:39:21.776778 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Nov 1 00:39:21.776973 systemd[1]: Finished initrd-parse-etc.service. Nov 1 00:39:21.778421 systemd[1]: Reached target initrd-fs.target. Nov 1 00:39:21.792256 systemd[1]: Reached target initrd.target. Nov 1 00:39:21.823809 kernel: audit: type=1130 audit(1761957561.814:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.794014 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Nov 1 00:39:21.795444 systemd[1]: Starting dracut-pre-pivot.service... Nov 1 00:39:21.813477 systemd[1]: Finished dracut-pre-pivot.service. Nov 1 00:39:21.816221 systemd[1]: Starting initrd-cleanup.service... Nov 1 00:39:21.833057 systemd[1]: Stopped target nss-lookup.target. Nov 1 00:39:21.834040 systemd[1]: Stopped target remote-cryptsetup.target. Nov 1 00:39:21.835514 systemd[1]: Stopped target timers.target. Nov 1 00:39:21.836786 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Nov 1 00:39:21.844601 kernel: audit: type=1131 audit(1761957561.837:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.837044 systemd[1]: Stopped dracut-pre-pivot.service. Nov 1 00:39:21.838446 systemd[1]: Stopped target initrd.target. Nov 1 00:39:21.845632 systemd[1]: Stopped target basic.target. Nov 1 00:39:21.847012 systemd[1]: Stopped target ignition-complete.target. Nov 1 00:39:21.848224 systemd[1]: Stopped target ignition-diskful.target. Nov 1 00:39:21.849568 systemd[1]: Stopped target initrd-root-device.target. Nov 1 00:39:21.850902 systemd[1]: Stopped target remote-fs.target. Nov 1 00:39:21.852092 systemd[1]: Stopped target remote-fs-pre.target. Nov 1 00:39:21.853320 systemd[1]: Stopped target sysinit.target. Nov 1 00:39:21.854565 systemd[1]: Stopped target local-fs.target. Nov 1 00:39:21.855760 systemd[1]: Stopped target local-fs-pre.target. Nov 1 00:39:21.856940 systemd[1]: Stopped target swap.target. Nov 1 00:39:21.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.858132 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Nov 1 00:39:21.858358 systemd[1]: Stopped dracut-pre-mount.service. Nov 1 00:39:21.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.859545 systemd[1]: Stopped target cryptsetup.target. Nov 1 00:39:21.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.860567 systemd[1]: dracut-initqueue.service: Deactivated successfully. Nov 1 00:39:21.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.860780 systemd[1]: Stopped dracut-initqueue.service. Nov 1 00:39:21.862081 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Nov 1 00:39:21.862297 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Nov 1 00:39:21.863332 systemd[1]: ignition-files.service: Deactivated successfully. Nov 1 00:39:21.863530 systemd[1]: Stopped ignition-files.service. Nov 1 00:39:21.866116 systemd[1]: Stopping ignition-mount.service... Nov 1 00:39:21.866867 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Nov 1 00:39:21.867092 systemd[1]: Stopped kmod-static-nodes.service. Nov 1 00:39:21.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.882195 ignition[1299]: INFO : Ignition 2.14.0 Nov 1 00:39:21.882195 ignition[1299]: INFO : Stage: umount Nov 1 00:39:21.882195 ignition[1299]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 00:39:21.882195 ignition[1299]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Nov 1 00:39:21.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.886898 systemd[1]: Stopping sysroot-boot.service... Nov 1 00:39:21.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.887891 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Nov 1 00:39:21.888219 systemd[1]: Stopped systemd-udev-trigger.service. Nov 1 00:39:21.891540 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Nov 1 00:39:21.891741 systemd[1]: Stopped dracut-pre-trigger.service. Nov 1 00:39:21.900192 systemd[1]: initrd-cleanup.service: Deactivated successfully. Nov 1 00:39:21.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.901172 systemd[1]: Finished initrd-cleanup.service. Nov 1 00:39:21.909885 ignition[1299]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Nov 1 00:39:21.911342 ignition[1299]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Nov 1 00:39:21.914117 ignition[1299]: INFO : PUT result: OK Nov 1 00:39:21.914952 systemd[1]: sysroot-boot.mount: Deactivated successfully. Nov 1 00:39:21.917036 ignition[1299]: INFO : umount: umount passed Nov 1 00:39:21.918019 ignition[1299]: INFO : Ignition finished successfully Nov 1 00:39:21.919664 systemd[1]: ignition-mount.service: Deactivated successfully. Nov 1 00:39:21.919810 systemd[1]: Stopped ignition-mount.service. Nov 1 00:39:21.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.921283 systemd[1]: ignition-disks.service: Deactivated successfully. Nov 1 00:39:21.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.921361 systemd[1]: Stopped ignition-disks.service. Nov 1 00:39:21.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.922565 systemd[1]: ignition-kargs.service: Deactivated successfully. Nov 1 00:39:21.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.922636 systemd[1]: Stopped ignition-kargs.service. Nov 1 00:39:21.924009 systemd[1]: ignition-fetch.service: Deactivated successfully. Nov 1 00:39:21.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.924076 systemd[1]: Stopped ignition-fetch.service. Nov 1 00:39:21.925163 systemd[1]: Stopped target network.target. Nov 1 00:39:21.926596 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Nov 1 00:39:21.926675 systemd[1]: Stopped ignition-fetch-offline.service. Nov 1 00:39:21.928086 systemd[1]: Stopped target paths.target. Nov 1 00:39:21.929223 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Nov 1 00:39:21.932933 systemd[1]: Stopped systemd-ask-password-console.path. Nov 1 00:39:21.933778 systemd[1]: Stopped target slices.target. Nov 1 00:39:21.934955 systemd[1]: Stopped target sockets.target. Nov 1 00:39:21.936070 systemd[1]: iscsid.socket: Deactivated successfully. Nov 1 00:39:21.936122 systemd[1]: Closed iscsid.socket. Nov 1 00:39:21.938165 systemd[1]: iscsiuio.socket: Deactivated successfully. Nov 1 00:39:21.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.938214 systemd[1]: Closed iscsiuio.socket. Nov 1 00:39:21.939274 systemd[1]: ignition-setup.service: Deactivated successfully. Nov 1 00:39:21.939358 systemd[1]: Stopped ignition-setup.service. Nov 1 00:39:21.941329 systemd[1]: Stopping systemd-networkd.service... Nov 1 00:39:21.942471 systemd[1]: Stopping systemd-resolved.service... Nov 1 00:39:21.944890 systemd-networkd[1106]: eth0: DHCPv6 lease lost Nov 1 00:39:21.948043 systemd[1]: systemd-resolved.service: Deactivated successfully. Nov 1 00:39:21.948197 systemd[1]: Stopped systemd-resolved.service. Nov 1 00:39:21.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.950337 systemd[1]: systemd-networkd.service: Deactivated successfully. Nov 1 00:39:21.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.951000 audit: BPF prog-id=6 op=UNLOAD Nov 1 00:39:21.950489 systemd[1]: Stopped systemd-networkd.service. Nov 1 00:39:21.951984 systemd[1]: systemd-networkd.socket: Deactivated successfully. Nov 1 00:39:21.953000 audit: BPF prog-id=9 op=UNLOAD Nov 1 00:39:21.952035 systemd[1]: Closed systemd-networkd.socket. Nov 1 00:39:21.954172 systemd[1]: Stopping network-cleanup.service... Nov 1 00:39:21.957965 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Nov 1 00:39:21.958065 systemd[1]: Stopped parse-ip-for-networkd.service. Nov 1 00:39:21.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.959282 systemd[1]: systemd-sysctl.service: Deactivated successfully. Nov 1 00:39:21.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.959354 systemd[1]: Stopped systemd-sysctl.service. Nov 1 00:39:21.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.960505 systemd[1]: systemd-modules-load.service: Deactivated successfully. Nov 1 00:39:21.960573 systemd[1]: Stopped systemd-modules-load.service. Nov 1 00:39:21.964919 systemd[1]: Stopping systemd-udevd.service... Nov 1 00:39:21.969915 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Nov 1 00:39:21.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.976728 systemd[1]: network-cleanup.service: Deactivated successfully. Nov 1 00:39:21.976934 systemd[1]: Stopped network-cleanup.service. Nov 1 00:39:21.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.979360 systemd[1]: systemd-udevd.service: Deactivated successfully. Nov 1 00:39:21.979503 systemd[1]: Stopped systemd-udevd.service. Nov 1 00:39:21.981325 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Nov 1 00:39:21.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.981369 systemd[1]: Closed systemd-udevd-control.socket. Nov 1 00:39:21.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.982374 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Nov 1 00:39:21.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.982431 systemd[1]: Closed systemd-udevd-kernel.socket. Nov 1 00:39:21.983552 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Nov 1 00:39:21.983620 systemd[1]: Stopped dracut-pre-udev.service. Nov 1 00:39:21.984878 systemd[1]: dracut-cmdline.service: Deactivated successfully. Nov 1 00:39:21.984942 systemd[1]: Stopped dracut-cmdline.service. Nov 1 00:39:21.986232 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Nov 1 00:39:21.986296 systemd[1]: Stopped dracut-cmdline-ask.service. Nov 1 00:39:21.988765 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Nov 1 00:39:21.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.999109 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Nov 1 00:39:22.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:22.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:21.999213 systemd[1]: Stopped systemd-vconsole-setup.service. Nov 1 00:39:22.000531 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Nov 1 00:39:22.000664 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Nov 1 00:39:22.098541 systemd[1]: sysroot-boot.service: Deactivated successfully. Nov 1 00:39:22.098675 systemd[1]: Stopped sysroot-boot.service. Nov 1 00:39:22.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:22.100293 systemd[1]: Reached target initrd-switch-root.target. Nov 1 00:39:22.101443 systemd[1]: initrd-setup-root.service: Deactivated successfully. Nov 1 00:39:22.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:22.101535 systemd[1]: Stopped initrd-setup-root.service. Nov 1 00:39:22.104045 systemd[1]: Starting initrd-switch-root.service... Nov 1 00:39:22.121389 systemd[1]: Switching root. Nov 1 00:39:22.143242 systemd-journald[185]: Journal stopped Nov 1 00:39:27.772324 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Nov 1 00:39:27.772422 kernel: SELinux: Class mctp_socket not defined in policy. Nov 1 00:39:27.772451 kernel: SELinux: Class anon_inode not defined in policy. Nov 1 00:39:27.772475 kernel: SELinux: the above unknown classes and permissions will be allowed Nov 1 00:39:27.772495 kernel: SELinux: policy capability network_peer_controls=1 Nov 1 00:39:27.772514 kernel: SELinux: policy capability open_perms=1 Nov 1 00:39:27.772539 kernel: SELinux: policy capability extended_socket_class=1 Nov 1 00:39:27.772559 kernel: SELinux: policy capability always_check_network=0 Nov 1 00:39:27.772578 kernel: SELinux: policy capability cgroup_seclabel=1 Nov 1 00:39:27.772597 kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 1 00:39:27.772617 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Nov 1 00:39:27.772636 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Nov 1 00:39:27.772659 systemd[1]: Successfully loaded SELinux policy in 129.963ms. Nov 1 00:39:27.772697 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.765ms. Nov 1 00:39:27.772720 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 00:39:27.772741 systemd[1]: Detected virtualization amazon. Nov 1 00:39:27.772761 systemd[1]: Detected architecture x86-64. Nov 1 00:39:27.772781 systemd[1]: Detected first boot. Nov 1 00:39:27.772802 systemd[1]: Initializing machine ID from VM UUID. Nov 1 00:39:27.772848 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Nov 1 00:39:27.772867 systemd[1]: Populated /etc with preset unit settings. Nov 1 00:39:27.772885 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:39:27.772909 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:39:27.772931 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:39:27.772952 kernel: kauditd_printk_skb: 48 callbacks suppressed Nov 1 00:39:27.772971 kernel: audit: type=1334 audit(1761957567.498:86): prog-id=12 op=LOAD Nov 1 00:39:27.772995 kernel: audit: type=1334 audit(1761957567.498:87): prog-id=3 op=UNLOAD Nov 1 00:39:27.773018 kernel: audit: type=1334 audit(1761957567.500:88): prog-id=13 op=LOAD Nov 1 00:39:27.773038 kernel: audit: type=1334 audit(1761957567.502:89): prog-id=14 op=LOAD Nov 1 00:39:27.773057 kernel: audit: type=1334 audit(1761957567.502:90): prog-id=4 op=UNLOAD Nov 1 00:39:27.773076 kernel: audit: type=1334 audit(1761957567.502:91): prog-id=5 op=UNLOAD Nov 1 00:39:27.773096 kernel: audit: type=1334 audit(1761957567.509:92): prog-id=15 op=LOAD Nov 1 00:39:27.773115 kernel: audit: type=1334 audit(1761957567.509:93): prog-id=12 op=UNLOAD Nov 1 00:39:27.773133 kernel: audit: type=1334 audit(1761957567.510:94): prog-id=16 op=LOAD Nov 1 00:39:27.773155 kernel: audit: type=1334 audit(1761957567.512:95): prog-id=17 op=LOAD Nov 1 00:39:27.773175 systemd[1]: iscsiuio.service: Deactivated successfully. Nov 1 00:39:27.773196 systemd[1]: Stopped iscsiuio.service. Nov 1 00:39:27.773216 systemd[1]: iscsid.service: Deactivated successfully. Nov 1 00:39:27.773237 systemd[1]: Stopped iscsid.service. Nov 1 00:39:27.773257 systemd[1]: initrd-switch-root.service: Deactivated successfully. Nov 1 00:39:27.773280 systemd[1]: Stopped initrd-switch-root.service. Nov 1 00:39:27.773301 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Nov 1 00:39:27.773326 systemd[1]: Created slice system-addon\x2dconfig.slice. Nov 1 00:39:27.773346 systemd[1]: Created slice system-addon\x2drun.slice. Nov 1 00:39:27.773369 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Nov 1 00:39:27.773389 systemd[1]: Created slice system-getty.slice. Nov 1 00:39:27.773410 systemd[1]: Created slice system-modprobe.slice. Nov 1 00:39:27.773431 systemd[1]: Created slice system-serial\x2dgetty.slice. Nov 1 00:39:27.773451 systemd[1]: Created slice system-system\x2dcloudinit.slice. Nov 1 00:39:27.773471 systemd[1]: Created slice system-systemd\x2dfsck.slice. Nov 1 00:39:27.773492 systemd[1]: Created slice user.slice. Nov 1 00:39:27.773517 systemd[1]: Started systemd-ask-password-console.path. Nov 1 00:39:27.773537 systemd[1]: Started systemd-ask-password-wall.path. Nov 1 00:39:27.773557 systemd[1]: Set up automount boot.automount. Nov 1 00:39:27.773578 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Nov 1 00:39:27.773603 systemd[1]: Stopped target initrd-switch-root.target. Nov 1 00:39:27.773625 systemd[1]: Stopped target initrd-fs.target. Nov 1 00:39:27.773646 systemd[1]: Stopped target initrd-root-fs.target. Nov 1 00:39:27.773666 systemd[1]: Reached target integritysetup.target. Nov 1 00:39:27.773697 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 00:39:27.773720 systemd[1]: Reached target remote-fs.target. Nov 1 00:39:27.773744 systemd[1]: Reached target slices.target. Nov 1 00:39:27.773765 systemd[1]: Reached target swap.target. Nov 1 00:39:27.773788 systemd[1]: Reached target torcx.target. Nov 1 00:39:27.773815 systemd[1]: Reached target veritysetup.target. Nov 1 00:39:27.773875 systemd[1]: Listening on systemd-coredump.socket. Nov 1 00:39:27.773896 systemd[1]: Listening on systemd-initctl.socket. Nov 1 00:39:27.773917 systemd[1]: Listening on systemd-networkd.socket. Nov 1 00:39:27.773938 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 00:39:27.773956 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 00:39:27.773975 systemd[1]: Listening on systemd-userdbd.socket. Nov 1 00:39:27.773991 systemd[1]: Mounting dev-hugepages.mount... Nov 1 00:39:27.774008 systemd[1]: Mounting dev-mqueue.mount... Nov 1 00:39:27.774027 systemd[1]: Mounting media.mount... Nov 1 00:39:27.774048 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:39:27.774065 systemd[1]: Mounting sys-kernel-debug.mount... Nov 1 00:39:27.774083 systemd[1]: Mounting sys-kernel-tracing.mount... Nov 1 00:39:27.774102 systemd[1]: Mounting tmp.mount... Nov 1 00:39:27.774122 systemd[1]: Starting flatcar-tmpfiles.service... Nov 1 00:39:27.774142 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:39:27.774160 systemd[1]: Starting kmod-static-nodes.service... Nov 1 00:39:27.774180 systemd[1]: Starting modprobe@configfs.service... Nov 1 00:39:27.774199 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:39:27.774223 systemd[1]: Starting modprobe@drm.service... Nov 1 00:39:27.774244 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:39:27.774264 systemd[1]: Starting modprobe@fuse.service... Nov 1 00:39:27.774284 systemd[1]: Starting modprobe@loop.service... Nov 1 00:39:27.774305 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Nov 1 00:39:27.774326 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Nov 1 00:39:27.774346 systemd[1]: Stopped systemd-fsck-root.service. Nov 1 00:39:27.774367 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Nov 1 00:39:27.774387 systemd[1]: Stopped systemd-fsck-usr.service. Nov 1 00:39:27.774412 systemd[1]: Stopped systemd-journald.service. Nov 1 00:39:27.774432 systemd[1]: Starting systemd-journald.service... Nov 1 00:39:27.774453 systemd[1]: Starting systemd-modules-load.service... Nov 1 00:39:27.774474 systemd[1]: Starting systemd-network-generator.service... Nov 1 00:39:27.774495 systemd[1]: Starting systemd-remount-fs.service... Nov 1 00:39:27.774516 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 00:39:27.774537 systemd[1]: verity-setup.service: Deactivated successfully. Nov 1 00:39:27.774557 systemd[1]: Stopped verity-setup.service. Nov 1 00:39:27.774579 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:39:27.774604 systemd[1]: Mounted dev-hugepages.mount. Nov 1 00:39:27.774625 systemd[1]: Mounted dev-mqueue.mount. Nov 1 00:39:27.774645 systemd[1]: Mounted media.mount. Nov 1 00:39:27.774677 systemd-journald[1420]: Journal started Nov 1 00:39:27.774766 systemd-journald[1420]: Runtime Journal (/run/log/journal/ec255d77fe328f7d3105177cd0600713) is 4.8M, max 38.3M, 33.5M free. Nov 1 00:39:22.842000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Nov 1 00:39:23.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:39:23.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 00:39:23.023000 audit: BPF prog-id=10 op=LOAD Nov 1 00:39:23.023000 audit: BPF prog-id=10 op=UNLOAD Nov 1 00:39:23.023000 audit: BPF prog-id=11 op=LOAD Nov 1 00:39:23.023000 audit: BPF prog-id=11 op=UNLOAD Nov 1 00:39:23.287000 audit[1332]: AVC avc: denied { associate } for pid=1332 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Nov 1 00:39:23.287000 audit[1332]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=1315 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:23.287000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:39:23.292000 audit[1332]: AVC avc: denied { associate } for pid=1332 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Nov 1 00:39:23.292000 audit[1332]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=1315 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:23.292000 audit: CWD cwd="/" Nov 1 00:39:23.292000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:23.292000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:23.292000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 00:39:27.498000 audit: BPF prog-id=12 op=LOAD Nov 1 00:39:27.498000 audit: BPF prog-id=3 op=UNLOAD Nov 1 00:39:27.500000 audit: BPF prog-id=13 op=LOAD Nov 1 00:39:27.502000 audit: BPF prog-id=14 op=LOAD Nov 1 00:39:27.502000 audit: BPF prog-id=4 op=UNLOAD Nov 1 00:39:27.502000 audit: BPF prog-id=5 op=UNLOAD Nov 1 00:39:27.509000 audit: BPF prog-id=15 op=LOAD Nov 1 00:39:27.509000 audit: BPF prog-id=12 op=UNLOAD Nov 1 00:39:27.510000 audit: BPF prog-id=16 op=LOAD Nov 1 00:39:27.512000 audit: BPF prog-id=17 op=LOAD Nov 1 00:39:27.783807 kernel: fuse: init (API version 7.34) Nov 1 00:39:27.784994 systemd[1]: Started systemd-journald.service. Nov 1 00:39:27.512000 audit: BPF prog-id=13 op=UNLOAD Nov 1 00:39:27.514000 audit: BPF prog-id=14 op=UNLOAD Nov 1 00:39:27.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.522000 audit: BPF prog-id=15 op=UNLOAD Nov 1 00:39:27.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.708000 audit: BPF prog-id=18 op=LOAD Nov 1 00:39:27.708000 audit: BPF prog-id=19 op=LOAD Nov 1 00:39:27.709000 audit: BPF prog-id=20 op=LOAD Nov 1 00:39:27.709000 audit: BPF prog-id=16 op=UNLOAD Nov 1 00:39:27.709000 audit: BPF prog-id=17 op=UNLOAD Nov 1 00:39:27.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.769000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Nov 1 00:39:27.769000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd0b2dcc90 a2=4000 a3=7ffd0b2dcd2c items=0 ppid=1 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:27.769000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Nov 1 00:39:27.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:23.272870 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:39:27.496935 systemd[1]: Queued start job for default target multi-user.target. Nov 1 00:39:23.273846 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:39:27.496954 systemd[1]: Unnecessary job was removed for dev-nvme0n1p6.device. Nov 1 00:39:23.273884 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:39:27.516428 systemd[1]: systemd-journald.service: Deactivated successfully. Nov 1 00:39:23.273934 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Nov 1 00:39:27.785329 systemd[1]: Mounted sys-kernel-debug.mount. Nov 1 00:39:23.273951 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=debug msg="skipped missing lower profile" missing profile=oem Nov 1 00:39:27.786613 systemd[1]: Mounted sys-kernel-tracing.mount. Nov 1 00:39:23.273999 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Nov 1 00:39:27.787918 systemd[1]: Mounted tmp.mount. Nov 1 00:39:23.274022 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Nov 1 00:39:23.274300 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Nov 1 00:39:23.274356 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 00:39:23.274484 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 00:39:23.276854 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Nov 1 00:39:23.276919 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Nov 1 00:39:23.276951 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Nov 1 00:39:23.276975 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Nov 1 00:39:23.277005 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Nov 1 00:39:23.277027 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Nov 1 00:39:27.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:26.801168 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:26Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:39:27.793248 systemd[1]: Finished kmod-static-nodes.service. Nov 1 00:39:26.801437 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:26Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:39:27.795133 systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 1 00:39:26.801559 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:26Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:39:27.795364 systemd[1]: Finished modprobe@configfs.service. Nov 1 00:39:26.801775 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:26Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 00:39:27.796905 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:39:26.801849 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:26Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Nov 1 00:39:27.797124 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:39:26.801933 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2025-11-01T00:39:26Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Nov 1 00:39:27.798998 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:39:27.802038 kernel: loop: module loaded Nov 1 00:39:27.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.801055 systemd[1]: Finished modprobe@drm.service. Nov 1 00:39:27.802602 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:39:27.802783 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:39:27.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.804316 systemd[1]: modprobe@fuse.service: Deactivated successfully. Nov 1 00:39:27.805031 systemd[1]: Finished modprobe@fuse.service. Nov 1 00:39:27.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.807344 systemd[1]: Finished systemd-network-generator.service. Nov 1 00:39:27.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.811057 systemd[1]: Finished systemd-remount-fs.service. Nov 1 00:39:27.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.812537 systemd[1]: Reached target network-pre.target. Nov 1 00:39:27.817442 systemd[1]: Mounting sys-fs-fuse-connections.mount... Nov 1 00:39:27.821033 systemd[1]: Mounting sys-kernel-config.mount... Nov 1 00:39:27.826762 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Nov 1 00:39:27.831251 systemd[1]: Starting systemd-hwdb-update.service... Nov 1 00:39:27.834457 systemd[1]: Starting systemd-journal-flush.service... Nov 1 00:39:27.835473 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:39:27.837597 systemd[1]: Starting systemd-random-seed.service... Nov 1 00:39:27.841015 systemd[1]: Finished flatcar-tmpfiles.service. Nov 1 00:39:27.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.842433 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:39:27.842755 systemd[1]: Finished modprobe@loop.service. Nov 1 00:39:27.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.844344 systemd[1]: Finished systemd-modules-load.service. Nov 1 00:39:27.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.845768 systemd[1]: Mounted sys-fs-fuse-connections.mount. Nov 1 00:39:27.846781 systemd[1]: Mounted sys-kernel-config.mount. Nov 1 00:39:27.848055 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:39:27.849796 systemd[1]: Starting systemd-sysctl.service... Nov 1 00:39:27.853958 systemd[1]: Starting systemd-sysusers.service... Nov 1 00:39:27.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.870697 systemd[1]: Finished systemd-random-seed.service. Nov 1 00:39:27.871655 systemd[1]: Reached target first-boot-complete.target. Nov 1 00:39:27.873552 systemd-journald[1420]: Time spent on flushing to /var/log/journal/ec255d77fe328f7d3105177cd0600713 is 58.522ms for 1225 entries. Nov 1 00:39:27.873552 systemd-journald[1420]: System Journal (/var/log/journal/ec255d77fe328f7d3105177cd0600713) is 8.0M, max 195.6M, 187.6M free. Nov 1 00:39:27.967015 systemd-journald[1420]: Received client request to flush runtime journal. Nov 1 00:39:27.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:27.922044 systemd[1]: Finished systemd-sysctl.service. Nov 1 00:39:27.968522 udevadm[1451]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Nov 1 00:39:27.930020 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 00:39:27.932553 systemd[1]: Starting systemd-udev-settle.service... Nov 1 00:39:27.968479 systemd[1]: Finished systemd-journal-flush.service. Nov 1 00:39:27.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:28.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:28.020325 systemd[1]: Finished systemd-sysusers.service. Nov 1 00:39:28.591073 systemd[1]: Finished systemd-hwdb-update.service. Nov 1 00:39:28.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:28.591000 audit: BPF prog-id=21 op=LOAD Nov 1 00:39:28.591000 audit: BPF prog-id=22 op=LOAD Nov 1 00:39:28.591000 audit: BPF prog-id=7 op=UNLOAD Nov 1 00:39:28.591000 audit: BPF prog-id=8 op=UNLOAD Nov 1 00:39:28.593272 systemd[1]: Starting systemd-udevd.service... Nov 1 00:39:28.613806 systemd-udevd[1453]: Using default interface naming scheme 'v252'. Nov 1 00:39:28.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:28.695000 audit: BPF prog-id=23 op=LOAD Nov 1 00:39:28.694772 systemd[1]: Started systemd-udevd.service. Nov 1 00:39:28.697664 systemd[1]: Starting systemd-networkd.service... Nov 1 00:39:28.717000 audit: BPF prog-id=24 op=LOAD Nov 1 00:39:28.717000 audit: BPF prog-id=25 op=LOAD Nov 1 00:39:28.717000 audit: BPF prog-id=26 op=LOAD Nov 1 00:39:28.718847 systemd[1]: Starting systemd-userdbd.service... Nov 1 00:39:28.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:28.762064 systemd[1]: Started systemd-userdbd.service. Nov 1 00:39:28.770908 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Nov 1 00:39:28.799794 (udev-worker)[1464]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:39:28.857858 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Nov 1 00:39:28.864414 kernel: ACPI: button: Power Button [PWRF] Nov 1 00:39:28.870181 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Nov 1 00:39:28.881000 audit[1467]: AVC avc: denied { confidentiality } for pid=1467 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Nov 1 00:39:28.881000 audit[1467]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5577f727a880 a1=338ec a2=7fa39782dbc5 a3=5 items=110 ppid=1453 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:28.881000 audit: CWD cwd="/" Nov 1 00:39:28.881000 audit: PATH item=0 name=(null) inode=43 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=1 name=(null) inode=15460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=2 name=(null) inode=15460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=3 name=(null) inode=15461 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=4 name=(null) inode=15460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=5 name=(null) inode=15462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=6 name=(null) inode=15460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=7 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=8 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=9 name=(null) inode=15464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=10 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=11 name=(null) inode=15465 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=12 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=13 name=(null) inode=15466 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=14 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=15 name=(null) inode=15467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=16 name=(null) inode=15463 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=17 name=(null) inode=15468 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=18 name=(null) inode=15460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=19 name=(null) inode=15469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=20 name=(null) inode=15469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=21 name=(null) inode=15470 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=22 name=(null) inode=15469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=23 name=(null) inode=15471 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=24 name=(null) inode=15469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=25 name=(null) inode=15472 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=26 name=(null) inode=15469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=27 name=(null) inode=15473 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=28 name=(null) inode=15469 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=29 name=(null) inode=15474 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=30 name=(null) inode=15460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=31 name=(null) inode=15475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=32 name=(null) inode=15475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=33 name=(null) inode=15476 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=34 name=(null) inode=15475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=35 name=(null) inode=15477 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=36 name=(null) inode=15475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=37 name=(null) inode=15478 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=38 name=(null) inode=15475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=39 name=(null) inode=15479 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=40 name=(null) inode=15475 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=41 name=(null) inode=15480 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=42 name=(null) inode=15460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=43 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=44 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=45 name=(null) inode=15482 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=46 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=47 name=(null) inode=15483 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=48 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=49 name=(null) inode=15484 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=50 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=51 name=(null) inode=15485 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=52 name=(null) inode=15481 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=53 name=(null) inode=15486 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=54 name=(null) inode=43 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=55 name=(null) inode=15487 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=56 name=(null) inode=15487 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=57 name=(null) inode=15488 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=58 name=(null) inode=15487 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=59 name=(null) inode=15489 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=60 name=(null) inode=15487 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=61 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=62 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=63 name=(null) inode=15491 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=64 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=65 name=(null) inode=15492 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=66 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=67 name=(null) inode=15493 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=68 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=69 name=(null) inode=15494 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=70 name=(null) inode=15490 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=71 name=(null) inode=15495 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=72 name=(null) inode=15487 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=73 name=(null) inode=15496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=74 name=(null) inode=15496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.909973 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Nov 1 00:39:28.973501 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:39:28.973544 kernel: ACPI: button: Sleep Button [SLPF] Nov 1 00:39:28.973573 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 Nov 1 00:39:28.881000 audit: PATH item=75 name=(null) inode=15497 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=76 name=(null) inode=15496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=77 name=(null) inode=15498 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=78 name=(null) inode=15496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=79 name=(null) inode=15499 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=80 name=(null) inode=15496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=81 name=(null) inode=15500 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=82 name=(null) inode=15496 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=83 name=(null) inode=15501 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=84 name=(null) inode=15487 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=85 name=(null) inode=15502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=86 name=(null) inode=15502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=87 name=(null) inode=15503 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=88 name=(null) inode=15502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=89 name=(null) inode=15504 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=90 name=(null) inode=15502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=91 name=(null) inode=15505 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=92 name=(null) inode=15502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=93 name=(null) inode=15506 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=94 name=(null) inode=15502 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=95 name=(null) inode=15507 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=96 name=(null) inode=15487 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=97 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=98 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=99 name=(null) inode=15509 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=100 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=101 name=(null) inode=15510 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=102 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=103 name=(null) inode=15511 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=104 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=105 name=(null) inode=15512 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=106 name=(null) inode=15508 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=107 name=(null) inode=15513 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PATH item=109 name=(null) inode=15514 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:39:28.881000 audit: PROCTITLE proctitle="(udev-worker)" Nov 1 00:39:28.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:28.904046 systemd-networkd[1461]: lo: Link UP Nov 1 00:39:28.904059 systemd-networkd[1461]: lo: Gained carrier Nov 1 00:39:28.909609 systemd-networkd[1461]: Enumeration completed Nov 1 00:39:28.909790 systemd[1]: Started systemd-networkd.service. Nov 1 00:39:28.909811 systemd-networkd[1461]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 00:39:28.912671 systemd[1]: Starting systemd-networkd-wait-online.service... Nov 1 00:39:28.913535 systemd-networkd[1461]: eth0: Link UP Nov 1 00:39:28.913725 systemd-networkd[1461]: eth0: Gained carrier Nov 1 00:39:28.925126 systemd-networkd[1461]: eth0: DHCPv4 address 172.31.19.190/20, gateway 172.31.16.1 acquired from 172.31.16.1 Nov 1 00:39:29.009855 kernel: mousedev: PS/2 mouse device common for all mice Nov 1 00:39:29.081072 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 00:39:29.085409 systemd[1]: Finished systemd-udev-settle.service. Nov 1 00:39:29.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.087752 systemd[1]: Starting lvm2-activation-early.service... Nov 1 00:39:29.162644 lvm[1567]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:39:29.189956 systemd[1]: Finished lvm2-activation-early.service. Nov 1 00:39:29.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.190973 systemd[1]: Reached target cryptsetup.target. Nov 1 00:39:29.193106 systemd[1]: Starting lvm2-activation.service... Nov 1 00:39:29.198502 lvm[1568]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 00:39:29.227009 systemd[1]: Finished lvm2-activation.service. Nov 1 00:39:29.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.227816 systemd[1]: Reached target local-fs-pre.target. Nov 1 00:39:29.228436 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Nov 1 00:39:29.228477 systemd[1]: Reached target local-fs.target. Nov 1 00:39:29.229075 systemd[1]: Reached target machines.target. Nov 1 00:39:29.231255 systemd[1]: Starting ldconfig.service... Nov 1 00:39:29.233179 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:39:29.233250 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:39:29.235150 systemd[1]: Starting systemd-boot-update.service... Nov 1 00:39:29.237723 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Nov 1 00:39:29.241018 systemd[1]: Starting systemd-machine-id-commit.service... Nov 1 00:39:29.245179 systemd[1]: Starting systemd-sysext.service... Nov 1 00:39:29.252059 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1570 (bootctl) Nov 1 00:39:29.254177 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Nov 1 00:39:29.280410 systemd[1]: Unmounting usr-share-oem.mount... Nov 1 00:39:29.290191 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Nov 1 00:39:29.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.292230 systemd[1]: usr-share-oem.mount: Deactivated successfully. Nov 1 00:39:29.292458 systemd[1]: Unmounted usr-share-oem.mount. Nov 1 00:39:29.310971 kernel: loop0: detected capacity change from 0 to 229808 Nov 1 00:39:29.697950 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Nov 1 00:39:29.727861 kernel: loop1: detected capacity change from 0 to 229808 Nov 1 00:39:29.735485 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Nov 1 00:39:29.736413 systemd[1]: Finished systemd-machine-id-commit.service. Nov 1 00:39:29.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.765487 (sd-sysext)[1582]: Using extensions 'kubernetes'. Nov 1 00:39:29.766067 (sd-sysext)[1582]: Merged extensions into '/usr'. Nov 1 00:39:29.780592 systemd-fsck[1579]: fsck.fat 4.2 (2021-01-31) Nov 1 00:39:29.780592 systemd-fsck[1579]: /dev/nvme0n1p1: 790 files, 120773/258078 clusters Nov 1 00:39:29.792174 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Nov 1 00:39:29.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.795197 systemd[1]: Mounting boot.mount... Nov 1 00:39:29.796172 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:39:29.803068 systemd[1]: Mounting usr-share-oem.mount... Nov 1 00:39:29.804186 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:39:29.806363 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:39:29.810737 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:39:29.814666 systemd[1]: Starting modprobe@loop.service... Nov 1 00:39:29.816998 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:39:29.817218 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:39:29.817391 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:39:29.824919 systemd[1]: Mounted usr-share-oem.mount. Nov 1 00:39:29.826601 systemd[1]: Mounted boot.mount. Nov 1 00:39:29.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.828194 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:39:29.828413 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:39:29.830725 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:39:29.831020 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:39:29.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.834750 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:39:29.834968 systemd[1]: Finished modprobe@loop.service. Nov 1 00:39:29.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.842150 systemd[1]: Finished systemd-sysext.service. Nov 1 00:39:29.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:29.846282 systemd[1]: Starting ensure-sysext.service... Nov 1 00:39:29.847231 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:39:29.847312 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:39:29.848986 systemd[1]: Starting systemd-tmpfiles-setup.service... Nov 1 00:39:29.863557 systemd[1]: Reloading. Nov 1 00:39:29.907186 systemd-tmpfiles[1601]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Nov 1 00:39:29.958779 /usr/lib/systemd/system-generators/torcx-generator[1620]: time="2025-11-01T00:39:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:39:29.958838 /usr/lib/systemd/system-generators/torcx-generator[1620]: time="2025-11-01T00:39:29Z" level=info msg="torcx already run" Nov 1 00:39:29.974791 systemd-tmpfiles[1601]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Nov 1 00:39:30.024053 systemd-tmpfiles[1601]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Nov 1 00:39:30.079507 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:39:30.079533 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:39:30.103155 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:39:30.110013 systemd-networkd[1461]: eth0: Gained IPv6LL Nov 1 00:39:30.186000 audit: BPF prog-id=27 op=LOAD Nov 1 00:39:30.186000 audit: BPF prog-id=18 op=UNLOAD Nov 1 00:39:30.186000 audit: BPF prog-id=28 op=LOAD Nov 1 00:39:30.186000 audit: BPF prog-id=29 op=LOAD Nov 1 00:39:30.186000 audit: BPF prog-id=19 op=UNLOAD Nov 1 00:39:30.186000 audit: BPF prog-id=20 op=UNLOAD Nov 1 00:39:30.193000 audit: BPF prog-id=30 op=LOAD Nov 1 00:39:30.193000 audit: BPF prog-id=31 op=LOAD Nov 1 00:39:30.193000 audit: BPF prog-id=21 op=UNLOAD Nov 1 00:39:30.193000 audit: BPF prog-id=22 op=UNLOAD Nov 1 00:39:30.196000 audit: BPF prog-id=32 op=LOAD Nov 1 00:39:30.196000 audit: BPF prog-id=23 op=UNLOAD Nov 1 00:39:30.197000 audit: BPF prog-id=33 op=LOAD Nov 1 00:39:30.197000 audit: BPF prog-id=24 op=UNLOAD Nov 1 00:39:30.197000 audit: BPF prog-id=34 op=LOAD Nov 1 00:39:30.197000 audit: BPF prog-id=35 op=LOAD Nov 1 00:39:30.197000 audit: BPF prog-id=25 op=UNLOAD Nov 1 00:39:30.197000 audit: BPF prog-id=26 op=UNLOAD Nov 1 00:39:30.204738 systemd[1]: Finished systemd-networkd-wait-online.service. Nov 1 00:39:30.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.206082 systemd[1]: Finished systemd-boot-update.service. Nov 1 00:39:30.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.220925 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:39:30.221386 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:39:30.224016 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:39:30.228056 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:39:30.231432 systemd[1]: Starting modprobe@loop.service... Nov 1 00:39:30.232303 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:39:30.232523 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:39:30.232722 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:39:30.234119 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:39:30.234554 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:39:30.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.236030 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:39:30.236203 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:39:30.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.237476 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:39:30.237672 systemd[1]: Finished modprobe@loop.service. Nov 1 00:39:30.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.238782 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:39:30.239309 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:39:30.241627 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:39:30.242075 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:39:30.244161 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:39:30.247358 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:39:30.250655 systemd[1]: Starting modprobe@loop.service... Nov 1 00:39:30.251487 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:39:30.251781 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:39:30.252083 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:39:30.253907 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:39:30.254118 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:39:30.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.255469 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:39:30.255651 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:39:30.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.257119 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:39:30.257312 systemd[1]: Finished modprobe@loop.service. Nov 1 00:39:30.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.262685 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:39:30.263240 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 00:39:30.265757 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 00:39:30.268569 systemd[1]: Starting modprobe@drm.service... Nov 1 00:39:30.271811 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 00:39:30.276584 systemd[1]: Starting modprobe@loop.service... Nov 1 00:39:30.277391 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 00:39:30.277588 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:39:30.277926 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 00:39:30.279548 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 00:39:30.279737 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 00:39:30.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.281279 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 00:39:30.281462 systemd[1]: Finished modprobe@drm.service. Nov 1 00:39:30.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.282678 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 00:39:30.282856 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 00:39:30.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.284276 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 00:39:30.284436 systemd[1]: Finished modprobe@loop.service. Nov 1 00:39:30.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.287015 systemd[1]: Finished ensure-sysext.service. Nov 1 00:39:30.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.289048 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 00:39:30.289109 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 00:39:30.433557 systemd[1]: Finished systemd-tmpfiles-setup.service. Nov 1 00:39:30.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.437218 systemd[1]: Starting audit-rules.service... Nov 1 00:39:30.439544 systemd[1]: Starting clean-ca-certificates.service... Nov 1 00:39:30.444000 audit: BPF prog-id=36 op=LOAD Nov 1 00:39:30.443179 systemd[1]: Starting systemd-journal-catalog-update.service... Nov 1 00:39:30.449000 audit: BPF prog-id=37 op=LOAD Nov 1 00:39:30.448078 systemd[1]: Starting systemd-resolved.service... Nov 1 00:39:30.452811 systemd[1]: Starting systemd-timesyncd.service... Nov 1 00:39:30.457053 systemd[1]: Starting systemd-update-utmp.service... Nov 1 00:39:30.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.474010 systemd[1]: Finished clean-ca-certificates.service. Nov 1 00:39:30.474798 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 00:39:30.474000 audit[1692]: SYSTEM_BOOT pid=1692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.481941 systemd[1]: Finished systemd-update-utmp.service. Nov 1 00:39:30.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:30.547466 systemd[1]: Finished systemd-journal-catalog-update.service. Nov 1 00:39:30.589000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Nov 1 00:39:30.589000 audit[1707]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd10451a20 a2=420 a3=0 items=0 ppid=1687 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:30.589000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Nov 1 00:39:30.590625 augenrules[1707]: No rules Nov 1 00:39:30.591138 systemd[1]: Started systemd-timesyncd.service. Nov 1 00:39:30.592160 systemd[1]: Finished audit-rules.service. Nov 1 00:39:30.592734 systemd[1]: Reached target time-set.target. Nov 1 00:39:30.602925 systemd-resolved[1690]: Positive Trust Anchors: Nov 1 00:39:30.603305 systemd-resolved[1690]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 00:39:30.603403 systemd-resolved[1690]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 00:39:30.642062 systemd-resolved[1690]: Defaulting to hostname 'linux'. Nov 1 00:39:30.644166 systemd[1]: Started systemd-resolved.service. Nov 1 00:39:30.644631 systemd[1]: Reached target network.target. Nov 1 00:39:30.645039 systemd[1]: Reached target network-online.target. Nov 1 00:39:30.645426 systemd[1]: Reached target nss-lookup.target. Nov 1 00:39:31.504470 systemd-resolved[1690]: Clock change detected. Flushing caches. Nov 1 00:39:31.505241 systemd-timesyncd[1691]: Contacted time server 23.150.40.242:123 (0.flatcar.pool.ntp.org). Nov 1 00:39:31.505729 systemd-timesyncd[1691]: Initial clock synchronization to Sat 2025-11-01 00:39:31.504359 UTC. Nov 1 00:39:31.565968 ldconfig[1569]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Nov 1 00:39:31.572819 systemd[1]: Finished ldconfig.service. Nov 1 00:39:31.574882 systemd[1]: Starting systemd-update-done.service... Nov 1 00:39:31.583767 systemd[1]: Finished systemd-update-done.service. Nov 1 00:39:31.584443 systemd[1]: Reached target sysinit.target. Nov 1 00:39:31.584962 systemd[1]: Started motdgen.path. Nov 1 00:39:31.585432 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Nov 1 00:39:31.586021 systemd[1]: Started logrotate.timer. Nov 1 00:39:31.586490 systemd[1]: Started mdadm.timer. Nov 1 00:39:31.586861 systemd[1]: Started systemd-tmpfiles-clean.timer. Nov 1 00:39:31.587295 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Nov 1 00:39:31.587354 systemd[1]: Reached target paths.target. Nov 1 00:39:31.587729 systemd[1]: Reached target timers.target. Nov 1 00:39:31.588622 systemd[1]: Listening on dbus.socket. Nov 1 00:39:31.590347 systemd[1]: Starting docker.socket... Nov 1 00:39:31.595324 systemd[1]: Listening on sshd.socket. Nov 1 00:39:31.596208 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:39:31.596825 systemd[1]: Listening on docker.socket. Nov 1 00:39:31.597398 systemd[1]: Reached target sockets.target. Nov 1 00:39:31.597810 systemd[1]: Reached target basic.target. Nov 1 00:39:31.598379 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:39:31.598419 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 00:39:31.600068 systemd[1]: Started amazon-ssm-agent.service. Nov 1 00:39:31.602282 systemd[1]: Starting containerd.service... Nov 1 00:39:31.604581 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Nov 1 00:39:31.608273 systemd[1]: Starting dbus.service... Nov 1 00:39:31.611165 systemd[1]: Starting enable-oem-cloudinit.service... Nov 1 00:39:31.614058 systemd[1]: Starting extend-filesystems.service... Nov 1 00:39:31.614745 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Nov 1 00:39:31.617275 systemd[1]: Starting kubelet.service... Nov 1 00:39:31.619719 systemd[1]: Starting motdgen.service... Nov 1 00:39:31.623014 systemd[1]: Started nvidia.service. Nov 1 00:39:31.628628 systemd[1]: Starting prepare-helm.service... Nov 1 00:39:31.631235 systemd[1]: Starting ssh-key-proc-cmdline.service... Nov 1 00:39:31.640255 systemd[1]: Starting sshd-keygen.service... Nov 1 00:39:31.648255 systemd[1]: Starting systemd-logind.service... Nov 1 00:39:31.648965 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 00:39:31.649130 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Nov 1 00:39:31.657163 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Nov 1 00:39:31.658379 systemd[1]: Starting update-engine.service... Nov 1 00:39:31.660738 systemd[1]: Starting update-ssh-keys-after-ignition.service... Nov 1 00:39:31.712215 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Nov 1 00:39:31.712449 systemd[1]: Finished ssh-key-proc-cmdline.service. Nov 1 00:39:31.787386 jq[1720]: false Nov 1 00:39:31.740169 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Nov 1 00:39:31.787741 jq[1733]: true Nov 1 00:39:31.797922 jq[1742]: true Nov 1 00:39:31.740396 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Nov 1 00:39:31.804511 tar[1736]: linux-amd64/LICENSE Nov 1 00:39:31.804511 tar[1736]: linux-amd64/helm Nov 1 00:39:31.834313 extend-filesystems[1721]: Found loop1 Nov 1 00:39:31.851813 extend-filesystems[1721]: Found nvme0n1 Nov 1 00:39:31.872171 extend-filesystems[1721]: Found nvme0n1p1 Nov 1 00:39:31.874961 extend-filesystems[1721]: Found nvme0n1p2 Nov 1 00:39:31.875893 systemd[1]: motdgen.service: Deactivated successfully. Nov 1 00:39:31.876172 systemd[1]: Finished motdgen.service. Nov 1 00:39:31.877924 extend-filesystems[1721]: Found nvme0n1p3 Nov 1 00:39:31.877924 extend-filesystems[1721]: Found usr Nov 1 00:39:31.880016 extend-filesystems[1721]: Found nvme0n1p4 Nov 1 00:39:31.880016 extend-filesystems[1721]: Found nvme0n1p6 Nov 1 00:39:31.880016 extend-filesystems[1721]: Found nvme0n1p7 Nov 1 00:39:31.880016 extend-filesystems[1721]: Found nvme0n1p9 Nov 1 00:39:31.880016 extend-filesystems[1721]: Checking size of /dev/nvme0n1p9 Nov 1 00:39:31.910998 systemd[1]: Started dbus.service. Nov 1 00:39:31.910737 dbus-daemon[1719]: [system] SELinux support is enabled Nov 1 00:39:31.914738 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Nov 1 00:39:31.926219 dbus-daemon[1719]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1461 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Nov 1 00:39:31.914776 systemd[1]: Reached target system-config.target. Nov 1 00:39:31.915494 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Nov 1 00:39:31.915524 systemd[1]: Reached target user-config.target. Nov 1 00:39:31.960995 extend-filesystems[1721]: Resized partition /dev/nvme0n1p9 Nov 1 00:39:31.966036 amazon-ssm-agent[1716]: 2025/11/01 00:39:31 Failed to load instance info from vault. RegistrationKey does not exist. Nov 1 00:39:31.966036 amazon-ssm-agent[1716]: Initializing new seelog logger Nov 1 00:39:31.966036 amazon-ssm-agent[1716]: New Seelog Logger Creation Complete Nov 1 00:39:31.966036 amazon-ssm-agent[1716]: 2025/11/01 00:39:31 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Nov 1 00:39:31.966036 amazon-ssm-agent[1716]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Nov 1 00:39:31.966036 amazon-ssm-agent[1716]: 2025/11/01 00:39:31 processing appconfig overrides Nov 1 00:39:31.938206 systemd[1]: Starting systemd-hostnamed.service... Nov 1 00:39:31.986257 extend-filesystems[1775]: resize2fs 1.46.5 (30-Dec-2021) Nov 1 00:39:31.997998 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 3587067 blocks Nov 1 00:39:32.030518 update_engine[1732]: I1101 00:39:32.029839 1732 main.cc:92] Flatcar Update Engine starting Nov 1 00:39:32.036446 systemd[1]: Started update-engine.service. Nov 1 00:39:32.039748 systemd[1]: Started locksmithd.service. Nov 1 00:39:32.041902 update_engine[1732]: I1101 00:39:32.041862 1732 update_check_scheduler.cc:74] Next update check in 4m11s Nov 1 00:39:32.088540 env[1737]: time="2025-11-01T00:39:32.088474355Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Nov 1 00:39:32.112235 bash[1790]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:39:32.113143 systemd[1]: Finished update-ssh-keys-after-ignition.service. Nov 1 00:39:32.130995 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 3587067 Nov 1 00:39:32.150329 extend-filesystems[1775]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Nov 1 00:39:32.150329 extend-filesystems[1775]: old_desc_blocks = 1, new_desc_blocks = 2 Nov 1 00:39:32.150329 extend-filesystems[1775]: The filesystem on /dev/nvme0n1p9 is now 3587067 (4k) blocks long. Nov 1 00:39:32.149124 systemd[1]: extend-filesystems.service: Deactivated successfully. Nov 1 00:39:32.179901 extend-filesystems[1721]: Resized filesystem in /dev/nvme0n1p9 Nov 1 00:39:32.149354 systemd[1]: Finished extend-filesystems.service. Nov 1 00:39:32.150201 systemd-logind[1728]: Watching system buttons on /dev/input/event1 (Power Button) Nov 1 00:39:32.150226 systemd-logind[1728]: Watching system buttons on /dev/input/event2 (Sleep Button) Nov 1 00:39:32.150251 systemd-logind[1728]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Nov 1 00:39:32.155516 systemd-logind[1728]: New seat seat0. Nov 1 00:39:32.180641 systemd[1]: Started systemd-logind.service. Nov 1 00:39:32.311207 env[1737]: time="2025-11-01T00:39:32.311111566Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Nov 1 00:39:32.316229 env[1737]: time="2025-11-01T00:39:32.316179668Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:39:32.322229 dbus-daemon[1719]: [system] Successfully activated service 'org.freedesktop.hostname1' Nov 1 00:39:32.322420 systemd[1]: Started systemd-hostnamed.service. Nov 1 00:39:32.324696 dbus-daemon[1719]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1776 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Nov 1 00:39:32.328263 env[1737]: time="2025-11-01T00:39:32.328210484Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:39:32.328453 env[1737]: time="2025-11-01T00:39:32.328430547Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:39:32.328838 systemd[1]: Starting polkit.service... Nov 1 00:39:32.331026 env[1737]: time="2025-11-01T00:39:32.330962028Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:39:32.331148 env[1737]: time="2025-11-01T00:39:32.331126400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Nov 1 00:39:32.331306 env[1737]: time="2025-11-01T00:39:32.331283922Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Nov 1 00:39:32.331431 env[1737]: time="2025-11-01T00:39:32.331413425Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Nov 1 00:39:32.331748 env[1737]: time="2025-11-01T00:39:32.331728182Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:39:32.332335 env[1737]: time="2025-11-01T00:39:32.332313012Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Nov 1 00:39:32.332681 env[1737]: time="2025-11-01T00:39:32.332654436Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 00:39:32.334501 env[1737]: time="2025-11-01T00:39:32.334468990Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Nov 1 00:39:32.334695 env[1737]: time="2025-11-01T00:39:32.334673510Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Nov 1 00:39:32.334794 env[1737]: time="2025-11-01T00:39:32.334780316Z" level=info msg="metadata content store policy set" policy=shared Nov 1 00:39:32.340727 env[1737]: time="2025-11-01T00:39:32.340619012Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Nov 1 00:39:32.340727 env[1737]: time="2025-11-01T00:39:32.340679639Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Nov 1 00:39:32.340727 env[1737]: time="2025-11-01T00:39:32.340702392Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Nov 1 00:39:32.340983 env[1737]: time="2025-11-01T00:39:32.340767759Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Nov 1 00:39:32.340983 env[1737]: time="2025-11-01T00:39:32.340786459Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Nov 1 00:39:32.340983 env[1737]: time="2025-11-01T00:39:32.340858861Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Nov 1 00:39:32.340983 env[1737]: time="2025-11-01T00:39:32.340878864Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Nov 1 00:39:32.340983 env[1737]: time="2025-11-01T00:39:32.340902719Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Nov 1 00:39:32.340983 env[1737]: time="2025-11-01T00:39:32.340923009Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Nov 1 00:39:32.340983 env[1737]: time="2025-11-01T00:39:32.340942450Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Nov 1 00:39:32.341229 env[1737]: time="2025-11-01T00:39:32.340984616Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Nov 1 00:39:32.341229 env[1737]: time="2025-11-01T00:39:32.341003955Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Nov 1 00:39:32.341229 env[1737]: time="2025-11-01T00:39:32.341163181Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Nov 1 00:39:32.341342 env[1737]: time="2025-11-01T00:39:32.341264741Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Nov 1 00:39:32.341779 env[1737]: time="2025-11-01T00:39:32.341750487Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Nov 1 00:39:32.341866 env[1737]: time="2025-11-01T00:39:32.341799172Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.341866 env[1737]: time="2025-11-01T00:39:32.341820736Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Nov 1 00:39:32.341948 env[1737]: time="2025-11-01T00:39:32.341896697Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.341948 env[1737]: time="2025-11-01T00:39:32.341918376Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.342055 env[1737]: time="2025-11-01T00:39:32.342016338Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.342055 env[1737]: time="2025-11-01T00:39:32.342039195Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.342138 env[1737]: time="2025-11-01T00:39:32.342059709Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.342138 env[1737]: time="2025-11-01T00:39:32.342081807Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.342138 env[1737]: time="2025-11-01T00:39:32.342100852Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.342138 env[1737]: time="2025-11-01T00:39:32.342120579Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.342282 env[1737]: time="2025-11-01T00:39:32.342142112Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Nov 1 00:39:32.342361 env[1737]: time="2025-11-01T00:39:32.342339932Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.342409 env[1737]: time="2025-11-01T00:39:32.342369137Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.342409 env[1737]: time="2025-11-01T00:39:32.342390665Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.342486 env[1737]: time="2025-11-01T00:39:32.342415577Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Nov 1 00:39:32.342486 env[1737]: time="2025-11-01T00:39:32.342440151Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Nov 1 00:39:32.342486 env[1737]: time="2025-11-01T00:39:32.342458874Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Nov 1 00:39:32.342600 env[1737]: time="2025-11-01T00:39:32.342487141Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Nov 1 00:39:32.342600 env[1737]: time="2025-11-01T00:39:32.342534785Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Nov 1 00:39:32.342899 env[1737]: time="2025-11-01T00:39:32.342826348Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Nov 1 00:39:32.346364 env[1737]: time="2025-11-01T00:39:32.342919682Z" level=info msg="Connect containerd service" Nov 1 00:39:32.346364 env[1737]: time="2025-11-01T00:39:32.342983350Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Nov 1 00:39:32.346364 env[1737]: time="2025-11-01T00:39:32.343952342Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 00:39:32.346364 env[1737]: time="2025-11-01T00:39:32.344633468Z" level=info msg="Start subscribing containerd event" Nov 1 00:39:32.346364 env[1737]: time="2025-11-01T00:39:32.344965916Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Nov 1 00:39:32.346364 env[1737]: time="2025-11-01T00:39:32.345043942Z" level=info msg=serving... address=/run/containerd/containerd.sock Nov 1 00:39:32.345229 systemd[1]: Started containerd.service. Nov 1 00:39:32.347108 env[1737]: time="2025-11-01T00:39:32.347081854Z" level=info msg="containerd successfully booted in 0.264749s" Nov 1 00:39:32.359961 polkitd[1818]: Started polkitd version 121 Nov 1 00:39:32.362505 systemd[1]: nvidia.service: Deactivated successfully. Nov 1 00:39:32.391462 polkitd[1818]: Loading rules from directory /etc/polkit-1/rules.d Nov 1 00:39:32.391550 polkitd[1818]: Loading rules from directory /usr/share/polkit-1/rules.d Nov 1 00:39:32.393797 polkitd[1818]: Finished loading, compiling and executing 2 rules Nov 1 00:39:32.394435 dbus-daemon[1719]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Nov 1 00:39:32.394661 systemd[1]: Started polkit.service. Nov 1 00:39:32.395363 polkitd[1818]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Nov 1 00:39:32.400221 env[1737]: time="2025-11-01T00:39:32.399723286Z" level=info msg="Start recovering state" Nov 1 00:39:32.400221 env[1737]: time="2025-11-01T00:39:32.399882682Z" level=info msg="Start event monitor" Nov 1 00:39:32.400221 env[1737]: time="2025-11-01T00:39:32.399913839Z" level=info msg="Start snapshots syncer" Nov 1 00:39:32.400221 env[1737]: time="2025-11-01T00:39:32.399936112Z" level=info msg="Start cni network conf syncer for default" Nov 1 00:39:32.400221 env[1737]: time="2025-11-01T00:39:32.399949435Z" level=info msg="Start streaming server" Nov 1 00:39:32.411751 systemd-hostnamed[1776]: Hostname set to (transient) Nov 1 00:39:32.411895 systemd-resolved[1690]: System hostname changed to 'ip-172-31-19-190'. Nov 1 00:39:32.778309 coreos-metadata[1718]: Nov 01 00:39:32.778 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Nov 1 00:39:32.798001 coreos-metadata[1718]: Nov 01 00:39:32.797 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Nov 1 00:39:32.800173 coreos-metadata[1718]: Nov 01 00:39:32.800 INFO Fetch successful Nov 1 00:39:32.800311 coreos-metadata[1718]: Nov 01 00:39:32.800 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Nov 1 00:39:32.802686 coreos-metadata[1718]: Nov 01 00:39:32.802 INFO Fetch successful Nov 1 00:39:32.805601 unknown[1718]: wrote ssh authorized keys file for user: core Nov 1 00:39:32.833823 update-ssh-keys[1899]: Updated "/home/core/.ssh/authorized_keys" Nov 1 00:39:32.834197 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Nov 1 00:39:32.879824 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO Create new startup processor Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [LongRunningPluginsManager] registered plugins: {} Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO Initializing bookkeeping folders Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO removing the completed state files Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO Initializing bookkeeping folders for long running plugins Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO Initializing healthcheck folders for long running plugins Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO Initializing locations for inventory plugin Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO Initializing default location for custom inventory Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO Initializing default location for file inventory Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO Initializing default location for role inventory Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO Init the cloudwatchlogs publisher Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [instanceID=i-0f83a14ecf6a59278] Successfully loaded platform independent plugin aws:runDockerAction Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [instanceID=i-0f83a14ecf6a59278] Successfully loaded platform independent plugin aws:downloadContent Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [instanceID=i-0f83a14ecf6a59278] Successfully loaded platform independent plugin aws:softwareInventory Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [instanceID=i-0f83a14ecf6a59278] Successfully loaded platform independent plugin aws:runPowerShellScript Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [instanceID=i-0f83a14ecf6a59278] Successfully loaded platform independent plugin aws:updateSsmAgent Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [instanceID=i-0f83a14ecf6a59278] Successfully loaded platform independent plugin aws:configureDocker Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [instanceID=i-0f83a14ecf6a59278] Successfully loaded platform independent plugin aws:refreshAssociation Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [instanceID=i-0f83a14ecf6a59278] Successfully loaded platform independent plugin aws:configurePackage Nov 1 00:39:32.881087 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [instanceID=i-0f83a14ecf6a59278] Successfully loaded platform independent plugin aws:runDocument Nov 1 00:39:32.881882 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [instanceID=i-0f83a14ecf6a59278] Successfully loaded platform dependent plugin aws:runShellScript Nov 1 00:39:32.881882 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Nov 1 00:39:32.881882 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO OS: linux, Arch: amd64 Nov 1 00:39:32.881882 amazon-ssm-agent[1716]: datastore file /var/lib/amazon/ssm/i-0f83a14ecf6a59278/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Nov 1 00:39:32.886922 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessagingDeliveryService] Starting document processing engine... Nov 1 00:39:32.983227 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessagingDeliveryService] [EngineProcessor] Starting Nov 1 00:39:33.077677 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Nov 1 00:39:33.172154 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessagingDeliveryService] Starting message polling Nov 1 00:39:33.223180 tar[1736]: linux-amd64/README.md Nov 1 00:39:33.231623 systemd[1]: Finished prepare-helm.service. Nov 1 00:39:33.266831 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessagingDeliveryService] Starting send replies to MDS Nov 1 00:39:33.361779 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [instanceID=i-0f83a14ecf6a59278] Starting association polling Nov 1 00:39:33.457314 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Nov 1 00:39:33.474936 locksmithd[1797]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Nov 1 00:39:33.552253 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessagingDeliveryService] [Association] Launching response handler Nov 1 00:39:33.648169 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Nov 1 00:39:33.744901 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Nov 1 00:39:33.840825 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Nov 1 00:39:33.937426 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessageGatewayService] Starting session document processing engine... Nov 1 00:39:34.033910 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessageGatewayService] [EngineProcessor] Starting Nov 1 00:39:34.118515 sshd_keygen[1757]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Nov 1 00:39:34.130495 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Nov 1 00:39:34.152804 systemd[1]: Finished sshd-keygen.service. Nov 1 00:39:34.156017 systemd[1]: Starting issuegen.service... Nov 1 00:39:34.164835 systemd[1]: issuegen.service: Deactivated successfully. Nov 1 00:39:34.165101 systemd[1]: Finished issuegen.service. Nov 1 00:39:34.167720 systemd[1]: Starting systemd-user-sessions.service... Nov 1 00:39:34.178502 systemd[1]: Finished systemd-user-sessions.service. Nov 1 00:39:34.181555 systemd[1]: Started getty@tty1.service. Nov 1 00:39:34.184959 systemd[1]: Started serial-getty@ttyS0.service. Nov 1 00:39:34.186302 systemd[1]: Reached target getty.target. Nov 1 00:39:34.227677 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0f83a14ecf6a59278, requestId: 9334dcb2-46c6-4d4b-8259-ff7b7118acdf Nov 1 00:39:34.324603 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [OfflineService] Starting document processing engine... Nov 1 00:39:34.421601 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [OfflineService] [EngineProcessor] Starting Nov 1 00:39:34.495288 systemd[1]: Started kubelet.service. Nov 1 00:39:34.496827 systemd[1]: Reached target multi-user.target. Nov 1 00:39:34.499271 systemd[1]: Starting systemd-update-utmp-runlevel.service... Nov 1 00:39:34.509893 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Nov 1 00:39:34.510111 systemd[1]: Finished systemd-update-utmp-runlevel.service. Nov 1 00:39:34.510887 systemd[1]: Startup finished in 711ms (kernel) + 6.855s (initrd) + 11.024s (userspace) = 18.591s. Nov 1 00:39:34.518815 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [OfflineService] [EngineProcessor] Initial processing Nov 1 00:39:34.616292 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [OfflineService] Starting message polling Nov 1 00:39:34.714105 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [OfflineService] Starting send replies to MDS Nov 1 00:39:34.812188 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [LongRunningPluginsManager] starting long running plugin manager Nov 1 00:39:34.910150 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Nov 1 00:39:35.008414 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [HealthCheck] HealthCheck reporting agent health. Nov 1 00:39:35.106871 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessageGatewayService] listening reply. Nov 1 00:39:35.205670 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Nov 1 00:39:35.304513 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [StartupProcessor] Executing startup processor tasks Nov 1 00:39:35.403625 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Nov 1 00:39:35.502852 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Nov 1 00:39:35.602209 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.8 Nov 1 00:39:35.681769 kubelet[1928]: E1101 00:39:35.681632 1928 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:39:35.684059 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:39:35.684318 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:39:35.684665 systemd[1]: kubelet.service: Consumed 1.252s CPU time. Nov 1 00:39:35.701895 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0f83a14ecf6a59278?role=subscribe&stream=input Nov 1 00:39:35.801787 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0f83a14ecf6a59278?role=subscribe&stream=input Nov 1 00:39:35.901797 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessageGatewayService] Starting receiving message from control channel Nov 1 00:39:36.002178 amazon-ssm-agent[1716]: 2025-11-01 00:39:32 INFO [MessageGatewayService] [EngineProcessor] Initial processing Nov 1 00:39:40.879181 systemd[1]: Created slice system-sshd.slice. Nov 1 00:39:40.881519 systemd[1]: Started sshd@0-172.31.19.190:22-147.75.109.163:34110.service. Nov 1 00:39:41.107274 sshd[1935]: Accepted publickey for core from 147.75.109.163 port 34110 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:39:41.110563 sshd[1935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:39:41.128922 systemd[1]: Created slice user-500.slice. Nov 1 00:39:41.130874 systemd[1]: Starting user-runtime-dir@500.service... Nov 1 00:39:41.134308 systemd-logind[1728]: New session 1 of user core. Nov 1 00:39:41.147154 systemd[1]: Finished user-runtime-dir@500.service. Nov 1 00:39:41.149797 systemd[1]: Starting user@500.service... Nov 1 00:39:41.154775 (systemd)[1938]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:39:41.285241 systemd[1938]: Queued start job for default target default.target. Nov 1 00:39:41.286049 systemd[1938]: Reached target paths.target. Nov 1 00:39:41.286080 systemd[1938]: Reached target sockets.target. Nov 1 00:39:41.286100 systemd[1938]: Reached target timers.target. Nov 1 00:39:41.286116 systemd[1938]: Reached target basic.target. Nov 1 00:39:41.286265 systemd[1]: Started user@500.service. Nov 1 00:39:41.287823 systemd[1]: Started session-1.scope. Nov 1 00:39:41.288712 systemd[1938]: Reached target default.target. Nov 1 00:39:41.288952 systemd[1938]: Startup finished in 125ms. Nov 1 00:39:41.441418 systemd[1]: Started sshd@1-172.31.19.190:22-147.75.109.163:34116.service. Nov 1 00:39:41.602241 sshd[1947]: Accepted publickey for core from 147.75.109.163 port 34116 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:39:41.603994 sshd[1947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:39:41.609652 systemd-logind[1728]: New session 2 of user core. Nov 1 00:39:41.610527 systemd[1]: Started session-2.scope. Nov 1 00:39:41.739085 sshd[1947]: pam_unix(sshd:session): session closed for user core Nov 1 00:39:41.744290 systemd[1]: sshd@1-172.31.19.190:22-147.75.109.163:34116.service: Deactivated successfully. Nov 1 00:39:41.745286 systemd[1]: session-2.scope: Deactivated successfully. Nov 1 00:39:41.746020 systemd-logind[1728]: Session 2 logged out. Waiting for processes to exit. Nov 1 00:39:41.747437 systemd-logind[1728]: Removed session 2. Nov 1 00:39:41.767114 systemd[1]: Started sshd@2-172.31.19.190:22-147.75.109.163:34120.service. Nov 1 00:39:41.937064 sshd[1953]: Accepted publickey for core from 147.75.109.163 port 34120 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:39:41.939036 sshd[1953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:39:41.945266 systemd-logind[1728]: New session 3 of user core. Nov 1 00:39:41.946438 systemd[1]: Started session-3.scope. Nov 1 00:39:42.070255 sshd[1953]: pam_unix(sshd:session): session closed for user core Nov 1 00:39:42.076002 systemd[1]: sshd@2-172.31.19.190:22-147.75.109.163:34120.service: Deactivated successfully. Nov 1 00:39:42.077283 systemd[1]: session-3.scope: Deactivated successfully. Nov 1 00:39:42.078340 systemd-logind[1728]: Session 3 logged out. Waiting for processes to exit. Nov 1 00:39:42.079393 systemd-logind[1728]: Removed session 3. Nov 1 00:39:42.098537 systemd[1]: Started sshd@3-172.31.19.190:22-147.75.109.163:34136.service. Nov 1 00:39:42.259195 sshd[1959]: Accepted publickey for core from 147.75.109.163 port 34136 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:39:42.261927 sshd[1959]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:39:42.272853 systemd[1]: Started session-4.scope. Nov 1 00:39:42.273398 systemd-logind[1728]: New session 4 of user core. Nov 1 00:39:42.410534 sshd[1959]: pam_unix(sshd:session): session closed for user core Nov 1 00:39:42.414058 systemd[1]: sshd@3-172.31.19.190:22-147.75.109.163:34136.service: Deactivated successfully. Nov 1 00:39:42.415021 systemd[1]: session-4.scope: Deactivated successfully. Nov 1 00:39:42.415796 systemd-logind[1728]: Session 4 logged out. Waiting for processes to exit. Nov 1 00:39:42.416753 systemd-logind[1728]: Removed session 4. Nov 1 00:39:42.441321 systemd[1]: Started sshd@4-172.31.19.190:22-147.75.109.163:34152.service. Nov 1 00:39:42.661896 sshd[1965]: Accepted publickey for core from 147.75.109.163 port 34152 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:39:42.664751 sshd[1965]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:39:42.779087 systemd-logind[1728]: New session 5 of user core. Nov 1 00:39:42.779824 systemd[1]: Started session-5.scope. Nov 1 00:39:42.906210 sudo[1968]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Nov 1 00:39:42.906571 sudo[1968]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:39:42.916700 dbus-daemon[1719]: \xd0]z\u000d\xa1U: received setenforce notice (enforcing=1823866944) Nov 1 00:39:42.919705 sudo[1968]: pam_unix(sudo:session): session closed for user root Nov 1 00:39:42.943854 sshd[1965]: pam_unix(sshd:session): session closed for user core Nov 1 00:39:42.948727 systemd[1]: sshd@4-172.31.19.190:22-147.75.109.163:34152.service: Deactivated successfully. Nov 1 00:39:42.949932 systemd[1]: session-5.scope: Deactivated successfully. Nov 1 00:39:42.950789 systemd-logind[1728]: Session 5 logged out. Waiting for processes to exit. Nov 1 00:39:42.952094 systemd-logind[1728]: Removed session 5. Nov 1 00:39:42.972019 systemd[1]: Started sshd@5-172.31.19.190:22-147.75.109.163:34160.service. Nov 1 00:39:43.139497 sshd[1972]: Accepted publickey for core from 147.75.109.163 port 34160 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:39:43.141841 sshd[1972]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:39:43.147068 systemd-logind[1728]: New session 6 of user core. Nov 1 00:39:43.148107 systemd[1]: Started session-6.scope. Nov 1 00:39:43.252593 sudo[1976]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Nov 1 00:39:43.253391 sudo[1976]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:39:43.256943 sudo[1976]: pam_unix(sudo:session): session closed for user root Nov 1 00:39:43.263387 sudo[1975]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Nov 1 00:39:43.263745 sudo[1975]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:39:43.276994 systemd[1]: Stopping audit-rules.service... Nov 1 00:39:43.277000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:39:43.280252 kernel: kauditd_printk_skb: 234 callbacks suppressed Nov 1 00:39:43.280345 kernel: audit: type=1305 audit(1761957583.277:213): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 00:39:43.280374 auditctl[1979]: No rules Nov 1 00:39:43.280950 systemd[1]: audit-rules.service: Deactivated successfully. Nov 1 00:39:43.277000 audit[1979]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe20cf0900 a2=420 a3=0 items=0 ppid=1 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:43.281192 systemd[1]: Stopped audit-rules.service. Nov 1 00:39:43.289078 kernel: audit: type=1300 audit(1761957583.277:213): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe20cf0900 a2=420 a3=0 items=0 ppid=1 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:43.290357 systemd[1]: Starting audit-rules.service... Nov 1 00:39:43.277000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:39:43.299861 kernel: audit: type=1327 audit(1761957583.277:213): proctitle=2F7362696E2F617564697463746C002D44 Nov 1 00:39:43.300020 kernel: audit: type=1131 audit(1761957583.279:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.315324 augenrules[1996]: No rules Nov 1 00:39:43.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.316106 systemd[1]: Finished audit-rules.service. Nov 1 00:39:43.317190 sudo[1975]: pam_unix(sudo:session): session closed for user root Nov 1 00:39:43.316000 audit[1975]: USER_END pid=1975 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.326529 kernel: audit: type=1130 audit(1761957583.315:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.326642 kernel: audit: type=1106 audit(1761957583.316:216): pid=1975 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.316000 audit[1975]: CRED_DISP pid=1975 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.327189 kernel: audit: type=1104 audit(1761957583.316:217): pid=1975 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.340397 sshd[1972]: pam_unix(sshd:session): session closed for user core Nov 1 00:39:43.341000 audit[1972]: USER_END pid=1972 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:39:43.345402 systemd[1]: sshd@5-172.31.19.190:22-147.75.109.163:34160.service: Deactivated successfully. Nov 1 00:39:43.346419 systemd[1]: session-6.scope: Deactivated successfully. Nov 1 00:39:43.348092 systemd-logind[1728]: Session 6 logged out. Waiting for processes to exit. Nov 1 00:39:43.349070 kernel: audit: type=1106 audit(1761957583.341:218): pid=1972 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:39:43.349120 kernel: audit: type=1104 audit(1761957583.341:219): pid=1972 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:39:43.341000 audit[1972]: CRED_DISP pid=1972 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:39:43.349925 systemd-logind[1728]: Removed session 6. Nov 1 00:39:43.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.19.190:22-147.75.109.163:34160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.360988 kernel: audit: type=1131 audit(1761957583.344:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.19.190:22-147.75.109.163:34160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.190:22-147.75.109.163:34166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.367948 systemd[1]: Started sshd@6-172.31.19.190:22-147.75.109.163:34166.service. Nov 1 00:39:43.527000 audit[2002]: USER_ACCT pid=2002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:39:43.529001 sshd[2002]: Accepted publickey for core from 147.75.109.163 port 34166 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:39:43.530000 audit[2002]: CRED_ACQ pid=2002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:39:43.530000 audit[2002]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa55cb130 a2=3 a3=0 items=0 ppid=1 pid=2002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:43.530000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:39:43.531605 sshd[2002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:39:43.540702 systemd[1]: Started session-7.scope. Nov 1 00:39:43.541994 systemd-logind[1728]: New session 7 of user core. Nov 1 00:39:43.546000 audit[2002]: USER_START pid=2002 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:39:43.548000 audit[2004]: CRED_ACQ pid=2004 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:39:43.645000 audit[2005]: USER_ACCT pid=2005 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.646986 sudo[2005]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Nov 1 00:39:43.646000 audit[2005]: CRED_REFR pid=2005 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.647381 sudo[2005]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 00:39:43.648000 audit[2005]: USER_START pid=2005 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:39:43.679018 systemd[1]: Starting docker.service... Nov 1 00:39:43.738628 env[2015]: time="2025-11-01T00:39:43.738580654Z" level=info msg="Starting up" Nov 1 00:39:43.741696 env[2015]: time="2025-11-01T00:39:43.740963593Z" level=info msg="parsed scheme: \"unix\"" module=grpc Nov 1 00:39:43.741696 env[2015]: time="2025-11-01T00:39:43.741548853Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Nov 1 00:39:43.741696 env[2015]: time="2025-11-01T00:39:43.741585304Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Nov 1 00:39:43.741696 env[2015]: time="2025-11-01T00:39:43.741601053Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Nov 1 00:39:43.747782 env[2015]: time="2025-11-01T00:39:43.747709647Z" level=info msg="parsed scheme: \"unix\"" module=grpc Nov 1 00:39:43.747782 env[2015]: time="2025-11-01T00:39:43.747744657Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Nov 1 00:39:43.747782 env[2015]: time="2025-11-01T00:39:43.747771948Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Nov 1 00:39:43.747782 env[2015]: time="2025-11-01T00:39:43.747790547Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Nov 1 00:39:43.756872 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1913806872-merged.mount: Deactivated successfully. Nov 1 00:39:43.824235 env[2015]: time="2025-11-01T00:39:43.824103150Z" level=info msg="Loading containers: start." Nov 1 00:39:44.051000 audit[2046]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2046 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.051000 audit[2046]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe216efc90 a2=0 a3=7ffe216efc7c items=0 ppid=2015 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.051000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Nov 1 00:39:44.054000 audit[2048]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2048 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.054000 audit[2048]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc9e87e380 a2=0 a3=7ffc9e87e36c items=0 ppid=2015 pid=2048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.054000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Nov 1 00:39:44.057000 audit[2050]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2050 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.057000 audit[2050]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd3771cc80 a2=0 a3=7ffd3771cc6c items=0 ppid=2015 pid=2050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.057000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Nov 1 00:39:44.060000 audit[2052]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2052 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.060000 audit[2052]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcc4f47310 a2=0 a3=7ffcc4f472fc items=0 ppid=2015 pid=2052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.060000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Nov 1 00:39:44.064000 audit[2054]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2054 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.064000 audit[2054]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff56349510 a2=0 a3=7fff563494fc items=0 ppid=2015 pid=2054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.064000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Nov 1 00:39:44.186000 audit[2059]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2059 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.186000 audit[2059]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff4348c360 a2=0 a3=7fff4348c34c items=0 ppid=2015 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.186000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Nov 1 00:39:44.220000 audit[2061]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2061 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.220000 audit[2061]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffda989b8b0 a2=0 a3=7ffda989b89c items=0 ppid=2015 pid=2061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.220000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Nov 1 00:39:44.225000 audit[2063]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2063 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.225000 audit[2063]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe070b8760 a2=0 a3=7ffe070b874c items=0 ppid=2015 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.225000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Nov 1 00:39:44.229000 audit[2065]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2065 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.229000 audit[2065]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff13e31f00 a2=0 a3=7fff13e31eec items=0 ppid=2015 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.229000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Nov 1 00:39:44.264000 audit[2069]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2069 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.264000 audit[2069]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffebce46d80 a2=0 a3=7ffebce46d6c items=0 ppid=2015 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.264000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Nov 1 00:39:44.271000 audit[2070]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2070 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.271000 audit[2070]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcbc3b92b0 a2=0 a3=7ffcbc3b929c items=0 ppid=2015 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.271000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Nov 1 00:39:44.310997 kernel: Initializing XFRM netlink socket Nov 1 00:39:44.420751 env[2015]: time="2025-11-01T00:39:44.419325221Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Nov 1 00:39:44.422838 (udev-worker)[2025]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:39:44.489000 audit[2078]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2078 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.489000 audit[2078]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffad2339f0 a2=0 a3=7fffad2339dc items=0 ppid=2015 pid=2078 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.489000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Nov 1 00:39:44.560000 audit[2081]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2081 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.560000 audit[2081]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff6dac4f20 a2=0 a3=7fff6dac4f0c items=0 ppid=2015 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.560000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Nov 1 00:39:44.568000 audit[2084]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2084 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.568000 audit[2084]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff4fca7b20 a2=0 a3=7fff4fca7b0c items=0 ppid=2015 pid=2084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.568000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Nov 1 00:39:44.572000 audit[2086]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2086 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.572000 audit[2086]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffef7365210 a2=0 a3=7ffef73651fc items=0 ppid=2015 pid=2086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.572000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Nov 1 00:39:44.575000 audit[2088]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.575000 audit[2088]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffde06f5300 a2=0 a3=7ffde06f52ec items=0 ppid=2015 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.575000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Nov 1 00:39:44.579000 audit[2090]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2090 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.579000 audit[2090]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff7291f0a0 a2=0 a3=7fff7291f08c items=0 ppid=2015 pid=2090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.579000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Nov 1 00:39:44.582000 audit[2092]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.582000 audit[2092]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc18a0a750 a2=0 a3=7ffc18a0a73c items=0 ppid=2015 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.582000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Nov 1 00:39:44.623000 audit[2095]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2095 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.623000 audit[2095]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffeb37ba970 a2=0 a3=7ffeb37ba95c items=0 ppid=2015 pid=2095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.623000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Nov 1 00:39:44.632000 audit[2097]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.632000 audit[2097]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe013972c0 a2=0 a3=7ffe013972ac items=0 ppid=2015 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.632000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Nov 1 00:39:44.648000 audit[2099]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2099 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.648000 audit[2099]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe9030d030 a2=0 a3=7ffe9030d01c items=0 ppid=2015 pid=2099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.648000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Nov 1 00:39:44.655000 audit[2101]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.655000 audit[2101]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd79677190 a2=0 a3=7ffd7967717c items=0 ppid=2015 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Nov 1 00:39:44.656994 systemd-networkd[1461]: docker0: Link UP Nov 1 00:39:44.727000 audit[2105]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2105 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.727000 audit[2105]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcca375290 a2=0 a3=7ffcca37527c items=0 ppid=2015 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.727000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Nov 1 00:39:44.736000 audit[2106]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:39:44.736000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffea8edc570 a2=0 a3=7ffea8edc55c items=0 ppid=2015 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:39:44.736000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Nov 1 00:39:44.737740 env[2015]: time="2025-11-01T00:39:44.737611204Z" level=info msg="Loading containers: done." Nov 1 00:39:44.755394 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1108813151-merged.mount: Deactivated successfully. Nov 1 00:39:44.799897 env[2015]: time="2025-11-01T00:39:44.774557738Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Nov 1 00:39:44.800482 env[2015]: time="2025-11-01T00:39:44.800062123Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Nov 1 00:39:44.800482 env[2015]: time="2025-11-01T00:39:44.800258670Z" level=info msg="Daemon has completed initialization" Nov 1 00:39:44.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:44.852917 systemd[1]: Started docker.service. Nov 1 00:39:44.884079 env[2015]: time="2025-11-01T00:39:44.875831824Z" level=info msg="API listen on /run/docker.sock" Nov 1 00:39:45.847324 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Nov 1 00:39:45.847610 systemd[1]: Stopped kubelet.service. Nov 1 00:39:45.847851 systemd[1]: kubelet.service: Consumed 1.252s CPU time. Nov 1 00:39:45.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:45.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:45.850381 systemd[1]: Starting kubelet.service... Nov 1 00:39:46.220496 systemd[1]: Started kubelet.service. Nov 1 00:39:46.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:46.300486 kubelet[2141]: E1101 00:39:46.300393 2141 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:39:46.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 00:39:46.304631 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:39:46.304891 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:39:46.627579 env[1737]: time="2025-11-01T00:39:46.627181058Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\"" Nov 1 00:39:47.258649 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2431711564.mount: Deactivated successfully. Nov 1 00:39:49.123189 amazon-ssm-agent[1716]: 2025-11-01 00:39:49 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Nov 1 00:39:49.506013 env[1737]: time="2025-11-01T00:39:49.505851843Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:49.509889 env[1737]: time="2025-11-01T00:39:49.509834834Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b7335a56022aba291f5df653c01b7ab98d64fb5cab221378617f4a1236e06a62,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:49.513403 env[1737]: time="2025-11-01T00:39:49.513349371Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:49.516820 env[1737]: time="2025-11-01T00:39:49.516768796Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:1b9c6c00bc1fe86860e72efb8e4148f9e436a132eba4ca636ca4f48d61d6dfb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:49.518052 env[1737]: time="2025-11-01T00:39:49.518006583Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\" returns image reference \"sha256:b7335a56022aba291f5df653c01b7ab98d64fb5cab221378617f4a1236e06a62\"" Nov 1 00:39:49.519089 env[1737]: time="2025-11-01T00:39:49.519052946Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\"" Nov 1 00:39:51.816303 env[1737]: time="2025-11-01T00:39:51.816238654Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:51.821630 env[1737]: time="2025-11-01T00:39:51.821546591Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8bb43160a0df4d7d34c89d9edbc48735bc2f830771e4b501937338221be0f668,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:51.846212 env[1737]: time="2025-11-01T00:39:51.846166901Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:51.853341 env[1737]: time="2025-11-01T00:39:51.853288712Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:1082a6ab67fb46397314dd36b36cb197ba4a4c5365033e9ad22bc7edaaaabd5c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:51.854331 env[1737]: time="2025-11-01T00:39:51.854282055Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\" returns image reference \"sha256:8bb43160a0df4d7d34c89d9edbc48735bc2f830771e4b501937338221be0f668\"" Nov 1 00:39:51.855198 env[1737]: time="2025-11-01T00:39:51.855171052Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\"" Nov 1 00:39:53.570585 env[1737]: time="2025-11-01T00:39:53.570526437Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:53.574272 env[1737]: time="2025-11-01T00:39:53.574222630Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:33b680aadf474b7e5e73957fc00c6af86dd0484c699c8461ba33ee656d1823bf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:53.580018 env[1737]: time="2025-11-01T00:39:53.579944289Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:53.583418 env[1737]: time="2025-11-01T00:39:53.583370139Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:3e7b57c9d9f06b77f0064e5be7f3df61e0151101160acd5fdecce911df28a189,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:53.584567 env[1737]: time="2025-11-01T00:39:53.584519584Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\" returns image reference \"sha256:33b680aadf474b7e5e73957fc00c6af86dd0484c699c8461ba33ee656d1823bf\"" Nov 1 00:39:53.585643 env[1737]: time="2025-11-01T00:39:53.585605716Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\"" Nov 1 00:39:55.129851 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3423079456.mount: Deactivated successfully. Nov 1 00:39:56.349798 kernel: kauditd_printk_skb: 88 callbacks suppressed Nov 1 00:39:56.349963 kernel: audit: type=1130 audit(1761957596.346:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:56.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:56.347063 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Nov 1 00:39:56.347343 systemd[1]: Stopped kubelet.service. Nov 1 00:39:56.349492 systemd[1]: Starting kubelet.service... Nov 1 00:39:56.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:56.364302 kernel: audit: type=1131 audit(1761957596.346:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:56.551022 env[1737]: time="2025-11-01T00:39:56.550384230Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:56.557821 env[1737]: time="2025-11-01T00:39:56.557761074Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:56.560043 env[1737]: time="2025-11-01T00:39:56.559990386Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:56.564611 env[1737]: time="2025-11-01T00:39:56.564558195Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:71445ec84ad98bd52a7784865a9d31b1b50b56092d3f7699edc39eefd71befe1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:56.566699 env[1737]: time="2025-11-01T00:39:56.566392092Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\" returns image reference \"sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3\"" Nov 1 00:39:56.570101 env[1737]: time="2025-11-01T00:39:56.570053490Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" Nov 1 00:39:56.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:56.743898 systemd[1]: Started kubelet.service. Nov 1 00:39:56.760291 kernel: audit: type=1130 audit(1761957596.743:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:39:56.852650 kubelet[2155]: E1101 00:39:56.852593 2155 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:39:56.854701 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:39:56.854890 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:39:56.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 00:39:56.860078 kernel: audit: type=1131 audit(1761957596.854:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 00:39:57.169885 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1548772089.mount: Deactivated successfully. Nov 1 00:39:58.922798 env[1737]: time="2025-11-01T00:39:58.922734881Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:58.926033 env[1737]: time="2025-11-01T00:39:58.925982450Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:58.930458 env[1737]: time="2025-11-01T00:39:58.930400623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:58.933957 env[1737]: time="2025-11-01T00:39:58.933902748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:58.935081 env[1737]: time="2025-11-01T00:39:58.934934480Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b\"" Nov 1 00:39:58.936322 env[1737]: time="2025-11-01T00:39:58.936287074Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Nov 1 00:39:59.432725 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount364421165.mount: Deactivated successfully. Nov 1 00:39:59.451920 env[1737]: time="2025-11-01T00:39:59.451853991Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:59.455175 env[1737]: time="2025-11-01T00:39:59.455122741Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:59.457124 env[1737]: time="2025-11-01T00:39:59.457080976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:59.459625 env[1737]: time="2025-11-01T00:39:59.459569364Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:39:59.467772 env[1737]: time="2025-11-01T00:39:59.467702999Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Nov 1 00:39:59.468699 env[1737]: time="2025-11-01T00:39:59.468664775Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" Nov 1 00:39:59.972762 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3731498655.mount: Deactivated successfully. Nov 1 00:40:02.452255 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Nov 1 00:40:02.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:02.462999 kernel: audit: type=1131 audit(1761957602.452:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:02.504831 kernel: audit: type=1334 audit(1761957602.498:264): prog-id=43 op=UNLOAD Nov 1 00:40:02.509425 kernel: audit: type=1334 audit(1761957602.498:265): prog-id=42 op=UNLOAD Nov 1 00:40:02.509921 kernel: audit: type=1334 audit(1761957602.498:266): prog-id=41 op=UNLOAD Nov 1 00:40:02.498000 audit: BPF prog-id=43 op=UNLOAD Nov 1 00:40:02.498000 audit: BPF prog-id=42 op=UNLOAD Nov 1 00:40:02.498000 audit: BPF prog-id=41 op=UNLOAD Nov 1 00:40:04.727718 env[1737]: time="2025-11-01T00:40:04.727656599Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:04.731367 env[1737]: time="2025-11-01T00:40:04.731300040Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:04.743439 env[1737]: time="2025-11-01T00:40:04.743365640Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:04.745287 env[1737]: time="2025-11-01T00:40:04.745230386Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:04.754196 env[1737]: time="2025-11-01T00:40:04.751228802Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1\"" Nov 1 00:40:07.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:07.100421 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Nov 1 00:40:07.100703 systemd[1]: Stopped kubelet.service. Nov 1 00:40:07.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:07.105210 systemd[1]: Starting kubelet.service... Nov 1 00:40:07.119048 kernel: audit: type=1130 audit(1761957607.099:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:07.119229 kernel: audit: type=1131 audit(1761957607.099:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:08.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:08.641216 systemd[1]: Started kubelet.service. Nov 1 00:40:08.659121 kernel: audit: type=1130 audit(1761957608.640:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:08.780735 kubelet[2186]: E1101 00:40:08.780685 2186 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 00:40:08.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 00:40:08.783631 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 00:40:08.783811 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 00:40:08.792181 kernel: audit: type=1131 audit(1761957608.783:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 00:40:11.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:11.030197 systemd[1]: Stopped kubelet.service. Nov 1 00:40:11.048124 kernel: audit: type=1130 audit(1761957611.029:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:11.048301 kernel: audit: type=1131 audit(1761957611.031:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:11.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:11.049209 systemd[1]: Starting kubelet.service... Nov 1 00:40:11.098773 systemd[1]: Reloading. Nov 1 00:40:11.257811 /usr/lib/systemd/system-generators/torcx-generator[2217]: time="2025-11-01T00:40:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:40:11.257857 /usr/lib/systemd/system-generators/torcx-generator[2217]: time="2025-11-01T00:40:11Z" level=info msg="torcx already run" Nov 1 00:40:11.430620 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:40:11.430646 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:40:11.460143 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:40:11.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585996 kernel: audit: type=1400 audit(1761957611.570:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.586151 kernel: audit: type=1400 audit(1761957611.570:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.601049 kernel: audit: type=1400 audit(1761957611.570:275): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.601208 kernel: audit: type=1400 audit(1761957611.570:276): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.608470 kernel: audit: type=1400 audit(1761957611.570:277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.608632 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Nov 1 00:40:11.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.577000 audit: BPF prog-id=46 op=LOAD Nov 1 00:40:11.577000 audit: BPF prog-id=44 op=UNLOAD Nov 1 00:40:11.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.579000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit: BPF prog-id=47 op=LOAD Nov 1 00:40:11.585000 audit: BPF prog-id=27 op=UNLOAD Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit: BPF prog-id=48 op=LOAD Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.592000 audit: BPF prog-id=49 op=LOAD Nov 1 00:40:11.592000 audit: BPF prog-id=28 op=UNLOAD Nov 1 00:40:11.592000 audit: BPF prog-id=29 op=UNLOAD Nov 1 00:40:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.600000 audit: BPF prog-id=50 op=LOAD Nov 1 00:40:11.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.600000 audit: BPF prog-id=51 op=LOAD Nov 1 00:40:11.600000 audit: BPF prog-id=30 op=UNLOAD Nov 1 00:40:11.600000 audit: BPF prog-id=31 op=UNLOAD Nov 1 00:40:11.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.610000 audit: BPF prog-id=52 op=LOAD Nov 1 00:40:11.610000 audit: BPF prog-id=32 op=UNLOAD Nov 1 00:40:11.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit: BPF prog-id=53 op=LOAD Nov 1 00:40:11.612000 audit: BPF prog-id=33 op=UNLOAD Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit: BPF prog-id=54 op=LOAD Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.612000 audit: BPF prog-id=55 op=LOAD Nov 1 00:40:11.612000 audit: BPF prog-id=34 op=UNLOAD Nov 1 00:40:11.612000 audit: BPF prog-id=35 op=UNLOAD Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit: BPF prog-id=56 op=LOAD Nov 1 00:40:11.622000 audit: BPF prog-id=38 op=UNLOAD Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit: BPF prog-id=57 op=LOAD Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.622000 audit: BPF prog-id=58 op=LOAD Nov 1 00:40:11.622000 audit: BPF prog-id=39 op=UNLOAD Nov 1 00:40:11.622000 audit: BPF prog-id=40 op=UNLOAD Nov 1 00:40:11.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.628000 audit: BPF prog-id=59 op=LOAD Nov 1 00:40:11.628000 audit: BPF prog-id=36 op=UNLOAD Nov 1 00:40:11.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:11.629000 audit: BPF prog-id=60 op=LOAD Nov 1 00:40:11.629000 audit: BPF prog-id=37 op=UNLOAD Nov 1 00:40:11.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:11.652960 systemd[1]: Started kubelet.service. Nov 1 00:40:11.657408 systemd[1]: Stopping kubelet.service... Nov 1 00:40:11.659098 systemd[1]: kubelet.service: Deactivated successfully. Nov 1 00:40:11.659530 systemd[1]: Stopped kubelet.service. Nov 1 00:40:11.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:11.661987 systemd[1]: Starting kubelet.service... Nov 1 00:40:11.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:11.942654 systemd[1]: Started kubelet.service. Nov 1 00:40:12.024850 kubelet[2280]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:40:12.024850 kubelet[2280]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Nov 1 00:40:12.024850 kubelet[2280]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:40:12.025497 kubelet[2280]: I1101 00:40:12.025024 2280 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Nov 1 00:40:13.320802 kubelet[2280]: I1101 00:40:13.320727 2280 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Nov 1 00:40:13.320802 kubelet[2280]: I1101 00:40:13.320775 2280 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Nov 1 00:40:13.321400 kubelet[2280]: I1101 00:40:13.321159 2280 server.go:956] "Client rotation is on, will bootstrap in background" Nov 1 00:40:13.391269 kubelet[2280]: I1101 00:40:13.391235 2280 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Nov 1 00:40:13.393382 kubelet[2280]: E1101 00:40:13.393336 2280 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://172.31.19.190:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.19.190:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Nov 1 00:40:13.417380 kubelet[2280]: E1101 00:40:13.417298 2280 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Nov 1 00:40:13.417380 kubelet[2280]: I1101 00:40:13.417376 2280 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Nov 1 00:40:13.423421 kubelet[2280]: I1101 00:40:13.423362 2280 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Nov 1 00:40:13.424132 kubelet[2280]: I1101 00:40:13.423712 2280 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Nov 1 00:40:13.425819 kubelet[2280]: I1101 00:40:13.424133 2280 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-19-190","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Nov 1 00:40:13.426071 kubelet[2280]: I1101 00:40:13.425821 2280 topology_manager.go:138] "Creating topology manager with none policy" Nov 1 00:40:13.426071 kubelet[2280]: I1101 00:40:13.425844 2280 container_manager_linux.go:303] "Creating device plugin manager" Nov 1 00:40:13.426071 kubelet[2280]: I1101 00:40:13.426057 2280 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:40:13.463119 kubelet[2280]: I1101 00:40:13.463060 2280 kubelet.go:480] "Attempting to sync node with API server" Nov 1 00:40:13.463119 kubelet[2280]: I1101 00:40:13.463128 2280 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Nov 1 00:40:13.469038 kubelet[2280]: E1101 00:40:13.468907 2280 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://172.31.19.190:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-19-190&limit=500&resourceVersion=0\": dial tcp 172.31.19.190:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Nov 1 00:40:13.470650 kubelet[2280]: I1101 00:40:13.470620 2280 kubelet.go:386] "Adding apiserver pod source" Nov 1 00:40:13.470650 kubelet[2280]: I1101 00:40:13.470657 2280 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Nov 1 00:40:13.502464 kubelet[2280]: E1101 00:40:13.502406 2280 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://172.31.19.190:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.19.190:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Nov 1 00:40:13.518520 kubelet[2280]: I1101 00:40:13.517720 2280 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Nov 1 00:40:13.518838 kubelet[2280]: I1101 00:40:13.518613 2280 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Nov 1 00:40:13.520604 kubelet[2280]: W1101 00:40:13.520572 2280 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Nov 1 00:40:13.528792 kubelet[2280]: I1101 00:40:13.528759 2280 watchdog_linux.go:99] "Systemd watchdog is not enabled" Nov 1 00:40:13.529312 kubelet[2280]: I1101 00:40:13.528834 2280 server.go:1289] "Started kubelet" Nov 1 00:40:13.538672 kubelet[2280]: I1101 00:40:13.538609 2280 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Nov 1 00:40:13.545965 kubelet[2280]: I1101 00:40:13.545878 2280 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Nov 1 00:40:13.546600 kubelet[2280]: I1101 00:40:13.546574 2280 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Nov 1 00:40:13.546000 audit[2280]: AVC avc: denied { mac_admin } for pid=2280 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:13.546000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:40:13.546000 audit[2280]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a6d080 a1=c000a60af8 a2=c000a6d050 a3=25 items=0 ppid=1 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.546000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:40:13.547928 kubelet[2280]: I1101 00:40:13.547510 2280 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Nov 1 00:40:13.547928 kubelet[2280]: I1101 00:40:13.547661 2280 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Nov 1 00:40:13.547928 kubelet[2280]: I1101 00:40:13.547762 2280 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Nov 1 00:40:13.546000 audit[2280]: AVC avc: denied { mac_admin } for pid=2280 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:13.546000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:40:13.546000 audit[2280]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a52e00 a1=c000a60b10 a2=c000a6d110 a3=25 items=0 ppid=1 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.546000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:40:13.556747 kubelet[2280]: I1101 00:40:13.556695 2280 server.go:317] "Adding debug handlers to kubelet server" Nov 1 00:40:13.566520 kubelet[2280]: I1101 00:40:13.566485 2280 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Nov 1 00:40:13.569571 kubelet[2280]: I1101 00:40:13.569538 2280 volume_manager.go:297] "Starting Kubelet Volume Manager" Nov 1 00:40:13.570204 kubelet[2280]: E1101 00:40:13.570176 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:13.569000 audit[2295]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:13.569000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec826ced0 a2=0 a3=7ffec826cebc items=0 ppid=2280 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.569000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 00:40:13.571000 audit[2296]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:13.571000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdb99d030 a2=0 a3=7ffcdb99d01c items=0 ppid=2280 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.571000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 00:40:13.574000 audit[2298]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:13.574000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb752b000 a2=0 a3=7ffdb752afec items=0 ppid=2280 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:40:13.576124 kubelet[2280]: I1101 00:40:13.576095 2280 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Nov 1 00:40:13.576351 kubelet[2280]: I1101 00:40:13.576334 2280 reconciler.go:26] "Reconciler: start to sync state" Nov 1 00:40:13.577034 kubelet[2280]: E1101 00:40:13.576998 2280 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.190:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-190?timeout=10s\": dial tcp 172.31.19.190:6443: connect: connection refused" interval="200ms" Nov 1 00:40:13.577000 audit[2300]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:13.577000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd93515110 a2=0 a3=7ffd935150fc items=0 ppid=2280 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:40:13.579457 kubelet[2280]: E1101 00:40:13.577229 2280 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.19.190:6443/api/v1/namespaces/default/events\": dial tcp 172.31.19.190:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-19-190.1873bb1d3fadb534 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-19-190,UID:ip-172-31-19-190,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-19-190,},FirstTimestamp:2025-11-01 00:40:13.528790324 +0000 UTC m=+1.579000011,LastTimestamp:2025-11-01 00:40:13.528790324 +0000 UTC m=+1.579000011,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-19-190,}" Nov 1 00:40:13.580868 kubelet[2280]: I1101 00:40:13.580685 2280 factory.go:223] Registration of the systemd container factory successfully Nov 1 00:40:13.581045 kubelet[2280]: I1101 00:40:13.580965 2280 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Nov 1 00:40:13.583898 kubelet[2280]: E1101 00:40:13.583334 2280 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://172.31.19.190:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.19.190:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Nov 1 00:40:13.584049 kubelet[2280]: I1101 00:40:13.584013 2280 factory.go:223] Registration of the containerd container factory successfully Nov 1 00:40:13.601000 audit[2303]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:13.601000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffca0bf3ae0 a2=0 a3=7ffca0bf3acc items=0 ppid=2280 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Nov 1 00:40:13.608669 kubelet[2280]: I1101 00:40:13.608610 2280 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Nov 1 00:40:13.609000 audit[2305]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:13.609000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcdcc4e870 a2=0 a3=7ffcdcc4e85c items=0 ppid=2280 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 00:40:13.610827 kubelet[2280]: I1101 00:40:13.610791 2280 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Nov 1 00:40:13.610827 kubelet[2280]: I1101 00:40:13.610824 2280 status_manager.go:230] "Starting to sync pod status with apiserver" Nov 1 00:40:13.610965 kubelet[2280]: I1101 00:40:13.610855 2280 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Nov 1 00:40:13.610965 kubelet[2280]: I1101 00:40:13.610866 2280 kubelet.go:2436] "Starting kubelet main sync loop" Nov 1 00:40:13.610965 kubelet[2280]: E1101 00:40:13.610924 2280 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Nov 1 00:40:13.613000 audit[2306]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:13.613000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda3b32a70 a2=0 a3=7ffda3b32a5c items=0 ppid=2280 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.613000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 00:40:13.615000 audit[2307]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:13.615000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedcf51e80 a2=0 a3=7ffedcf51e6c items=0 ppid=2280 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.615000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 00:40:13.618000 audit[2308]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:13.618000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc64278a70 a2=0 a3=7ffc64278a5c items=0 ppid=2280 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.618000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 00:40:13.621000 audit[2309]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:13.621000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe60766ce0 a2=0 a3=7ffe60766ccc items=0 ppid=2280 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.621000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 00:40:13.626411 kubelet[2280]: E1101 00:40:13.626377 2280 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://172.31.19.190:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.19.190:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Nov 1 00:40:13.627000 audit[2312]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:13.627000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd6f297a70 a2=0 a3=7ffd6f297a5c items=0 ppid=2280 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.627000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 00:40:13.629000 audit[2313]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:13.629000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe491c04c0 a2=0 a3=7ffe491c04ac items=0 ppid=2280 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 00:40:13.631304 kubelet[2280]: E1101 00:40:13.631270 2280 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Nov 1 00:40:13.640992 kubelet[2280]: I1101 00:40:13.640942 2280 cpu_manager.go:221] "Starting CPU manager" policy="none" Nov 1 00:40:13.641252 kubelet[2280]: I1101 00:40:13.640964 2280 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Nov 1 00:40:13.641252 kubelet[2280]: I1101 00:40:13.641080 2280 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:40:13.643763 kubelet[2280]: I1101 00:40:13.643722 2280 policy_none.go:49] "None policy: Start" Nov 1 00:40:13.643945 kubelet[2280]: I1101 00:40:13.643780 2280 memory_manager.go:186] "Starting memorymanager" policy="None" Nov 1 00:40:13.643945 kubelet[2280]: I1101 00:40:13.643822 2280 state_mem.go:35] "Initializing new in-memory state store" Nov 1 00:40:13.652513 systemd[1]: Created slice kubepods.slice. Nov 1 00:40:13.658478 systemd[1]: Created slice kubepods-besteffort.slice. Nov 1 00:40:13.667201 systemd[1]: Created slice kubepods-burstable.slice. Nov 1 00:40:13.668851 kubelet[2280]: E1101 00:40:13.668816 2280 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Nov 1 00:40:13.679201 kernel: kauditd_printk_skb: 215 callbacks suppressed Nov 1 00:40:13.679262 kernel: audit: type=1400 audit(1761957613.667:461): avc: denied { mac_admin } for pid=2280 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:13.667000 audit[2280]: AVC avc: denied { mac_admin } for pid=2280 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:13.679357 kubelet[2280]: E1101 00:40:13.668894 2280 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Nov 1 00:40:13.679357 kubelet[2280]: I1101 00:40:13.669071 2280 eviction_manager.go:189] "Eviction manager: starting control loop" Nov 1 00:40:13.679357 kubelet[2280]: I1101 00:40:13.669086 2280 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Nov 1 00:40:13.679357 kubelet[2280]: I1101 00:40:13.669817 2280 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Nov 1 00:40:13.679357 kubelet[2280]: E1101 00:40:13.671775 2280 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Nov 1 00:40:13.679357 kubelet[2280]: E1101 00:40:13.671837 2280 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-19-190\" not found" Nov 1 00:40:13.684057 kernel: audit: type=1401 audit(1761957613.667:461): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:40:13.684219 kernel: audit: type=1300 audit(1761957613.667:461): arch=c000003e syscall=188 success=no exit=-22 a0=c0006ecc30 a1=c000a17b30 a2=c0006ecc00 a3=25 items=0 ppid=1 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.667000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:40:13.667000 audit[2280]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006ecc30 a1=c000a17b30 a2=c0006ecc00 a3=25 items=0 ppid=1 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:13.667000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:40:13.701582 kernel: audit: type=1327 audit(1761957613.667:461): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:40:13.759349 systemd[1]: Created slice kubepods-burstable-pod2a0b87d3c77d10fafed8a458b6d7f094.slice. Nov 1 00:40:13.771073 kubelet[2280]: E1101 00:40:13.771009 2280 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-19-190\" not found" node="ip-172-31-19-190" Nov 1 00:40:13.776353 kubelet[2280]: I1101 00:40:13.776099 2280 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-19-190" Nov 1 00:40:13.776876 systemd[1]: Created slice kubepods-burstable-pod72d72c808a7354006f6993a4a3e7e50b.slice. Nov 1 00:40:13.778812 kubelet[2280]: E1101 00:40:13.777893 2280 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.19.190:6443/api/v1/nodes\": dial tcp 172.31.19.190:6443: connect: connection refused" node="ip-172-31-19-190" Nov 1 00:40:13.779095 kubelet[2280]: I1101 00:40:13.779075 2280 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/72d72c808a7354006f6993a4a3e7e50b-ca-certs\") pod \"kube-controller-manager-ip-172-31-19-190\" (UID: \"72d72c808a7354006f6993a4a3e7e50b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:13.779200 kubelet[2280]: I1101 00:40:13.779112 2280 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/72d72c808a7354006f6993a4a3e7e50b-k8s-certs\") pod \"kube-controller-manager-ip-172-31-19-190\" (UID: \"72d72c808a7354006f6993a4a3e7e50b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:13.779200 kubelet[2280]: I1101 00:40:13.779138 2280 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8d82f13a7b279548fccf7cb1605134e4-kubeconfig\") pod \"kube-scheduler-ip-172-31-19-190\" (UID: \"8d82f13a7b279548fccf7cb1605134e4\") " pod="kube-system/kube-scheduler-ip-172-31-19-190" Nov 1 00:40:13.779200 kubelet[2280]: I1101 00:40:13.779164 2280 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2a0b87d3c77d10fafed8a458b6d7f094-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-19-190\" (UID: \"2a0b87d3c77d10fafed8a458b6d7f094\") " pod="kube-system/kube-apiserver-ip-172-31-19-190" Nov 1 00:40:13.779345 kubelet[2280]: I1101 00:40:13.779206 2280 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/72d72c808a7354006f6993a4a3e7e50b-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-19-190\" (UID: \"72d72c808a7354006f6993a4a3e7e50b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:13.779345 kubelet[2280]: I1101 00:40:13.779232 2280 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/72d72c808a7354006f6993a4a3e7e50b-kubeconfig\") pod \"kube-controller-manager-ip-172-31-19-190\" (UID: \"72d72c808a7354006f6993a4a3e7e50b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:13.779345 kubelet[2280]: I1101 00:40:13.779261 2280 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/72d72c808a7354006f6993a4a3e7e50b-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-19-190\" (UID: \"72d72c808a7354006f6993a4a3e7e50b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:13.779345 kubelet[2280]: I1101 00:40:13.779289 2280 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2a0b87d3c77d10fafed8a458b6d7f094-ca-certs\") pod \"kube-apiserver-ip-172-31-19-190\" (UID: \"2a0b87d3c77d10fafed8a458b6d7f094\") " pod="kube-system/kube-apiserver-ip-172-31-19-190" Nov 1 00:40:13.779345 kubelet[2280]: I1101 00:40:13.779312 2280 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2a0b87d3c77d10fafed8a458b6d7f094-k8s-certs\") pod \"kube-apiserver-ip-172-31-19-190\" (UID: \"2a0b87d3c77d10fafed8a458b6d7f094\") " pod="kube-system/kube-apiserver-ip-172-31-19-190" Nov 1 00:40:13.779575 kubelet[2280]: E1101 00:40:13.779518 2280 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.190:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-190?timeout=10s\": dial tcp 172.31.19.190:6443: connect: connection refused" interval="400ms" Nov 1 00:40:13.784561 kubelet[2280]: E1101 00:40:13.784510 2280 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-19-190\" not found" node="ip-172-31-19-190" Nov 1 00:40:13.787618 systemd[1]: Created slice kubepods-burstable-pod8d82f13a7b279548fccf7cb1605134e4.slice. Nov 1 00:40:13.790111 kubelet[2280]: E1101 00:40:13.790079 2280 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-19-190\" not found" node="ip-172-31-19-190" Nov 1 00:40:13.983476 kubelet[2280]: I1101 00:40:13.983389 2280 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-19-190" Nov 1 00:40:13.984315 kubelet[2280]: E1101 00:40:13.984279 2280 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.19.190:6443/api/v1/nodes\": dial tcp 172.31.19.190:6443: connect: connection refused" node="ip-172-31-19-190" Nov 1 00:40:14.080384 env[1737]: time="2025-11-01T00:40:14.080326683Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-19-190,Uid:2a0b87d3c77d10fafed8a458b6d7f094,Namespace:kube-system,Attempt:0,}" Nov 1 00:40:14.086538 env[1737]: time="2025-11-01T00:40:14.086489378Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-19-190,Uid:72d72c808a7354006f6993a4a3e7e50b,Namespace:kube-system,Attempt:0,}" Nov 1 00:40:14.092852 env[1737]: time="2025-11-01T00:40:14.092803161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-19-190,Uid:8d82f13a7b279548fccf7cb1605134e4,Namespace:kube-system,Attempt:0,}" Nov 1 00:40:14.180872 kubelet[2280]: E1101 00:40:14.180761 2280 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.190:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-190?timeout=10s\": dial tcp 172.31.19.190:6443: connect: connection refused" interval="800ms" Nov 1 00:40:14.387246 kubelet[2280]: I1101 00:40:14.387188 2280 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-19-190" Nov 1 00:40:14.388106 kubelet[2280]: E1101 00:40:14.387920 2280 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.19.190:6443/api/v1/nodes\": dial tcp 172.31.19.190:6443: connect: connection refused" node="ip-172-31-19-190" Nov 1 00:40:14.434385 kubelet[2280]: E1101 00:40:14.434340 2280 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://172.31.19.190:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.31.19.190:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Nov 1 00:40:14.534463 kubelet[2280]: E1101 00:40:14.534338 2280 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://172.31.19.190:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-19-190&limit=500&resourceVersion=0\": dial tcp 172.31.19.190:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Nov 1 00:40:14.572349 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1778771267.mount: Deactivated successfully. Nov 1 00:40:14.585518 env[1737]: time="2025-11-01T00:40:14.585462523Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:14.594326 env[1737]: time="2025-11-01T00:40:14.594267294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:14.598415 env[1737]: time="2025-11-01T00:40:14.598359347Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:14.605128 env[1737]: time="2025-11-01T00:40:14.605074347Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:14.612105 env[1737]: time="2025-11-01T00:40:14.612049601Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:14.616764 env[1737]: time="2025-11-01T00:40:14.616717046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:14.618573 env[1737]: time="2025-11-01T00:40:14.618510617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:14.626617 env[1737]: time="2025-11-01T00:40:14.626569369Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:14.627683 env[1737]: time="2025-11-01T00:40:14.627551348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:14.628499 env[1737]: time="2025-11-01T00:40:14.628459865Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:14.631537 env[1737]: time="2025-11-01T00:40:14.631489067Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:14.643157 env[1737]: time="2025-11-01T00:40:14.641703749Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:14.690788 env[1737]: time="2025-11-01T00:40:14.690689196Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:40:14.690999 env[1737]: time="2025-11-01T00:40:14.690802584Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:40:14.690999 env[1737]: time="2025-11-01T00:40:14.690859798Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:40:14.691206 env[1737]: time="2025-11-01T00:40:14.691165291Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/202db46f5e7b21bf80b786d57e14bfc3082ce9cb80ca2b448e9987817df4d652 pid=2321 runtime=io.containerd.runc.v2 Nov 1 00:40:14.706574 env[1737]: time="2025-11-01T00:40:14.705160989Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:40:14.706574 env[1737]: time="2025-11-01T00:40:14.705263705Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:40:14.706574 env[1737]: time="2025-11-01T00:40:14.705295461Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:40:14.706574 env[1737]: time="2025-11-01T00:40:14.705458474Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f0ba5dd5dbbd1837229dc1064abd869bf9de51fe9484a946f4986175144ac664 pid=2356 runtime=io.containerd.runc.v2 Nov 1 00:40:14.712777 env[1737]: time="2025-11-01T00:40:14.712633711Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:40:14.715064 env[1737]: time="2025-11-01T00:40:14.712724107Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:40:14.715064 env[1737]: time="2025-11-01T00:40:14.713020981Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:40:14.715064 env[1737]: time="2025-11-01T00:40:14.713319291Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bcfd8100abc1c014c765ae7d8303a2bcbd33ccc3a5a15188b1ff33f4d2f72577 pid=2339 runtime=io.containerd.runc.v2 Nov 1 00:40:14.733803 systemd[1]: Started cri-containerd-202db46f5e7b21bf80b786d57e14bfc3082ce9cb80ca2b448e9987817df4d652.scope. Nov 1 00:40:14.762808 systemd[1]: Started cri-containerd-f0ba5dd5dbbd1837229dc1064abd869bf9de51fe9484a946f4986175144ac664.scope. Nov 1 00:40:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.777001 kernel: audit: type=1400 audit(1761957614.767:462): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.777117 kernel: audit: type=1400 audit(1761957614.767:463): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.787033 kernel: audit: type=1400 audit(1761957614.767:464): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.802151 kernel: audit: type=1400 audit(1761957614.767:465): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.817529 kernel: audit: type=1400 audit(1761957614.767:466): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.817710 kernel: audit: type=1400 audit(1761957614.767:467): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.767000 audit: BPF prog-id=61 op=LOAD Nov 1 00:40:14.776000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.776000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2321 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230326462343666356537623231626638306237383664353765313462 Nov 1 00:40:14.776000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.776000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2321 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230326462343666356537623231626638306237383664353765313462 Nov 1 00:40:14.776000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.776000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.776000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.776000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.776000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.776000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.776000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.776000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.776000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.776000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.776000 audit: BPF prog-id=62 op=LOAD Nov 1 00:40:14.776000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002931b0 items=0 ppid=2321 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230326462343666356537623231626638306237383664353765313462 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit: BPF prog-id=63 op=LOAD Nov 1 00:40:14.792000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002931f8 items=0 ppid=2321 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230326462343666356537623231626638306237383664353765313462 Nov 1 00:40:14.792000 audit: BPF prog-id=63 op=UNLOAD Nov 1 00:40:14.792000 audit: BPF prog-id=62 op=UNLOAD Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { perfmon } for pid=2340 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit[2340]: AVC avc: denied { bpf } for pid=2340 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.792000 audit: BPF prog-id=64 op=LOAD Nov 1 00:40:14.792000 audit[2340]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000293608 items=0 ppid=2321 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230326462343666356537623231626638306237383664353765313462 Nov 1 00:40:14.824700 systemd[1]: Started cri-containerd-bcfd8100abc1c014c765ae7d8303a2bcbd33ccc3a5a15188b1ff33f4d2f72577.scope. Nov 1 00:40:14.839146 kubelet[2280]: E1101 00:40:14.839081 2280 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://172.31.19.190:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.19.190:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Nov 1 00:40:14.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.840000 audit: BPF prog-id=65 op=LOAD Nov 1 00:40:14.841000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.841000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2356 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630626135646435646262643138333732323964633130363461626438 Nov 1 00:40:14.841000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.841000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2356 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630626135646435646262643138333732323964633130363461626438 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit: BPF prog-id=66 op=LOAD Nov 1 00:40:14.844000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003549a0 items=0 ppid=2356 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630626135646435646262643138333732323964633130363461626438 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit: BPF prog-id=67 op=LOAD Nov 1 00:40:14.844000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003549e8 items=0 ppid=2356 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630626135646435646262643138333732323964633130363461626438 Nov 1 00:40:14.844000 audit: BPF prog-id=67 op=UNLOAD Nov 1 00:40:14.844000 audit: BPF prog-id=66 op=UNLOAD Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { perfmon } for pid=2368 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit[2368]: AVC avc: denied { bpf } for pid=2368 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.844000 audit: BPF prog-id=68 op=LOAD Nov 1 00:40:14.844000 audit[2368]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000354df8 items=0 ppid=2356 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630626135646435646262643138333732323964633130363461626438 Nov 1 00:40:14.848072 kubelet[2280]: E1101 00:40:14.847392 2280 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://172.31.19.190:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.31.19.190:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Nov 1 00:40:14.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.857000 audit: BPF prog-id=69 op=LOAD Nov 1 00:40:14.859000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.859000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2339 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666438313030616263316330313463373635616537643833303361 Nov 1 00:40:14.859000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.859000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2339 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666438313030616263316330313463373635616537643833303361 Nov 1 00:40:14.859000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.859000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.859000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.859000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.859000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.859000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.859000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.859000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.859000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.859000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.859000 audit: BPF prog-id=70 op=LOAD Nov 1 00:40:14.859000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003010c0 items=0 ppid=2339 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666438313030616263316330313463373635616537643833303361 Nov 1 00:40:14.861000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.861000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.861000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.861000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.861000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.861000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.861000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.861000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.861000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.861000 audit: BPF prog-id=71 op=LOAD Nov 1 00:40:14.861000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000301108 items=0 ppid=2339 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666438313030616263316330313463373635616537643833303361 Nov 1 00:40:14.861000 audit: BPF prog-id=71 op=UNLOAD Nov 1 00:40:14.861000 audit: BPF prog-id=70 op=UNLOAD Nov 1 00:40:14.862000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.862000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.862000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.862000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.862000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.862000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.862000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.862000 audit[2382]: AVC avc: denied { perfmon } for pid=2382 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.862000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.862000 audit[2382]: AVC avc: denied { bpf } for pid=2382 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:14.862000 audit: BPF prog-id=72 op=LOAD Nov 1 00:40:14.862000 audit[2382]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000301518 items=0 ppid=2339 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:14.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666438313030616263316330313463373635616537643833303361 Nov 1 00:40:14.888001 env[1737]: time="2025-11-01T00:40:14.887919330Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-19-190,Uid:2a0b87d3c77d10fafed8a458b6d7f094,Namespace:kube-system,Attempt:0,} returns sandbox id \"202db46f5e7b21bf80b786d57e14bfc3082ce9cb80ca2b448e9987817df4d652\"" Nov 1 00:40:14.896417 env[1737]: time="2025-11-01T00:40:14.896283909Z" level=info msg="CreateContainer within sandbox \"202db46f5e7b21bf80b786d57e14bfc3082ce9cb80ca2b448e9987817df4d652\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Nov 1 00:40:14.937434 env[1737]: time="2025-11-01T00:40:14.937362651Z" level=info msg="CreateContainer within sandbox \"202db46f5e7b21bf80b786d57e14bfc3082ce9cb80ca2b448e9987817df4d652\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"386949935e6c445d65c0e2f9188632a411abd996c885f9408287cd24a3ad8ad8\"" Nov 1 00:40:14.939849 env[1737]: time="2025-11-01T00:40:14.939230299Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-19-190,Uid:72d72c808a7354006f6993a4a3e7e50b,Namespace:kube-system,Attempt:0,} returns sandbox id \"f0ba5dd5dbbd1837229dc1064abd869bf9de51fe9484a946f4986175144ac664\"" Nov 1 00:40:14.940517 env[1737]: time="2025-11-01T00:40:14.940478557Z" level=info msg="StartContainer for \"386949935e6c445d65c0e2f9188632a411abd996c885f9408287cd24a3ad8ad8\"" Nov 1 00:40:14.947549 env[1737]: time="2025-11-01T00:40:14.947500253Z" level=info msg="CreateContainer within sandbox \"f0ba5dd5dbbd1837229dc1064abd869bf9de51fe9484a946f4986175144ac664\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Nov 1 00:40:14.962095 env[1737]: time="2025-11-01T00:40:14.961582083Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-19-190,Uid:8d82f13a7b279548fccf7cb1605134e4,Namespace:kube-system,Attempt:0,} returns sandbox id \"bcfd8100abc1c014c765ae7d8303a2bcbd33ccc3a5a15188b1ff33f4d2f72577\"" Nov 1 00:40:14.968044 env[1737]: time="2025-11-01T00:40:14.967990736Z" level=info msg="CreateContainer within sandbox \"bcfd8100abc1c014c765ae7d8303a2bcbd33ccc3a5a15188b1ff33f4d2f72577\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Nov 1 00:40:14.976826 env[1737]: time="2025-11-01T00:40:14.976752939Z" level=info msg="CreateContainer within sandbox \"f0ba5dd5dbbd1837229dc1064abd869bf9de51fe9484a946f4986175144ac664\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"106dbbb844b10835571ed25ae2185a23b21cf031fd14a7360fcf7a2801080c0b\"" Nov 1 00:40:14.979088 systemd[1]: Started cri-containerd-386949935e6c445d65c0e2f9188632a411abd996c885f9408287cd24a3ad8ad8.scope. Nov 1 00:40:14.986258 env[1737]: time="2025-11-01T00:40:14.981473934Z" level=info msg="StartContainer for \"106dbbb844b10835571ed25ae2185a23b21cf031fd14a7360fcf7a2801080c0b\"" Nov 1 00:40:14.986953 kubelet[2280]: E1101 00:40:14.986879 2280 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.190:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-190?timeout=10s\": dial tcp 172.31.19.190:6443: connect: connection refused" interval="1.6s" Nov 1 00:40:15.000391 env[1737]: time="2025-11-01T00:40:15.000331580Z" level=info msg="CreateContainer within sandbox \"bcfd8100abc1c014c765ae7d8303a2bcbd33ccc3a5a15188b1ff33f4d2f72577\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d57b7db80f3c10aa8825789ffb0f2d7d2a3341737935cddbbc5ee6fe40ef20b3\"" Nov 1 00:40:15.006345 env[1737]: time="2025-11-01T00:40:15.006294074Z" level=info msg="StartContainer for \"d57b7db80f3c10aa8825789ffb0f2d7d2a3341737935cddbbc5ee6fe40ef20b3\"" Nov 1 00:40:15.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.012000 audit: BPF prog-id=73 op=LOAD Nov 1 00:40:15.014000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.014000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2321 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338363934393933356536633434356436356330653266393138383633 Nov 1 00:40:15.014000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.014000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2321 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338363934393933356536633434356436356330653266393138383633 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit: BPF prog-id=74 op=LOAD Nov 1 00:40:15.015000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000392450 items=0 ppid=2321 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338363934393933356536633434356436356330653266393138383633 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.015000 audit: BPF prog-id=75 op=LOAD Nov 1 00:40:15.015000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000392498 items=0 ppid=2321 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338363934393933356536633434356436356330653266393138383633 Nov 1 00:40:15.016000 audit: BPF prog-id=75 op=UNLOAD Nov 1 00:40:15.016000 audit: BPF prog-id=74 op=UNLOAD Nov 1 00:40:15.016000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.016000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.016000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.016000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.016000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.016000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.016000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.016000 audit[2445]: AVC avc: denied { perfmon } for pid=2445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.016000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.016000 audit[2445]: AVC avc: denied { bpf } for pid=2445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.016000 audit: BPF prog-id=76 op=LOAD Nov 1 00:40:15.016000 audit[2445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003928a8 items=0 ppid=2321 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338363934393933356536633434356436356330653266393138383633 Nov 1 00:40:15.023252 systemd[1]: Started cri-containerd-106dbbb844b10835571ed25ae2185a23b21cf031fd14a7360fcf7a2801080c0b.scope. Nov 1 00:40:15.059909 systemd[1]: Started cri-containerd-d57b7db80f3c10aa8825789ffb0f2d7d2a3341737935cddbbc5ee6fe40ef20b3.scope. Nov 1 00:40:15.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.079000 audit: BPF prog-id=77 op=LOAD Nov 1 00:40:15.080000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.080000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2356 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130366462626238343462313038333535373165643235616532313835 Nov 1 00:40:15.083000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.083000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2356 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130366462626238343462313038333535373165643235616532313835 Nov 1 00:40:15.084000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.084000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.084000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.084000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.084000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.084000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.084000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.084000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.084000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.084000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.084000 audit: BPF prog-id=78 op=LOAD Nov 1 00:40:15.084000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001cbe90 items=0 ppid=2356 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130366462626238343462313038333535373165643235616532313835 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit: BPF prog-id=79 op=LOAD Nov 1 00:40:15.085000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001cbed8 items=0 ppid=2356 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130366462626238343462313038333535373165643235616532313835 Nov 1 00:40:15.085000 audit: BPF prog-id=79 op=UNLOAD Nov 1 00:40:15.085000 audit: BPF prog-id=78 op=UNLOAD Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.085000 audit: BPF prog-id=80 op=LOAD Nov 1 00:40:15.085000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0004022e8 items=0 ppid=2356 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130366462626238343462313038333535373165643235616532313835 Nov 1 00:40:15.093510 env[1737]: time="2025-11-01T00:40:15.093453501Z" level=info msg="StartContainer for \"386949935e6c445d65c0e2f9188632a411abd996c885f9408287cd24a3ad8ad8\" returns successfully" Nov 1 00:40:15.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit: BPF prog-id=81 op=LOAD Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2339 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376237646238306633633130616138383235373839666662306632 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2339 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376237646238306633633130616138383235373839666662306632 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit: BPF prog-id=82 op=LOAD Nov 1 00:40:15.121000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000314370 items=0 ppid=2339 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376237646238306633633130616138383235373839666662306632 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit: BPF prog-id=83 op=LOAD Nov 1 00:40:15.121000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003143b8 items=0 ppid=2339 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376237646238306633633130616138383235373839666662306632 Nov 1 00:40:15.121000 audit: BPF prog-id=83 op=UNLOAD Nov 1 00:40:15.121000 audit: BPF prog-id=82 op=UNLOAD Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { perfmon } for pid=2487 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit[2487]: AVC avc: denied { bpf } for pid=2487 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:15.121000 audit: BPF prog-id=84 op=LOAD Nov 1 00:40:15.121000 audit[2487]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003147c8 items=0 ppid=2339 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:15.121000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376237646238306633633130616138383235373839666662306632 Nov 1 00:40:15.151713 env[1737]: time="2025-11-01T00:40:15.151465051Z" level=info msg="StartContainer for \"106dbbb844b10835571ed25ae2185a23b21cf031fd14a7360fcf7a2801080c0b\" returns successfully" Nov 1 00:40:15.180905 env[1737]: time="2025-11-01T00:40:15.180847503Z" level=info msg="StartContainer for \"d57b7db80f3c10aa8825789ffb0f2d7d2a3341737935cddbbc5ee6fe40ef20b3\" returns successfully" Nov 1 00:40:15.191735 kubelet[2280]: I1101 00:40:15.191107 2280 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-19-190" Nov 1 00:40:15.191735 kubelet[2280]: E1101 00:40:15.191696 2280 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.19.190:6443/api/v1/nodes\": dial tcp 172.31.19.190:6443: connect: connection refused" node="ip-172-31-19-190" Nov 1 00:40:15.452576 kubelet[2280]: E1101 00:40:15.452449 2280 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://172.31.19.190:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.31.19.190:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Nov 1 00:40:15.645414 kubelet[2280]: E1101 00:40:15.645274 2280 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-19-190\" not found" node="ip-172-31-19-190" Nov 1 00:40:15.663499 kubelet[2280]: E1101 00:40:15.663468 2280 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-19-190\" not found" node="ip-172-31-19-190" Nov 1 00:40:15.669156 kubelet[2280]: E1101 00:40:15.669123 2280 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-19-190\" not found" node="ip-172-31-19-190" Nov 1 00:40:16.588482 kubelet[2280]: E1101 00:40:16.588430 2280 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.19.190:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-190?timeout=10s\": dial tcp 172.31.19.190:6443: connect: connection refused" interval="3.2s" Nov 1 00:40:16.616446 kubelet[2280]: E1101 00:40:16.616397 2280 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://172.31.19.190:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.31.19.190:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Nov 1 00:40:16.669990 kubelet[2280]: E1101 00:40:16.669935 2280 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-19-190\" not found" node="ip-172-31-19-190" Nov 1 00:40:16.670629 kubelet[2280]: E1101 00:40:16.670610 2280 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-19-190\" not found" node="ip-172-31-19-190" Nov 1 00:40:16.721407 kubelet[2280]: E1101 00:40:16.721363 2280 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://172.31.19.190:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-19-190&limit=500&resourceVersion=0\": dial tcp 172.31.19.190:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Nov 1 00:40:16.730853 kubelet[2280]: E1101 00:40:16.730819 2280 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"ip-172-31-19-190\" not found" node="ip-172-31-19-190" Nov 1 00:40:16.793733 kubelet[2280]: I1101 00:40:16.793708 2280 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-19-190" Nov 1 00:40:16.794464 kubelet[2280]: E1101 00:40:16.794434 2280 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://172.31.19.190:6443/api/v1/nodes\": dial tcp 172.31.19.190:6443: connect: connection refused" node="ip-172-31-19-190" Nov 1 00:40:16.920084 update_engine[1732]: I1101 00:40:16.920032 1732 update_attempter.cc:509] Updating boot flags... Nov 1 00:40:17.953000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:17.953000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000b0a2a0 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:40:17.953000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:40:17.954000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:17.954000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000076e40 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:40:17.954000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:40:19.142404 amazon-ssm-agent[1716]: 2025-11-01 00:40:19 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Nov 1 00:40:19.997283 kubelet[2280]: I1101 00:40:19.997250 2280 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-19-190" Nov 1 00:40:20.407019 kernel: kauditd_printk_skb: 342 callbacks suppressed Nov 1 00:40:20.407215 kernel: audit: type=1400 audit(1761957620.403:572): avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:20.403000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:20.403000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0042755f0 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:40:20.428240 kernel: audit: type=1300 audit(1761957620.403:572): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0042755f0 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:40:20.403000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:40:20.457039 kernel: audit: type=1327 audit(1761957620.403:572): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:40:20.403000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:20.470208 kernel: audit: type=1400 audit(1761957620.403:573): avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:20.403000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004275650 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:40:20.498018 kernel: audit: type=1300 audit(1761957620.403:573): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004275650 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:40:20.403000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:40:20.403000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:20.518705 kernel: audit: type=1327 audit(1761957620.403:573): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:40:20.518874 kernel: audit: type=1400 audit(1761957620.403:574): avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:20.518927 kernel: audit: type=1300 audit(1761957620.403:574): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0050a2740 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:40:20.403000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0050a2740 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:40:20.403000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:40:20.542553 kernel: audit: type=1327 audit(1761957620.403:574): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:40:20.414000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524014 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:20.554858 kernel: audit: type=1400 audit(1761957620.414:575): avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524014 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:20.414000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c0043a0a50 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:40:20.414000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:40:20.437000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:20.437000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0063f0b40 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:40:20.437000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:40:20.437000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:20.437000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0040c8900 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:40:20.437000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:40:20.627692 kubelet[2280]: E1101 00:40:20.627652 2280 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-19-190\" not found" node="ip-172-31-19-190" Nov 1 00:40:20.723112 kubelet[2280]: I1101 00:40:20.722952 2280 kubelet_node_status.go:78] "Successfully registered node" node="ip-172-31-19-190" Nov 1 00:40:20.723112 kubelet[2280]: E1101 00:40:20.723021 2280 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"ip-172-31-19-190\": node \"ip-172-31-19-190\" not found" Nov 1 00:40:20.742078 kubelet[2280]: E1101 00:40:20.742035 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:20.842493 kubelet[2280]: E1101 00:40:20.842446 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:20.943696 kubelet[2280]: E1101 00:40:20.943538 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:21.044130 kubelet[2280]: E1101 00:40:21.043995 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:21.145170 kubelet[2280]: E1101 00:40:21.145106 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:21.246113 kubelet[2280]: E1101 00:40:21.246057 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:21.346575 kubelet[2280]: E1101 00:40:21.346540 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:21.448274 kubelet[2280]: E1101 00:40:21.447927 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:21.550376 kubelet[2280]: E1101 00:40:21.550330 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:21.651371 kubelet[2280]: E1101 00:40:21.651253 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:21.751872 kubelet[2280]: E1101 00:40:21.751826 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:21.853306 kubelet[2280]: E1101 00:40:21.853260 2280 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:21.971270 kubelet[2280]: I1101 00:40:21.971147 2280 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:21.996299 kubelet[2280]: I1101 00:40:21.996264 2280 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-19-190" Nov 1 00:40:22.002763 kubelet[2280]: I1101 00:40:22.002727 2280 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ip-172-31-19-190" Nov 1 00:40:22.080705 kubelet[2280]: I1101 00:40:22.080669 2280 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-19-190" Nov 1 00:40:22.090749 kubelet[2280]: E1101 00:40:22.090708 2280 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ip-172-31-19-190\" already exists" pod="kube-system/kube-scheduler-ip-172-31-19-190" Nov 1 00:40:22.487242 kubelet[2280]: I1101 00:40:22.487199 2280 apiserver.go:52] "Watching apiserver" Nov 1 00:40:22.579315 kubelet[2280]: I1101 00:40:22.579265 2280 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Nov 1 00:40:23.241000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:23.241000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00088d600 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:40:23.241000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:40:23.244000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:23.244000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00088d7c0 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:40:23.244000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:40:23.246000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:23.246000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00088d980 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:40:23.246000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:40:23.249000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:40:23.249000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00088db40 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:40:23.249000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:40:23.381000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=524039 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Nov 1 00:40:23.381000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b3eb00 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:40:23.381000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:40:23.480858 systemd[1]: Reloading. Nov 1 00:40:23.694047 kubelet[2280]: I1101 00:40:23.690677 2280 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ip-172-31-19-190" podStartSLOduration=1.6906485519999999 podStartE2EDuration="1.690648552s" podCreationTimestamp="2025-11-01 00:40:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-11-01 00:40:23.673746643 +0000 UTC m=+11.723956329" watchObservedRunningTime="2025-11-01 00:40:23.690648552 +0000 UTC m=+11.740858236" Nov 1 00:40:23.712125 kubelet[2280]: I1101 00:40:23.712035 2280 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-19-190" podStartSLOduration=2.710877721 podStartE2EDuration="2.710877721s" podCreationTimestamp="2025-11-01 00:40:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-11-01 00:40:23.691186502 +0000 UTC m=+11.741396188" watchObservedRunningTime="2025-11-01 00:40:23.710877721 +0000 UTC m=+11.761087407" Nov 1 00:40:23.746633 /usr/lib/systemd/system-generators/torcx-generator[2673]: time="2025-11-01T00:40:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 00:40:23.747905 /usr/lib/systemd/system-generators/torcx-generator[2673]: time="2025-11-01T00:40:23Z" level=info msg="torcx already run" Nov 1 00:40:23.887583 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 00:40:23.887829 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 00:40:23.917845 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 00:40:24.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.051000 audit: BPF prog-id=85 op=LOAD Nov 1 00:40:24.051000 audit: BPF prog-id=46 op=UNLOAD Nov 1 00:40:24.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit: BPF prog-id=86 op=LOAD Nov 1 00:40:24.053000 audit: BPF prog-id=47 op=UNLOAD Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit: BPF prog-id=87 op=LOAD Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.053000 audit: BPF prog-id=88 op=LOAD Nov 1 00:40:24.053000 audit: BPF prog-id=48 op=UNLOAD Nov 1 00:40:24.053000 audit: BPF prog-id=49 op=UNLOAD Nov 1 00:40:24.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.054000 audit: BPF prog-id=89 op=LOAD Nov 1 00:40:24.054000 audit: BPF prog-id=73 op=UNLOAD Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit: BPF prog-id=90 op=LOAD Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.058000 audit: BPF prog-id=91 op=LOAD Nov 1 00:40:24.058000 audit: BPF prog-id=50 op=UNLOAD Nov 1 00:40:24.058000 audit: BPF prog-id=51 op=UNLOAD Nov 1 00:40:24.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.059000 audit: BPF prog-id=92 op=LOAD Nov 1 00:40:24.060000 audit: BPF prog-id=61 op=UNLOAD Nov 1 00:40:24.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.061000 audit: BPF prog-id=93 op=LOAD Nov 1 00:40:24.061000 audit: BPF prog-id=52 op=UNLOAD Nov 1 00:40:24.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.061000 audit: BPF prog-id=94 op=LOAD Nov 1 00:40:24.062000 audit: BPF prog-id=69 op=UNLOAD Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit: BPF prog-id=95 op=LOAD Nov 1 00:40:24.063000 audit: BPF prog-id=53 op=UNLOAD Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit: BPF prog-id=96 op=LOAD Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.063000 audit: BPF prog-id=97 op=LOAD Nov 1 00:40:24.063000 audit: BPF prog-id=54 op=UNLOAD Nov 1 00:40:24.063000 audit: BPF prog-id=55 op=UNLOAD Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit: BPF prog-id=98 op=LOAD Nov 1 00:40:24.067000 audit: BPF prog-id=56 op=UNLOAD Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit: BPF prog-id=99 op=LOAD Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.067000 audit: BPF prog-id=100 op=LOAD Nov 1 00:40:24.067000 audit: BPF prog-id=57 op=UNLOAD Nov 1 00:40:24.068000 audit: BPF prog-id=58 op=UNLOAD Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit: BPF prog-id=101 op=LOAD Nov 1 00:40:24.069000 audit: BPF prog-id=77 op=UNLOAD Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.070000 audit: BPF prog-id=102 op=LOAD Nov 1 00:40:24.070000 audit: BPF prog-id=59 op=UNLOAD Nov 1 00:40:24.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.070000 audit: BPF prog-id=103 op=LOAD Nov 1 00:40:24.070000 audit: BPF prog-id=65 op=UNLOAD Nov 1 00:40:24.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.071000 audit: BPF prog-id=104 op=LOAD Nov 1 00:40:24.071000 audit: BPF prog-id=60 op=UNLOAD Nov 1 00:40:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:24.072000 audit: BPF prog-id=105 op=LOAD Nov 1 00:40:24.072000 audit: BPF prog-id=81 op=UNLOAD Nov 1 00:40:24.099243 systemd[1]: Stopping kubelet.service... Nov 1 00:40:24.129430 systemd[1]: kubelet.service: Deactivated successfully. Nov 1 00:40:24.130094 systemd[1]: Stopped kubelet.service. Nov 1 00:40:24.130187 systemd[1]: kubelet.service: Consumed 1.574s CPU time. Nov 1 00:40:24.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:24.137396 systemd[1]: Starting kubelet.service... Nov 1 00:40:26.538216 systemd[1]: Started kubelet.service. Nov 1 00:40:26.566262 kernel: kauditd_printk_skb: 268 callbacks suppressed Nov 1 00:40:26.566466 kernel: audit: type=1130 audit(1761957626.538:828): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:26.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:26.687802 kubelet[2730]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:40:26.688658 kubelet[2730]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Nov 1 00:40:26.688827 kubelet[2730]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 00:40:26.689146 kubelet[2730]: I1101 00:40:26.689094 2730 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Nov 1 00:40:26.701583 kubelet[2730]: I1101 00:40:26.701534 2730 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Nov 1 00:40:26.701583 kubelet[2730]: I1101 00:40:26.701572 2730 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Nov 1 00:40:26.701935 kubelet[2730]: I1101 00:40:26.701909 2730 server.go:956] "Client rotation is on, will bootstrap in background" Nov 1 00:40:26.704551 kubelet[2730]: I1101 00:40:26.703834 2730 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" Nov 1 00:40:26.707222 kubelet[2730]: I1101 00:40:26.707171 2730 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Nov 1 00:40:26.723896 kubelet[2730]: E1101 00:40:26.723856 2730 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Nov 1 00:40:26.724166 kubelet[2730]: I1101 00:40:26.724150 2730 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Nov 1 00:40:26.727218 kubelet[2730]: I1101 00:40:26.727191 2730 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Nov 1 00:40:26.727798 kubelet[2730]: I1101 00:40:26.727761 2730 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Nov 1 00:40:26.728182 kubelet[2730]: I1101 00:40:26.727918 2730 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ip-172-31-19-190","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Nov 1 00:40:26.728387 kubelet[2730]: I1101 00:40:26.728373 2730 topology_manager.go:138] "Creating topology manager with none policy" Nov 1 00:40:26.728455 kubelet[2730]: I1101 00:40:26.728449 2730 container_manager_linux.go:303] "Creating device plugin manager" Nov 1 00:40:26.728549 kubelet[2730]: I1101 00:40:26.728543 2730 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:40:26.728779 kubelet[2730]: I1101 00:40:26.728766 2730 kubelet.go:480] "Attempting to sync node with API server" Nov 1 00:40:26.728890 kubelet[2730]: I1101 00:40:26.728879 2730 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Nov 1 00:40:26.729014 kubelet[2730]: I1101 00:40:26.729003 2730 kubelet.go:386] "Adding apiserver pod source" Nov 1 00:40:26.729129 kubelet[2730]: I1101 00:40:26.729118 2730 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Nov 1 00:40:26.786651 kubelet[2730]: I1101 00:40:26.786614 2730 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Nov 1 00:40:26.801254 kubelet[2730]: I1101 00:40:26.801131 2730 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Nov 1 00:40:26.804500 kubelet[2730]: I1101 00:40:26.804475 2730 watchdog_linux.go:99] "Systemd watchdog is not enabled" Nov 1 00:40:26.804788 kubelet[2730]: I1101 00:40:26.804773 2730 server.go:1289] "Started kubelet" Nov 1 00:40:26.824795 kubelet[2730]: I1101 00:40:26.824739 2730 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Nov 1 00:40:26.830391 kubelet[2730]: I1101 00:40:26.830309 2730 server.go:317] "Adding debug handlers to kubelet server" Nov 1 00:40:26.836000 audit[2730]: AVC avc: denied { mac_admin } for pid=2730 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:26.840163 kubelet[2730]: I1101 00:40:26.837140 2730 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Nov 1 00:40:26.840163 kubelet[2730]: I1101 00:40:26.837413 2730 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Nov 1 00:40:26.840163 kubelet[2730]: I1101 00:40:26.837937 2730 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Nov 1 00:40:26.840163 kubelet[2730]: I1101 00:40:26.838001 2730 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Nov 1 00:40:26.842046 kubelet[2730]: I1101 00:40:26.842010 2730 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Nov 1 00:40:26.847474 kernel: audit: type=1400 audit(1761957626.836:829): avc: denied { mac_admin } for pid=2730 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:26.847963 kernel: audit: type=1401 audit(1761957626.836:829): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:40:26.836000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:40:26.858009 kernel: audit: type=1300 audit(1761957626.836:829): arch=c000003e syscall=188 success=no exit=-22 a0=c00012fec0 a1=c000af56c8 a2=c00012fe90 a3=25 items=0 ppid=1 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:26.836000 audit[2730]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00012fec0 a1=c000af56c8 a2=c00012fe90 a3=25 items=0 ppid=1 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:26.836000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:40:26.873513 kernel: audit: type=1327 audit(1761957626.836:829): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:40:26.873918 kernel: audit: type=1400 audit(1761957626.836:830): avc: denied { mac_admin } for pid=2730 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:26.836000 audit[2730]: AVC avc: denied { mac_admin } for pid=2730 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:26.877377 kubelet[2730]: I1101 00:40:26.877332 2730 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Nov 1 00:40:26.881551 kubelet[2730]: I1101 00:40:26.881518 2730 volume_manager.go:297] "Starting Kubelet Volume Manager" Nov 1 00:40:26.886818 kernel: audit: type=1401 audit(1761957626.836:830): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:40:26.836000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:40:26.887055 kubelet[2730]: E1101 00:40:26.882117 2730 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"ip-172-31-19-190\" not found" Nov 1 00:40:26.887055 kubelet[2730]: I1101 00:40:26.885826 2730 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Nov 1 00:40:26.887055 kubelet[2730]: I1101 00:40:26.885995 2730 reconciler.go:26] "Reconciler: start to sync state" Nov 1 00:40:26.836000 audit[2730]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00094b380 a1=c000af56e0 a2=c00012ffb0 a3=25 items=0 ppid=1 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:26.899399 kubelet[2730]: I1101 00:40:26.891264 2730 factory.go:223] Registration of the systemd container factory successfully Nov 1 00:40:26.899399 kubelet[2730]: I1101 00:40:26.891419 2730 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Nov 1 00:40:26.899399 kubelet[2730]: I1101 00:40:26.893666 2730 factory.go:223] Registration of the containerd container factory successfully Nov 1 00:40:26.910692 kernel: audit: type=1300 audit(1761957626.836:830): arch=c000003e syscall=188 success=no exit=-22 a0=c00094b380 a1=c000af56e0 a2=c00012ffb0 a3=25 items=0 ppid=1 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:26.910841 kernel: audit: type=1327 audit(1761957626.836:830): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:40:26.836000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:40:26.937100 kubelet[2730]: E1101 00:40:26.937044 2730 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Nov 1 00:40:26.943816 kubelet[2730]: I1101 00:40:26.943774 2730 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Nov 1 00:40:26.946526 kubelet[2730]: I1101 00:40:26.946492 2730 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Nov 1 00:40:26.946781 kubelet[2730]: I1101 00:40:26.946768 2730 status_manager.go:230] "Starting to sync pod status with apiserver" Nov 1 00:40:26.946893 kubelet[2730]: I1101 00:40:26.946882 2730 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Nov 1 00:40:26.946981 kubelet[2730]: I1101 00:40:26.946962 2730 kubelet.go:2436] "Starting kubelet main sync loop" Nov 1 00:40:26.947280 kubelet[2730]: E1101 00:40:26.947186 2730 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Nov 1 00:40:27.035492 kubelet[2730]: I1101 00:40:27.035466 2730 cpu_manager.go:221] "Starting CPU manager" policy="none" Nov 1 00:40:27.035900 kubelet[2730]: I1101 00:40:27.035884 2730 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Nov 1 00:40:27.036088 kubelet[2730]: I1101 00:40:27.036075 2730 state_mem.go:36] "Initialized new in-memory state store" Nov 1 00:40:27.036473 kubelet[2730]: I1101 00:40:27.036458 2730 state_mem.go:88] "Updated default CPUSet" cpuSet="" Nov 1 00:40:27.036596 kubelet[2730]: I1101 00:40:27.036571 2730 state_mem.go:96] "Updated CPUSet assignments" assignments={} Nov 1 00:40:27.036672 kubelet[2730]: I1101 00:40:27.036665 2730 policy_none.go:49] "None policy: Start" Nov 1 00:40:27.036751 kubelet[2730]: I1101 00:40:27.036743 2730 memory_manager.go:186] "Starting memorymanager" policy="None" Nov 1 00:40:27.036828 kubelet[2730]: I1101 00:40:27.036821 2730 state_mem.go:35] "Initializing new in-memory state store" Nov 1 00:40:27.037189 kubelet[2730]: I1101 00:40:27.037174 2730 state_mem.go:75] "Updated machine memory state" Nov 1 00:40:27.044508 kubelet[2730]: E1101 00:40:27.044485 2730 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Nov 1 00:40:27.043000 audit[2730]: AVC avc: denied { mac_admin } for pid=2730 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:27.049406 kubelet[2730]: E1101 00:40:27.049368 2730 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Nov 1 00:40:27.049728 kubelet[2730]: I1101 00:40:27.049714 2730 eviction_manager.go:189] "Eviction manager: starting control loop" Nov 1 00:40:27.049956 kubelet[2730]: I1101 00:40:27.049909 2730 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Nov 1 00:40:27.052509 kernel: audit: type=1400 audit(1761957627.043:831): avc: denied { mac_admin } for pid=2730 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:27.053875 kubelet[2730]: I1101 00:40:27.053852 2730 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Nov 1 00:40:27.043000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 00:40:27.043000 audit[2730]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f05a10 a1=c000af4c30 a2=c000f059e0 a3=25 items=0 ppid=1 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:27.043000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 00:40:27.061921 kubelet[2730]: I1101 00:40:27.061011 2730 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-19-190" Nov 1 00:40:27.061921 kubelet[2730]: E1101 00:40:27.061654 2730 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Nov 1 00:40:27.067472 kubelet[2730]: I1101 00:40:27.066713 2730 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-ip-172-31-19-190" Nov 1 00:40:27.070364 kubelet[2730]: I1101 00:40:27.070331 2730 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:27.077017 kubelet[2730]: E1101 00:40:27.076003 2730 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-ip-172-31-19-190\" already exists" pod="kube-system/kube-apiserver-ip-172-31-19-190" Nov 1 00:40:27.078587 kubelet[2730]: E1101 00:40:27.078525 2730 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ip-172-31-19-190\" already exists" pod="kube-system/kube-scheduler-ip-172-31-19-190" Nov 1 00:40:27.082944 kubelet[2730]: E1101 00:40:27.082430 2730 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-ip-172-31-19-190\" already exists" pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:27.088588 kubelet[2730]: I1101 00:40:27.087736 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/72d72c808a7354006f6993a4a3e7e50b-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-19-190\" (UID: \"72d72c808a7354006f6993a4a3e7e50b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:27.088588 kubelet[2730]: I1101 00:40:27.087804 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/72d72c808a7354006f6993a4a3e7e50b-kubeconfig\") pod \"kube-controller-manager-ip-172-31-19-190\" (UID: \"72d72c808a7354006f6993a4a3e7e50b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:27.088588 kubelet[2730]: I1101 00:40:27.087839 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2a0b87d3c77d10fafed8a458b6d7f094-ca-certs\") pod \"kube-apiserver-ip-172-31-19-190\" (UID: \"2a0b87d3c77d10fafed8a458b6d7f094\") " pod="kube-system/kube-apiserver-ip-172-31-19-190" Nov 1 00:40:27.088588 kubelet[2730]: I1101 00:40:27.087886 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2a0b87d3c77d10fafed8a458b6d7f094-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-19-190\" (UID: \"2a0b87d3c77d10fafed8a458b6d7f094\") " pod="kube-system/kube-apiserver-ip-172-31-19-190" Nov 1 00:40:27.088588 kubelet[2730]: I1101 00:40:27.087918 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/72d72c808a7354006f6993a4a3e7e50b-ca-certs\") pod \"kube-controller-manager-ip-172-31-19-190\" (UID: \"72d72c808a7354006f6993a4a3e7e50b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:27.089032 kubelet[2730]: I1101 00:40:27.087999 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/72d72c808a7354006f6993a4a3e7e50b-k8s-certs\") pod \"kube-controller-manager-ip-172-31-19-190\" (UID: \"72d72c808a7354006f6993a4a3e7e50b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:27.089032 kubelet[2730]: I1101 00:40:27.088034 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/72d72c808a7354006f6993a4a3e7e50b-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-19-190\" (UID: \"72d72c808a7354006f6993a4a3e7e50b\") " pod="kube-system/kube-controller-manager-ip-172-31-19-190" Nov 1 00:40:27.089032 kubelet[2730]: I1101 00:40:27.088081 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8d82f13a7b279548fccf7cb1605134e4-kubeconfig\") pod \"kube-scheduler-ip-172-31-19-190\" (UID: \"8d82f13a7b279548fccf7cb1605134e4\") " pod="kube-system/kube-scheduler-ip-172-31-19-190" Nov 1 00:40:27.089032 kubelet[2730]: I1101 00:40:27.088111 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2a0b87d3c77d10fafed8a458b6d7f094-k8s-certs\") pod \"kube-apiserver-ip-172-31-19-190\" (UID: \"2a0b87d3c77d10fafed8a458b6d7f094\") " pod="kube-system/kube-apiserver-ip-172-31-19-190" Nov 1 00:40:27.181141 kubelet[2730]: I1101 00:40:27.181111 2730 kubelet_node_status.go:75] "Attempting to register node" node="ip-172-31-19-190" Nov 1 00:40:27.194996 kubelet[2730]: I1101 00:40:27.194940 2730 kubelet_node_status.go:124] "Node was previously registered" node="ip-172-31-19-190" Nov 1 00:40:27.195201 kubelet[2730]: I1101 00:40:27.195073 2730 kubelet_node_status.go:78] "Successfully registered node" node="ip-172-31-19-190" Nov 1 00:40:27.730139 kubelet[2730]: I1101 00:40:27.730091 2730 apiserver.go:52] "Watching apiserver" Nov 1 00:40:27.787609 kubelet[2730]: I1101 00:40:27.787542 2730 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Nov 1 00:40:27.948779 kubelet[2730]: I1101 00:40:27.948740 2730 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Nov 1 00:40:27.949351 env[1737]: time="2025-11-01T00:40:27.949306659Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Nov 1 00:40:27.950168 kubelet[2730]: I1101 00:40:27.950142 2730 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Nov 1 00:40:27.975357 kubelet[2730]: I1101 00:40:27.975320 2730 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-ip-172-31-19-190" Nov 1 00:40:27.988570 kubelet[2730]: E1101 00:40:27.988396 2730 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-ip-172-31-19-190\" already exists" pod="kube-system/kube-scheduler-ip-172-31-19-190" Nov 1 00:40:28.803361 kubelet[2730]: I1101 00:40:28.803282 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/97ab3c07-2eb5-4072-9cf4-7800efd472ce-kube-proxy\") pod \"kube-proxy-8gxln\" (UID: \"97ab3c07-2eb5-4072-9cf4-7800efd472ce\") " pod="kube-system/kube-proxy-8gxln" Nov 1 00:40:28.803361 kubelet[2730]: I1101 00:40:28.803325 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/97ab3c07-2eb5-4072-9cf4-7800efd472ce-xtables-lock\") pod \"kube-proxy-8gxln\" (UID: \"97ab3c07-2eb5-4072-9cf4-7800efd472ce\") " pod="kube-system/kube-proxy-8gxln" Nov 1 00:40:28.803909 kubelet[2730]: I1101 00:40:28.803466 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/97ab3c07-2eb5-4072-9cf4-7800efd472ce-lib-modules\") pod \"kube-proxy-8gxln\" (UID: \"97ab3c07-2eb5-4072-9cf4-7800efd472ce\") " pod="kube-system/kube-proxy-8gxln" Nov 1 00:40:28.803909 kubelet[2730]: I1101 00:40:28.803514 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4bxk2\" (UniqueName: \"kubernetes.io/projected/97ab3c07-2eb5-4072-9cf4-7800efd472ce-kube-api-access-4bxk2\") pod \"kube-proxy-8gxln\" (UID: \"97ab3c07-2eb5-4072-9cf4-7800efd472ce\") " pod="kube-system/kube-proxy-8gxln" Nov 1 00:40:28.806801 systemd[1]: Created slice kubepods-besteffort-pod97ab3c07_2eb5_4072_9cf4_7800efd472ce.slice. Nov 1 00:40:28.927387 kubelet[2730]: I1101 00:40:28.927338 2730 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Nov 1 00:40:29.116002 env[1737]: time="2025-11-01T00:40:29.115925807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8gxln,Uid:97ab3c07-2eb5-4072-9cf4-7800efd472ce,Namespace:kube-system,Attempt:0,}" Nov 1 00:40:29.124852 systemd[1]: Created slice kubepods-besteffort-pod4d92c07c_42d9_4530_ac3b_ba7070d0c338.slice. Nov 1 00:40:29.156104 env[1737]: time="2025-11-01T00:40:29.156004091Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:40:29.156364 env[1737]: time="2025-11-01T00:40:29.156122011Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:40:29.156364 env[1737]: time="2025-11-01T00:40:29.156154509Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:40:29.156488 env[1737]: time="2025-11-01T00:40:29.156351202Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0cae9cde41a42ad28fae7ab6017367ddd9e6269d51460092a89fa4a30e1c0e63 pid=2785 runtime=io.containerd.runc.v2 Nov 1 00:40:29.187836 systemd[1]: run-containerd-runc-k8s.io-0cae9cde41a42ad28fae7ab6017367ddd9e6269d51460092a89fa4a30e1c0e63-runc.qgPKPK.mount: Deactivated successfully. Nov 1 00:40:29.193420 systemd[1]: Started cri-containerd-0cae9cde41a42ad28fae7ab6017367ddd9e6269d51460092a89fa4a30e1c0e63.scope. Nov 1 00:40:29.208856 kubelet[2730]: I1101 00:40:29.208675 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4d92c07c-42d9-4530-ac3b-ba7070d0c338-var-lib-calico\") pod \"tigera-operator-7dcd859c48-gswks\" (UID: \"4d92c07c-42d9-4530-ac3b-ba7070d0c338\") " pod="tigera-operator/tigera-operator-7dcd859c48-gswks" Nov 1 00:40:29.208856 kubelet[2730]: I1101 00:40:29.208743 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zkx9x\" (UniqueName: \"kubernetes.io/projected/4d92c07c-42d9-4530-ac3b-ba7070d0c338-kube-api-access-zkx9x\") pod \"tigera-operator-7dcd859c48-gswks\" (UID: \"4d92c07c-42d9-4530-ac3b-ba7070d0c338\") " pod="tigera-operator/tigera-operator-7dcd859c48-gswks" Nov 1 00:40:29.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.208000 audit: BPF prog-id=106 op=LOAD Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2785 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063616539636465343161343261643238666165376162363031373336 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2785 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063616539636465343161343261643238666165376162363031373336 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit: BPF prog-id=107 op=LOAD Nov 1 00:40:29.209000 audit[2795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001852e0 items=0 ppid=2785 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063616539636465343161343261643238666165376162363031373336 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.209000 audit: BPF prog-id=108 op=LOAD Nov 1 00:40:29.209000 audit[2795]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185328 items=0 ppid=2785 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063616539636465343161343261643238666165376162363031373336 Nov 1 00:40:29.210000 audit: BPF prog-id=108 op=UNLOAD Nov 1 00:40:29.210000 audit: BPF prog-id=107 op=UNLOAD Nov 1 00:40:29.210000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.210000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.210000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.210000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.210000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.210000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.210000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.210000 audit[2795]: AVC avc: denied { perfmon } for pid=2795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.210000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.210000 audit[2795]: AVC avc: denied { bpf } for pid=2795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.210000 audit: BPF prog-id=109 op=LOAD Nov 1 00:40:29.210000 audit[2795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185738 items=0 ppid=2785 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063616539636465343161343261643238666165376162363031373336 Nov 1 00:40:29.229101 env[1737]: time="2025-11-01T00:40:29.229046363Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8gxln,Uid:97ab3c07-2eb5-4072-9cf4-7800efd472ce,Namespace:kube-system,Attempt:0,} returns sandbox id \"0cae9cde41a42ad28fae7ab6017367ddd9e6269d51460092a89fa4a30e1c0e63\"" Nov 1 00:40:29.244020 env[1737]: time="2025-11-01T00:40:29.243961315Z" level=info msg="CreateContainer within sandbox \"0cae9cde41a42ad28fae7ab6017367ddd9e6269d51460092a89fa4a30e1c0e63\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Nov 1 00:40:29.293364 env[1737]: time="2025-11-01T00:40:29.293299225Z" level=info msg="CreateContainer within sandbox \"0cae9cde41a42ad28fae7ab6017367ddd9e6269d51460092a89fa4a30e1c0e63\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"23d68235c7ed8ca981db371beac2389f6e0573794c565b6428fd438968d410bd\"" Nov 1 00:40:29.307538 env[1737]: time="2025-11-01T00:40:29.307447801Z" level=info msg="StartContainer for \"23d68235c7ed8ca981db371beac2389f6e0573794c565b6428fd438968d410bd\"" Nov 1 00:40:29.366438 systemd[1]: Started cri-containerd-23d68235c7ed8ca981db371beac2389f6e0573794c565b6428fd438968d410bd.scope. Nov 1 00:40:29.390000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.390000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7ffa4535c328 items=0 ppid=2785 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643638323335633765643863613938316462333731626561633233 Nov 1 00:40:29.390000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.390000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.390000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.390000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.390000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.390000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.390000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.390000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.390000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.390000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.390000 audit: BPF prog-id=110 op=LOAD Nov 1 00:40:29.390000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001e7ee8 items=0 ppid=2785 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643638323335633765643863613938316462333731626561633233 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit: BPF prog-id=111 op=LOAD Nov 1 00:40:29.391000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001e7f38 items=0 ppid=2785 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643638323335633765643863613938316462333731626561633233 Nov 1 00:40:29.391000 audit: BPF prog-id=111 op=UNLOAD Nov 1 00:40:29.391000 audit: BPF prog-id=110 op=UNLOAD Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.391000 audit: BPF prog-id=112 op=LOAD Nov 1 00:40:29.391000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001e7fc8 items=0 ppid=2785 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233643638323335633765643863613938316462333731626561633233 Nov 1 00:40:29.417206 env[1737]: time="2025-11-01T00:40:29.416030137Z" level=info msg="StartContainer for \"23d68235c7ed8ca981db371beac2389f6e0573794c565b6428fd438968d410bd\" returns successfully" Nov 1 00:40:29.434392 env[1737]: time="2025-11-01T00:40:29.434334337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-gswks,Uid:4d92c07c-42d9-4530-ac3b-ba7070d0c338,Namespace:tigera-operator,Attempt:0,}" Nov 1 00:40:29.490020 env[1737]: time="2025-11-01T00:40:29.489881884Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:40:29.490020 env[1737]: time="2025-11-01T00:40:29.489937263Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:40:29.490020 env[1737]: time="2025-11-01T00:40:29.489952841Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:40:29.490634 env[1737]: time="2025-11-01T00:40:29.490465729Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/57edb93b9f61e49d71e80ad7994c75d7368bdb519dc8d23f26d584dc1824ae1f pid=2858 runtime=io.containerd.runc.v2 Nov 1 00:40:29.506722 systemd[1]: Started cri-containerd-57edb93b9f61e49d71e80ad7994c75d7368bdb519dc8d23f26d584dc1824ae1f.scope. Nov 1 00:40:29.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.527000 audit: BPF prog-id=113 op=LOAD Nov 1 00:40:29.528000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.528000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656462393362396636316534396437316538306164373939346337 Nov 1 00:40:29.528000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.528000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656462393362396636316534396437316538306164373939346337 Nov 1 00:40:29.529000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.529000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.529000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.529000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.529000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.529000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.529000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.529000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.529000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.529000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.529000 audit: BPF prog-id=114 op=LOAD Nov 1 00:40:29.529000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a1760 items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656462393362396636316534396437316538306164373939346337 Nov 1 00:40:29.530000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.530000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.530000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.530000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.530000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.530000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.530000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.530000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.530000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.530000 audit: BPF prog-id=115 op=LOAD Nov 1 00:40:29.530000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a17a8 items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656462393362396636316534396437316538306164373939346337 Nov 1 00:40:29.531000 audit: BPF prog-id=115 op=UNLOAD Nov 1 00:40:29.531000 audit: BPF prog-id=114 op=UNLOAD Nov 1 00:40:29.531000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.531000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.531000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.531000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.531000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.531000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.531000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.531000 audit[2868]: AVC avc: denied { perfmon } for pid=2868 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.531000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.531000 audit[2868]: AVC avc: denied { bpf } for pid=2868 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:29.531000 audit: BPF prog-id=116 op=LOAD Nov 1 00:40:29.531000 audit[2868]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a1bb8 items=0 ppid=2858 pid=2868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:29.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537656462393362396636316534396437316538306164373939346337 Nov 1 00:40:29.569841 env[1737]: time="2025-11-01T00:40:29.569792022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-gswks,Uid:4d92c07c-42d9-4530-ac3b-ba7070d0c338,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"57edb93b9f61e49d71e80ad7994c75d7368bdb519dc8d23f26d584dc1824ae1f\"" Nov 1 00:40:29.574135 env[1737]: time="2025-11-01T00:40:29.574095234Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\"" Nov 1 00:40:30.861000 audit[2933]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2933 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:30.861000 audit[2933]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8ba198a0 a2=0 a3=7ffe8ba1988c items=0 ppid=2837 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:30.861000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 00:40:30.863000 audit[2932]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:30.863000 audit[2932]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd16057b70 a2=0 a3=7ffd16057b5c items=0 ppid=2837 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:30.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 00:40:30.866000 audit[2934]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:30.866000 audit[2934]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5b193f00 a2=0 a3=7ffd5b193eec items=0 ppid=2837 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:30.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 00:40:30.867000 audit[2935]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:30.867000 audit[2935]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff30bb14a0 a2=0 a3=7fff30bb148c items=0 ppid=2837 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:30.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 00:40:30.869000 audit[2936]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:30.869000 audit[2936]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcf06747f0 a2=0 a3=7ffcf06747dc items=0 ppid=2837 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:30.869000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 00:40:30.872000 audit[2937]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:30.872000 audit[2937]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff39b94d90 a2=0 a3=7fff39b94d7c items=0 ppid=2837 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:30.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 00:40:30.974000 audit[2940]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:30.974000 audit[2940]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff9bd29900 a2=0 a3=7fff9bd298ec items=0 ppid=2837 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:30.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 00:40:30.997000 audit[2942]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:30.997000 audit[2942]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff075bff10 a2=0 a3=7fff075bfefc items=0 ppid=2837 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:30.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Nov 1 00:40:31.010000 audit[2945]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.010000 audit[2945]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcfc122230 a2=0 a3=7ffcfc12221c items=0 ppid=2837 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Nov 1 00:40:31.013000 audit[2946]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.013000 audit[2946]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebd2d2a60 a2=0 a3=7ffebd2d2a4c items=0 ppid=2837 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 00:40:31.027000 audit[2948]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.027000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff76875130 a2=0 a3=7fff7687511c items=0 ppid=2837 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 00:40:31.037000 audit[2949]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2949 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.037000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff31076d10 a2=0 a3=7fff31076cfc items=0 ppid=2837 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 00:40:31.049000 audit[2951]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.049000 audit[2951]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdc1872af0 a2=0 a3=7ffdc1872adc items=0 ppid=2837 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 00:40:31.062000 audit[2954]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.062000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd7f52d5b0 a2=0 a3=7ffd7f52d59c items=0 ppid=2837 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.062000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Nov 1 00:40:31.065000 audit[2955]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.065000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb335ab10 a2=0 a3=7ffdb335aafc items=0 ppid=2837 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 00:40:31.071000 audit[2957]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.071000 audit[2957]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc30cb5c30 a2=0 a3=7ffc30cb5c1c items=0 ppid=2837 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 00:40:31.081000 audit[2958]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.081000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdce791d60 a2=0 a3=7ffdce791d4c items=0 ppid=2837 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 00:40:31.087000 audit[2960]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.087000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd94d89e10 a2=0 a3=7ffd94d89dfc items=0 ppid=2837 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:40:31.108000 audit[2963]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.108000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc034db090 a2=0 a3=7ffc034db07c items=0 ppid=2837 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:40:31.119359 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2836050098.mount: Deactivated successfully. Nov 1 00:40:31.130000 audit[2966]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2966 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.130000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc923873c0 a2=0 a3=7ffc923873ac items=0 ppid=2837 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 00:40:31.132000 audit[2967]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2967 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.132000 audit[2967]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd8494a940 a2=0 a3=7ffd8494a92c items=0 ppid=2837 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.132000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 00:40:31.147000 audit[2969]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2969 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.147000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffcb3c03c70 a2=0 a3=7ffcb3c03c5c items=0 ppid=2837 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.147000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:40:31.165000 audit[2972]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.165000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1d33ff60 a2=0 a3=7ffd1d33ff4c items=0 ppid=2837 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:40:31.170000 audit[2973]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.170000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4208c810 a2=0 a3=7fff4208c7fc items=0 ppid=2837 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 00:40:31.178000 audit[2975]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2975 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 00:40:31.178000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff57fbb610 a2=0 a3=7fff57fbb5fc items=0 ppid=2837 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 00:40:31.310000 audit[2981]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:31.310000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe9ebea970 a2=0 a3=7ffe9ebea95c items=0 ppid=2837 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:31.344000 audit[2981]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2981 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:31.344000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe9ebea970 a2=0 a3=7ffe9ebea95c items=0 ppid=2837 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:31.347000 audit[2986]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.347000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff92c2bfa0 a2=0 a3=7fff92c2bf8c items=0 ppid=2837 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.347000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 00:40:31.351000 audit[2988]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.351000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffd833d7b0 a2=0 a3=7fffd833d79c items=0 ppid=2837 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.351000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Nov 1 00:40:31.356000 audit[2991]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2991 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.356000 audit[2991]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe2ae94d10 a2=0 a3=7ffe2ae94cfc items=0 ppid=2837 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Nov 1 00:40:31.358000 audit[2992]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2992 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.358000 audit[2992]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec6934e10 a2=0 a3=7ffec6934dfc items=0 ppid=2837 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 00:40:31.361000 audit[2994]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2994 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.361000 audit[2994]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd066d0cf0 a2=0 a3=7ffd066d0cdc items=0 ppid=2837 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 00:40:31.364000 audit[2995]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2995 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.364000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfdd8c940 a2=0 a3=7ffdfdd8c92c items=0 ppid=2837 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.364000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 00:40:31.375000 audit[2997]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2997 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.375000 audit[2997]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc560329e0 a2=0 a3=7ffc560329cc items=0 ppid=2837 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Nov 1 00:40:31.382000 audit[3000]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3000 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.382000 audit[3000]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcdeed5b00 a2=0 a3=7ffcdeed5aec items=0 ppid=2837 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 00:40:31.385000 audit[3001]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3001 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.385000 audit[3001]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef8d41a30 a2=0 a3=7ffef8d41a1c items=0 ppid=2837 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 00:40:31.389000 audit[3003]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3003 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.389000 audit[3003]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff9d325ac0 a2=0 a3=7fff9d325aac items=0 ppid=2837 pid=3003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.389000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 00:40:31.391000 audit[3004]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3004 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.391000 audit[3004]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5fb757a0 a2=0 a3=7ffd5fb7578c items=0 ppid=2837 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.391000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 00:40:31.396000 audit[3006]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3006 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.396000 audit[3006]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffedafccc40 a2=0 a3=7ffedafccc2c items=0 ppid=2837 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.396000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 00:40:31.402000 audit[3009]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.402000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc584006f0 a2=0 a3=7ffc584006dc items=0 ppid=2837 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 00:40:31.408000 audit[3012]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3012 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.408000 audit[3012]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd46ef9480 a2=0 a3=7ffd46ef946c items=0 ppid=2837 pid=3012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Nov 1 00:40:31.410000 audit[3013]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3013 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.410000 audit[3013]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffee060e920 a2=0 a3=7ffee060e90c items=0 ppid=2837 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 00:40:31.414000 audit[3015]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3015 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.414000 audit[3015]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff465f2060 a2=0 a3=7fff465f204c items=0 ppid=2837 pid=3015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:40:31.421000 audit[3018]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3018 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.421000 audit[3018]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc1aa94b50 a2=0 a3=7ffc1aa94b3c items=0 ppid=2837 pid=3018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 00:40:31.423000 audit[3019]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3019 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.423000 audit[3019]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcfddceb0 a2=0 a3=7ffdcfddce9c items=0 ppid=2837 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 00:40:31.427000 audit[3021]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3021 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.427000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc3cb74ad0 a2=0 a3=7ffc3cb74abc items=0 ppid=2837 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 00:40:31.429000 audit[3022]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3022 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.429000 audit[3022]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfdb3a9d0 a2=0 a3=7ffcfdb3a9bc items=0 ppid=2837 pid=3022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 00:40:31.433000 audit[3024]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3024 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.433000 audit[3024]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff297e0b60 a2=0 a3=7fff297e0b4c items=0 ppid=2837 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:40:31.439000 audit[3027]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3027 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 00:40:31.439000 audit[3027]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffebab7ee40 a2=0 a3=7ffebab7ee2c items=0 ppid=2837 pid=3027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 00:40:31.444000 audit[3029]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3029 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 00:40:31.444000 audit[3029]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc8af02620 a2=0 a3=7ffc8af0260c items=0 ppid=2837 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.444000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:31.445000 audit[3029]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3029 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 00:40:31.445000 audit[3029]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc8af02620 a2=0 a3=7ffc8af0260c items=0 ppid=2837 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:31.445000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:32.465948 env[1737]: time="2025-11-01T00:40:32.465864449Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:32.469724 env[1737]: time="2025-11-01T00:40:32.469642937Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:32.472294 env[1737]: time="2025-11-01T00:40:32.472232338Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:32.474280 env[1737]: time="2025-11-01T00:40:32.474230418Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:1b629a1403f5b6d7243f7dd523d04b8a50352a33c1d4d6970b6002a8733acf2e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:32.475348 env[1737]: time="2025-11-01T00:40:32.475215903Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\" returns image reference \"sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1\"" Nov 1 00:40:32.486738 env[1737]: time="2025-11-01T00:40:32.486684048Z" level=info msg="CreateContainer within sandbox \"57edb93b9f61e49d71e80ad7994c75d7368bdb519dc8d23f26d584dc1824ae1f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Nov 1 00:40:32.523353 env[1737]: time="2025-11-01T00:40:32.523188873Z" level=info msg="CreateContainer within sandbox \"57edb93b9f61e49d71e80ad7994c75d7368bdb519dc8d23f26d584dc1824ae1f\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e\"" Nov 1 00:40:32.526014 env[1737]: time="2025-11-01T00:40:32.524479672Z" level=info msg="StartContainer for \"f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e\"" Nov 1 00:40:32.562948 systemd[1]: Started cri-containerd-f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e.scope. Nov 1 00:40:32.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.584144 kernel: kauditd_printk_skb: 313 callbacks suppressed Nov 1 00:40:32.584298 kernel: audit: type=1400 audit(1761957632.580:925): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.596873 kernel: audit: type=1400 audit(1761957632.580:926): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.604040 kernel: audit: type=1400 audit(1761957632.580:927): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.617463 kernel: audit: type=1400 audit(1761957632.580:928): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.617563 kernel: audit: type=1400 audit(1761957632.580:929): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.624644 kernel: audit: type=1400 audit(1761957632.580:930): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.633232 kernel: audit: type=1400 audit(1761957632.580:931): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.642047 kernel: audit: type=1400 audit(1761957632.580:932): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.651023 kernel: audit: type=1400 audit(1761957632.580:933): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.659081 kernel: audit: type=1400 audit(1761957632.580:934): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.659145 env[1737]: time="2025-11-01T00:40:32.652653261Z" level=info msg="StartContainer for \"f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e\" returns successfully" Nov 1 00:40:32.580000 audit: BPF prog-id=117 op=LOAD Nov 1 00:40:32.583000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.583000 audit[3038]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2858 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:32.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639366664643833333234363034363931663633653064343832313866 Nov 1 00:40:32.583000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.583000 audit[3038]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2858 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:32.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639366664643833333234363034363931663633653064343832313866 Nov 1 00:40:32.583000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.583000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.583000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.583000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.583000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.583000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.583000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.583000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.583000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.583000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.583000 audit: BPF prog-id=118 op=LOAD Nov 1 00:40:32.583000 audit[3038]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002357a0 items=0 ppid=2858 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:32.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639366664643833333234363034363931663633653064343832313866 Nov 1 00:40:32.589000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.589000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.589000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.589000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.589000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.589000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.589000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.589000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.589000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.589000 audit: BPF prog-id=119 op=LOAD Nov 1 00:40:32.589000 audit[3038]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002357e8 items=0 ppid=2858 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:32.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639366664643833333234363034363931663633653064343832313866 Nov 1 00:40:32.596000 audit: BPF prog-id=119 op=UNLOAD Nov 1 00:40:32.596000 audit: BPF prog-id=118 op=UNLOAD Nov 1 00:40:32.596000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.596000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.596000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.596000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.596000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.596000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.596000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.596000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.596000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.596000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:32.596000 audit: BPF prog-id=120 op=LOAD Nov 1 00:40:32.596000 audit[3038]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000235bf8 items=0 ppid=2858 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:32.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639366664643833333234363034363931663633653064343832313866 Nov 1 00:40:33.035105 kubelet[2730]: I1101 00:40:33.034988 2730 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-8gxln" podStartSLOduration=5.034904017 podStartE2EDuration="5.034904017s" podCreationTimestamp="2025-11-01 00:40:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-11-01 00:40:30.043442968 +0000 UTC m=+3.451938479" watchObservedRunningTime="2025-11-01 00:40:33.034904017 +0000 UTC m=+6.443399525" Nov 1 00:40:33.178824 kubelet[2730]: I1101 00:40:33.178744 2730 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7dcd859c48-gswks" podStartSLOduration=1.270413261 podStartE2EDuration="4.178718007s" podCreationTimestamp="2025-11-01 00:40:29 +0000 UTC" firstStartedPulling="2025-11-01 00:40:29.571962797 +0000 UTC m=+2.980458303" lastFinishedPulling="2025-11-01 00:40:32.480267549 +0000 UTC m=+5.888763049" observedRunningTime="2025-11-01 00:40:33.036144525 +0000 UTC m=+6.444640025" watchObservedRunningTime="2025-11-01 00:40:33.178718007 +0000 UTC m=+6.587213517" Nov 1 00:40:33.499002 systemd[1]: run-containerd-runc-k8s.io-f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e-runc.3zRvO3.mount: Deactivated successfully. Nov 1 00:40:39.762178 kernel: kauditd_printk_skb: 47 callbacks suppressed Nov 1 00:40:39.762435 kernel: audit: type=1325 audit(1761957639.752:943): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:39.752000 audit[3094]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:39.752000 audit[3094]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcc20a9a60 a2=0 a3=7ffcc20a9a4c items=0 ppid=2837 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:39.779011 kernel: audit: type=1300 audit(1761957639.752:943): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcc20a9a60 a2=0 a3=7ffcc20a9a4c items=0 ppid=2837 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:39.752000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:39.787008 kernel: audit: type=1327 audit(1761957639.752:943): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:39.780000 audit[3094]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:39.806040 kernel: audit: type=1325 audit(1761957639.780:944): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3094 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:39.806192 kernel: audit: type=1300 audit(1761957639.780:944): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcc20a9a60 a2=0 a3=0 items=0 ppid=2837 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:39.780000 audit[3094]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcc20a9a60 a2=0 a3=0 items=0 ppid=2837 pid=3094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:39.811987 kernel: audit: type=1327 audit(1761957639.780:944): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:39.780000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:39.825000 audit[3096]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:39.833001 kernel: audit: type=1325 audit(1761957639.825:945): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:39.825000 audit[3096]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc64705f30 a2=0 a3=7ffc64705f1c items=0 ppid=2837 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:39.846001 kernel: audit: type=1300 audit(1761957639.825:945): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc64705f30 a2=0 a3=7ffc64705f1c items=0 ppid=2837 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:39.825000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:39.854998 kernel: audit: type=1327 audit(1761957639.825:945): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:39.859000 audit[3096]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:39.867003 kernel: audit: type=1325 audit(1761957639.859:946): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:39.859000 audit[3096]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc64705f30 a2=0 a3=0 items=0 ppid=2837 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:39.859000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:40.829923 sudo[2005]: pam_unix(sudo:session): session closed for user root Nov 1 00:40:40.829000 audit[2005]: USER_END pid=2005 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:40:40.829000 audit[2005]: CRED_DISP pid=2005 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 00:40:40.861661 sshd[2002]: pam_unix(sshd:session): session closed for user core Nov 1 00:40:40.866000 audit[2002]: USER_END pid=2002 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:40:40.866000 audit[2002]: CRED_DISP pid=2002 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:40:40.872649 systemd[1]: sshd@6-172.31.19.190:22-147.75.109.163:34166.service: Deactivated successfully. Nov 1 00:40:40.873664 systemd[1]: session-7.scope: Deactivated successfully. Nov 1 00:40:40.873862 systemd[1]: session-7.scope: Consumed 6.590s CPU time. Nov 1 00:40:40.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.19.190:22-147.75.109.163:34166 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:40:40.875096 systemd-logind[1728]: Session 7 logged out. Waiting for processes to exit. Nov 1 00:40:40.876871 systemd-logind[1728]: Removed session 7. Nov 1 00:40:43.937000 audit[3114]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:43.937000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff7eaa0da0 a2=0 a3=7fff7eaa0d8c items=0 ppid=2837 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:43.937000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:43.942000 audit[3114]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:43.942000 audit[3114]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff7eaa0da0 a2=0 a3=0 items=0 ppid=2837 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:43.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:43.963000 audit[3116]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:43.963000 audit[3116]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd76252700 a2=0 a3=7ffd762526ec items=0 ppid=2837 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:43.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:43.968000 audit[3116]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:43.968000 audit[3116]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd76252700 a2=0 a3=0 items=0 ppid=2837 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:43.968000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:45.110050 kernel: kauditd_printk_skb: 19 callbacks suppressed Nov 1 00:40:45.110241 kernel: audit: type=1325 audit(1761957645.100:956): table=filter:97 family=2 entries=19 op=nft_register_rule pid=3120 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:45.100000 audit[3120]: NETFILTER_CFG table=filter:97 family=2 entries=19 op=nft_register_rule pid=3120 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:45.100000 audit[3120]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe66ddbb50 a2=0 a3=7ffe66ddbb3c items=0 ppid=2837 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:45.123002 kernel: audit: type=1300 audit(1761957645.100:956): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe66ddbb50 a2=0 a3=7ffe66ddbb3c items=0 ppid=2837 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:45.100000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:45.130010 kernel: audit: type=1327 audit(1761957645.100:956): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:45.131000 audit[3120]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=3120 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:45.139030 kernel: audit: type=1325 audit(1761957645.131:957): table=nat:98 family=2 entries=12 op=nft_register_rule pid=3120 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:45.131000 audit[3120]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe66ddbb50 a2=0 a3=0 items=0 ppid=2837 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:45.158154 kernel: audit: type=1300 audit(1761957645.131:957): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe66ddbb50 a2=0 a3=0 items=0 ppid=2837 pid=3120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:45.158330 kernel: audit: type=1327 audit(1761957645.131:957): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:45.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:46.802332 systemd[1]: Created slice kubepods-besteffort-pode64d5935_74dd_4a45_a85e_2f4ed52c3702.slice. Nov 1 00:40:46.808000 audit[3122]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:46.817074 kernel: audit: type=1325 audit(1761957646.808:958): table=filter:99 family=2 entries=21 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:46.808000 audit[3122]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fffb7d9a790 a2=0 a3=7fffb7d9a77c items=0 ppid=2837 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:46.910666 kernel: audit: type=1300 audit(1761957646.808:958): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fffb7d9a790 a2=0 a3=7fffb7d9a77c items=0 ppid=2837 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:46.910810 kernel: audit: type=1327 audit(1761957646.808:958): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:46.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:46.891000 audit[3122]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:46.921999 kernel: audit: type=1325 audit(1761957646.891:959): table=nat:100 family=2 entries=12 op=nft_register_rule pid=3122 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:46.891000 audit[3122]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffb7d9a790 a2=0 a3=0 items=0 ppid=2837 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:46.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:46.952196 kubelet[2730]: I1101 00:40:46.952150 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-twp88\" (UniqueName: \"kubernetes.io/projected/e64d5935-74dd-4a45-a85e-2f4ed52c3702-kube-api-access-twp88\") pod \"calico-typha-79b6c6cbc6-s7vtv\" (UID: \"e64d5935-74dd-4a45-a85e-2f4ed52c3702\") " pod="calico-system/calico-typha-79b6c6cbc6-s7vtv" Nov 1 00:40:46.953064 kubelet[2730]: I1101 00:40:46.953033 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e64d5935-74dd-4a45-a85e-2f4ed52c3702-tigera-ca-bundle\") pod \"calico-typha-79b6c6cbc6-s7vtv\" (UID: \"e64d5935-74dd-4a45-a85e-2f4ed52c3702\") " pod="calico-system/calico-typha-79b6c6cbc6-s7vtv" Nov 1 00:40:46.953232 kubelet[2730]: I1101 00:40:46.953215 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e64d5935-74dd-4a45-a85e-2f4ed52c3702-typha-certs\") pod \"calico-typha-79b6c6cbc6-s7vtv\" (UID: \"e64d5935-74dd-4a45-a85e-2f4ed52c3702\") " pod="calico-system/calico-typha-79b6c6cbc6-s7vtv" Nov 1 00:40:46.957000 audit[3124]: NETFILTER_CFG table=filter:101 family=2 entries=22 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:46.957000 audit[3124]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fff91c141e0 a2=0 a3=7fff91c141cc items=0 ppid=2837 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:46.957000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:46.967000 audit[3124]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=3124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:46.967000 audit[3124]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff91c141e0 a2=0 a3=0 items=0 ppid=2837 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:46.967000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:47.090565 systemd[1]: Created slice kubepods-besteffort-pod74fe11ee_d8c9_4e2f_bf31_423856d54228.slice. Nov 1 00:40:47.200729 kubelet[2730]: E1101 00:40:47.200677 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:40:47.254465 kubelet[2730]: I1101 00:40:47.254402 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/74fe11ee-d8c9-4e2f-bf31-423856d54228-lib-modules\") pod \"calico-node-w8b9w\" (UID: \"74fe11ee-d8c9-4e2f-bf31-423856d54228\") " pod="calico-system/calico-node-w8b9w" Nov 1 00:40:47.254763 kubelet[2730]: I1101 00:40:47.254718 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jgp55\" (UniqueName: \"kubernetes.io/projected/74fe11ee-d8c9-4e2f-bf31-423856d54228-kube-api-access-jgp55\") pod \"calico-node-w8b9w\" (UID: \"74fe11ee-d8c9-4e2f-bf31-423856d54228\") " pod="calico-system/calico-node-w8b9w" Nov 1 00:40:47.254983 kubelet[2730]: I1101 00:40:47.254947 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/74fe11ee-d8c9-4e2f-bf31-423856d54228-var-run-calico\") pod \"calico-node-w8b9w\" (UID: \"74fe11ee-d8c9-4e2f-bf31-423856d54228\") " pod="calico-system/calico-node-w8b9w" Nov 1 00:40:47.255126 kubelet[2730]: I1101 00:40:47.255108 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/74fe11ee-d8c9-4e2f-bf31-423856d54228-var-lib-calico\") pod \"calico-node-w8b9w\" (UID: \"74fe11ee-d8c9-4e2f-bf31-423856d54228\") " pod="calico-system/calico-node-w8b9w" Nov 1 00:40:47.255251 kubelet[2730]: I1101 00:40:47.255234 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/74fe11ee-d8c9-4e2f-bf31-423856d54228-flexvol-driver-host\") pod \"calico-node-w8b9w\" (UID: \"74fe11ee-d8c9-4e2f-bf31-423856d54228\") " pod="calico-system/calico-node-w8b9w" Nov 1 00:40:47.255392 kubelet[2730]: I1101 00:40:47.255371 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/74fe11ee-d8c9-4e2f-bf31-423856d54228-xtables-lock\") pod \"calico-node-w8b9w\" (UID: \"74fe11ee-d8c9-4e2f-bf31-423856d54228\") " pod="calico-system/calico-node-w8b9w" Nov 1 00:40:47.255518 kubelet[2730]: I1101 00:40:47.255504 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/74fe11ee-d8c9-4e2f-bf31-423856d54228-node-certs\") pod \"calico-node-w8b9w\" (UID: \"74fe11ee-d8c9-4e2f-bf31-423856d54228\") " pod="calico-system/calico-node-w8b9w" Nov 1 00:40:47.255642 kubelet[2730]: I1101 00:40:47.255627 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/74fe11ee-d8c9-4e2f-bf31-423856d54228-cni-log-dir\") pod \"calico-node-w8b9w\" (UID: \"74fe11ee-d8c9-4e2f-bf31-423856d54228\") " pod="calico-system/calico-node-w8b9w" Nov 1 00:40:47.255777 kubelet[2730]: I1101 00:40:47.255761 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/74fe11ee-d8c9-4e2f-bf31-423856d54228-policysync\") pod \"calico-node-w8b9w\" (UID: \"74fe11ee-d8c9-4e2f-bf31-423856d54228\") " pod="calico-system/calico-node-w8b9w" Nov 1 00:40:47.255908 kubelet[2730]: I1101 00:40:47.255890 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/74fe11ee-d8c9-4e2f-bf31-423856d54228-cni-bin-dir\") pod \"calico-node-w8b9w\" (UID: \"74fe11ee-d8c9-4e2f-bf31-423856d54228\") " pod="calico-system/calico-node-w8b9w" Nov 1 00:40:47.256057 kubelet[2730]: I1101 00:40:47.256040 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/74fe11ee-d8c9-4e2f-bf31-423856d54228-cni-net-dir\") pod \"calico-node-w8b9w\" (UID: \"74fe11ee-d8c9-4e2f-bf31-423856d54228\") " pod="calico-system/calico-node-w8b9w" Nov 1 00:40:47.256197 kubelet[2730]: I1101 00:40:47.256182 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/74fe11ee-d8c9-4e2f-bf31-423856d54228-tigera-ca-bundle\") pod \"calico-node-w8b9w\" (UID: \"74fe11ee-d8c9-4e2f-bf31-423856d54228\") " pod="calico-system/calico-node-w8b9w" Nov 1 00:40:47.357241 kubelet[2730]: I1101 00:40:47.357119 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/666be2c8-6518-4217-90fd-5cf3423de279-registration-dir\") pod \"csi-node-driver-wrg9s\" (UID: \"666be2c8-6518-4217-90fd-5cf3423de279\") " pod="calico-system/csi-node-driver-wrg9s" Nov 1 00:40:47.357241 kubelet[2730]: I1101 00:40:47.357189 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fb5cm\" (UniqueName: \"kubernetes.io/projected/666be2c8-6518-4217-90fd-5cf3423de279-kube-api-access-fb5cm\") pod \"csi-node-driver-wrg9s\" (UID: \"666be2c8-6518-4217-90fd-5cf3423de279\") " pod="calico-system/csi-node-driver-wrg9s" Nov 1 00:40:47.357241 kubelet[2730]: I1101 00:40:47.357227 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/666be2c8-6518-4217-90fd-5cf3423de279-varrun\") pod \"csi-node-driver-wrg9s\" (UID: \"666be2c8-6518-4217-90fd-5cf3423de279\") " pod="calico-system/csi-node-driver-wrg9s" Nov 1 00:40:47.357608 kubelet[2730]: I1101 00:40:47.357376 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/666be2c8-6518-4217-90fd-5cf3423de279-socket-dir\") pod \"csi-node-driver-wrg9s\" (UID: \"666be2c8-6518-4217-90fd-5cf3423de279\") " pod="calico-system/csi-node-driver-wrg9s" Nov 1 00:40:47.357608 kubelet[2730]: I1101 00:40:47.357422 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/666be2c8-6518-4217-90fd-5cf3423de279-kubelet-dir\") pod \"csi-node-driver-wrg9s\" (UID: \"666be2c8-6518-4217-90fd-5cf3423de279\") " pod="calico-system/csi-node-driver-wrg9s" Nov 1 00:40:47.377026 kubelet[2730]: E1101 00:40:47.376992 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.377251 kubelet[2730]: W1101 00:40:47.377225 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.377379 kubelet[2730]: E1101 00:40:47.377363 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.377762 kubelet[2730]: E1101 00:40:47.377745 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.377875 kubelet[2730]: W1101 00:40:47.377862 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.377958 kubelet[2730]: E1101 00:40:47.377945 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.390721 kubelet[2730]: E1101 00:40:47.390696 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.390940 kubelet[2730]: W1101 00:40:47.390920 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.391104 kubelet[2730]: E1101 00:40:47.391079 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.411315 env[1737]: time="2025-11-01T00:40:47.411260000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-79b6c6cbc6-s7vtv,Uid:e64d5935-74dd-4a45-a85e-2f4ed52c3702,Namespace:calico-system,Attempt:0,}" Nov 1 00:40:47.422893 env[1737]: time="2025-11-01T00:40:47.422730915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-w8b9w,Uid:74fe11ee-d8c9-4e2f-bf31-423856d54228,Namespace:calico-system,Attempt:0,}" Nov 1 00:40:47.466702 kubelet[2730]: E1101 00:40:47.466662 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.466954 kubelet[2730]: W1101 00:40:47.466929 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.467207 kubelet[2730]: E1101 00:40:47.467158 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.468341 kubelet[2730]: E1101 00:40:47.468317 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.468560 kubelet[2730]: W1101 00:40:47.468498 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.468708 kubelet[2730]: E1101 00:40:47.468691 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.469175 kubelet[2730]: E1101 00:40:47.469154 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.469269 kubelet[2730]: W1101 00:40:47.469175 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.469269 kubelet[2730]: E1101 00:40:47.469194 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.469430 kubelet[2730]: E1101 00:40:47.469415 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.469516 kubelet[2730]: W1101 00:40:47.469434 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.469516 kubelet[2730]: E1101 00:40:47.469447 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.469722 kubelet[2730]: E1101 00:40:47.469707 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.469722 kubelet[2730]: W1101 00:40:47.469723 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.469722 kubelet[2730]: E1101 00:40:47.469735 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.470009 kubelet[2730]: E1101 00:40:47.469958 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.470009 kubelet[2730]: W1101 00:40:47.469991 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.470122 kubelet[2730]: E1101 00:40:47.470011 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.470289 kubelet[2730]: E1101 00:40:47.470268 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.470289 kubelet[2730]: W1101 00:40:47.470284 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.470406 kubelet[2730]: E1101 00:40:47.470298 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.470526 kubelet[2730]: E1101 00:40:47.470511 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.470602 kubelet[2730]: W1101 00:40:47.470527 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.470602 kubelet[2730]: E1101 00:40:47.470539 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.470774 kubelet[2730]: E1101 00:40:47.470753 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.470774 kubelet[2730]: W1101 00:40:47.470763 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.470883 kubelet[2730]: E1101 00:40:47.470776 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.471076 kubelet[2730]: E1101 00:40:47.471057 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.471076 kubelet[2730]: W1101 00:40:47.471069 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.471241 kubelet[2730]: E1101 00:40:47.471083 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.471386 kubelet[2730]: E1101 00:40:47.471370 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.471471 kubelet[2730]: W1101 00:40:47.471387 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.471471 kubelet[2730]: E1101 00:40:47.471401 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.471617 kubelet[2730]: E1101 00:40:47.471603 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.471689 kubelet[2730]: W1101 00:40:47.471619 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.471689 kubelet[2730]: E1101 00:40:47.471631 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.471884 kubelet[2730]: E1101 00:40:47.471859 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.471884 kubelet[2730]: W1101 00:40:47.471875 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.472000 kubelet[2730]: E1101 00:40:47.471889 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.474203 kubelet[2730]: E1101 00:40:47.474181 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.474203 kubelet[2730]: W1101 00:40:47.474204 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.474492 kubelet[2730]: E1101 00:40:47.474224 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.474593 kubelet[2730]: E1101 00:40:47.474523 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.474593 kubelet[2730]: W1101 00:40:47.474536 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.474593 kubelet[2730]: E1101 00:40:47.474550 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.475236 kubelet[2730]: E1101 00:40:47.475209 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.475369 kubelet[2730]: W1101 00:40:47.475263 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.475369 kubelet[2730]: E1101 00:40:47.475281 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.479359 kubelet[2730]: E1101 00:40:47.479327 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.479359 kubelet[2730]: W1101 00:40:47.479354 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.479695 kubelet[2730]: E1101 00:40:47.479381 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.479695 kubelet[2730]: E1101 00:40:47.479623 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.479695 kubelet[2730]: W1101 00:40:47.479633 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.479695 kubelet[2730]: E1101 00:40:47.479645 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.479903 kubelet[2730]: E1101 00:40:47.479831 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.479903 kubelet[2730]: W1101 00:40:47.479841 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.479903 kubelet[2730]: E1101 00:40:47.479852 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.480145 kubelet[2730]: E1101 00:40:47.480130 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.480212 kubelet[2730]: W1101 00:40:47.480145 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.480212 kubelet[2730]: E1101 00:40:47.480158 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.480414 kubelet[2730]: E1101 00:40:47.480396 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.480414 kubelet[2730]: W1101 00:40:47.480412 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.480582 kubelet[2730]: E1101 00:40:47.480426 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.480642 kubelet[2730]: E1101 00:40:47.480626 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.480861 kubelet[2730]: W1101 00:40:47.480644 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.480861 kubelet[2730]: E1101 00:40:47.480657 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.480861 kubelet[2730]: E1101 00:40:47.480860 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.481330 kubelet[2730]: W1101 00:40:47.480870 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.481330 kubelet[2730]: E1101 00:40:47.480882 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.481458 kubelet[2730]: E1101 00:40:47.481395 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.481458 kubelet[2730]: W1101 00:40:47.481406 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.481458 kubelet[2730]: E1101 00:40:47.481419 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.487677 kubelet[2730]: E1101 00:40:47.487628 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.487677 kubelet[2730]: W1101 00:40:47.487655 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.487863 kubelet[2730]: E1101 00:40:47.487683 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.489016 kubelet[2730]: E1101 00:40:47.488786 2730 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 00:40:47.489016 kubelet[2730]: W1101 00:40:47.488803 2730 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 00:40:47.489016 kubelet[2730]: E1101 00:40:47.488823 2730 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 00:40:47.495787 env[1737]: time="2025-11-01T00:40:47.495472743Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:40:47.495787 env[1737]: time="2025-11-01T00:40:47.495535174Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:40:47.495787 env[1737]: time="2025-11-01T00:40:47.495546792Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:40:47.497956 env[1737]: time="2025-11-01T00:40:47.495871838Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc6af5320a304aabd8628fb005fb6e03aed63c46991bcc6fd199b5a0afe3eaae pid=3156 runtime=io.containerd.runc.v2 Nov 1 00:40:47.501222 env[1737]: time="2025-11-01T00:40:47.501123758Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:40:47.501459 env[1737]: time="2025-11-01T00:40:47.501246545Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:40:47.501459 env[1737]: time="2025-11-01T00:40:47.501310692Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:40:47.501614 env[1737]: time="2025-11-01T00:40:47.501507861Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/380d2a5a095550588823b99f7f8c4c3be39a255d3c4e3021ab32bf6c93a35554 pid=3178 runtime=io.containerd.runc.v2 Nov 1 00:40:47.530205 systemd[1]: Started cri-containerd-fc6af5320a304aabd8628fb005fb6e03aed63c46991bcc6fd199b5a0afe3eaae.scope. Nov 1 00:40:47.547174 systemd[1]: Started cri-containerd-380d2a5a095550588823b99f7f8c4c3be39a255d3c4e3021ab32bf6c93a35554.scope. Nov 1 00:40:47.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.554000 audit: BPF prog-id=121 op=LOAD Nov 1 00:40:47.555000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.555000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3156 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:47.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663366166353332306133303461616264383632386662303035666236 Nov 1 00:40:47.556000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.556000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3156 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:47.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663366166353332306133303461616264383632386662303035666236 Nov 1 00:40:47.556000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.556000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.556000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.556000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.556000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.556000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.556000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.556000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.556000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.556000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.556000 audit: BPF prog-id=122 op=LOAD Nov 1 00:40:47.556000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002936f0 items=0 ppid=3156 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:47.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663366166353332306133303461616264383632386662303035666236 Nov 1 00:40:47.557000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.557000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.557000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.557000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.557000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.557000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.557000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.557000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.557000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.557000 audit: BPF prog-id=123 op=LOAD Nov 1 00:40:47.557000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000293738 items=0 ppid=3156 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:47.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663366166353332306133303461616264383632386662303035666236 Nov 1 00:40:47.558000 audit: BPF prog-id=123 op=UNLOAD Nov 1 00:40:47.558000 audit: BPF prog-id=122 op=UNLOAD Nov 1 00:40:47.558000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.558000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.558000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.558000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.558000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.558000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.558000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.558000 audit[3186]: AVC avc: denied { perfmon } for pid=3186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.558000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.558000 audit[3186]: AVC avc: denied { bpf } for pid=3186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.558000 audit: BPF prog-id=124 op=LOAD Nov 1 00:40:47.558000 audit[3186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000293b48 items=0 ppid=3156 pid=3186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:47.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663366166353332306133303461616264383632386662303035666236 Nov 1 00:40:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.581000 audit: BPF prog-id=125 op=LOAD Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3178 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:47.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338306432613561303935353530353838383233623939663766386334 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3178 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:47.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338306432613561303935353530353838383233623939663766386334 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit: BPF prog-id=126 op=LOAD Nov 1 00:40:47.582000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00032cac0 items=0 ppid=3178 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:47.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338306432613561303935353530353838383233623939663766386334 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.582000 audit: BPF prog-id=127 op=LOAD Nov 1 00:40:47.582000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00032cb08 items=0 ppid=3178 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:47.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338306432613561303935353530353838383233623939663766386334 Nov 1 00:40:47.582000 audit: BPF prog-id=127 op=UNLOAD Nov 1 00:40:47.583000 audit: BPF prog-id=126 op=UNLOAD Nov 1 00:40:47.583000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.583000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.583000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.583000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.583000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.583000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.583000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.583000 audit[3191]: AVC avc: denied { perfmon } for pid=3191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.583000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.583000 audit[3191]: AVC avc: denied { bpf } for pid=3191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:47.583000 audit: BPF prog-id=128 op=LOAD Nov 1 00:40:47.583000 audit[3191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00032cf18 items=0 ppid=3178 pid=3191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:47.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338306432613561303935353530353838383233623939663766386334 Nov 1 00:40:47.612414 env[1737]: time="2025-11-01T00:40:47.612269336Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-w8b9w,Uid:74fe11ee-d8c9-4e2f-bf31-423856d54228,Namespace:calico-system,Attempt:0,} returns sandbox id \"380d2a5a095550588823b99f7f8c4c3be39a255d3c4e3021ab32bf6c93a35554\"" Nov 1 00:40:47.626310 env[1737]: time="2025-11-01T00:40:47.626235846Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Nov 1 00:40:47.654768 env[1737]: time="2025-11-01T00:40:47.654713363Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-79b6c6cbc6-s7vtv,Uid:e64d5935-74dd-4a45-a85e-2f4ed52c3702,Namespace:calico-system,Attempt:0,} returns sandbox id \"fc6af5320a304aabd8628fb005fb6e03aed63c46991bcc6fd199b5a0afe3eaae\"" Nov 1 00:40:48.005000 audit[3240]: NETFILTER_CFG table=filter:103 family=2 entries=22 op=nft_register_rule pid=3240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:48.005000 audit[3240]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffdc78f7510 a2=0 a3=7ffdc78f74fc items=0 ppid=2837 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:48.005000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:48.017000 audit[3240]: NETFILTER_CFG table=nat:104 family=2 entries=12 op=nft_register_rule pid=3240 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:48.017000 audit[3240]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc78f7510 a2=0 a3=0 items=0 ppid=2837 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:48.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:48.884760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2748321942.mount: Deactivated successfully. Nov 1 00:40:48.956132 kubelet[2730]: E1101 00:40:48.955952 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:40:49.361093 env[1737]: time="2025-11-01T00:40:49.361036040Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:49.367171 env[1737]: time="2025-11-01T00:40:49.367116451Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:49.373478 env[1737]: time="2025-11-01T00:40:49.373426012Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:49.378560 env[1737]: time="2025-11-01T00:40:49.378505803Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:49.381129 env[1737]: time="2025-11-01T00:40:49.381029329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Nov 1 00:40:49.386551 env[1737]: time="2025-11-01T00:40:49.386202520Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\"" Nov 1 00:40:49.394259 env[1737]: time="2025-11-01T00:40:49.394214086Z" level=info msg="CreateContainer within sandbox \"380d2a5a095550588823b99f7f8c4c3be39a255d3c4e3021ab32bf6c93a35554\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Nov 1 00:40:49.446071 env[1737]: time="2025-11-01T00:40:49.445983596Z" level=info msg="CreateContainer within sandbox \"380d2a5a095550588823b99f7f8c4c3be39a255d3c4e3021ab32bf6c93a35554\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9e2d379c3205280ebf6a9a9689f6cd70e539dcc15570adc2a3a3d79c1ddd5e18\"" Nov 1 00:40:49.457503 env[1737]: time="2025-11-01T00:40:49.448614319Z" level=info msg="StartContainer for \"9e2d379c3205280ebf6a9a9689f6cd70e539dcc15570adc2a3a3d79c1ddd5e18\"" Nov 1 00:40:49.520947 systemd[1]: Started cri-containerd-9e2d379c3205280ebf6a9a9689f6cd70e539dcc15570adc2a3a3d79c1ddd5e18.scope. Nov 1 00:40:49.545000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.545000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8c0e69e448 items=0 ppid=3178 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:49.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965326433373963333230353238306562663661396139363839663663 Nov 1 00:40:49.545000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.545000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.545000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.545000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.545000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.545000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.545000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.545000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.545000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.545000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.545000 audit: BPF prog-id=129 op=LOAD Nov 1 00:40:49.545000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000220a48 items=0 ppid=3178 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:49.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965326433373963333230353238306562663661396139363839663663 Nov 1 00:40:49.546000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.546000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.546000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.546000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.546000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.546000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.546000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.546000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.546000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.546000 audit: BPF prog-id=130 op=LOAD Nov 1 00:40:49.546000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000220a98 items=0 ppid=3178 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:49.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965326433373963333230353238306562663661396139363839663663 Nov 1 00:40:49.547000 audit: BPF prog-id=130 op=UNLOAD Nov 1 00:40:49.547000 audit: BPF prog-id=129 op=UNLOAD Nov 1 00:40:49.547000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.547000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.547000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.547000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.547000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.547000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.547000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.547000 audit[3248]: AVC avc: denied { perfmon } for pid=3248 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.547000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.547000 audit[3248]: AVC avc: denied { bpf } for pid=3248 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:49.547000 audit: BPF prog-id=131 op=LOAD Nov 1 00:40:49.547000 audit[3248]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000220b28 items=0 ppid=3178 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:49.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965326433373963333230353238306562663661396139363839663663 Nov 1 00:40:49.573306 env[1737]: time="2025-11-01T00:40:49.573210617Z" level=info msg="StartContainer for \"9e2d379c3205280ebf6a9a9689f6cd70e539dcc15570adc2a3a3d79c1ddd5e18\" returns successfully" Nov 1 00:40:49.597692 systemd[1]: cri-containerd-9e2d379c3205280ebf6a9a9689f6cd70e539dcc15570adc2a3a3d79c1ddd5e18.scope: Deactivated successfully. Nov 1 00:40:49.603000 audit: BPF prog-id=131 op=UNLOAD Nov 1 00:40:49.650552 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9e2d379c3205280ebf6a9a9689f6cd70e539dcc15570adc2a3a3d79c1ddd5e18-rootfs.mount: Deactivated successfully. Nov 1 00:40:49.660699 env[1737]: time="2025-11-01T00:40:49.660635477Z" level=info msg="shim disconnected" id=9e2d379c3205280ebf6a9a9689f6cd70e539dcc15570adc2a3a3d79c1ddd5e18 Nov 1 00:40:49.660699 env[1737]: time="2025-11-01T00:40:49.660704425Z" level=warning msg="cleaning up after shim disconnected" id=9e2d379c3205280ebf6a9a9689f6cd70e539dcc15570adc2a3a3d79c1ddd5e18 namespace=k8s.io Nov 1 00:40:49.660699 env[1737]: time="2025-11-01T00:40:49.660719836Z" level=info msg="cleaning up dead shim" Nov 1 00:40:49.677481 env[1737]: time="2025-11-01T00:40:49.677423682Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:40:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3289 runtime=io.containerd.runc.v2\n" Nov 1 00:40:50.953002 kubelet[2730]: E1101 00:40:50.952446 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:40:52.547844 env[1737]: time="2025-11-01T00:40:52.547771894Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:52.553786 env[1737]: time="2025-11-01T00:40:52.553710223Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:52.564795 env[1737]: time="2025-11-01T00:40:52.564152825Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:52.571210 env[1737]: time="2025-11-01T00:40:52.571162223Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:6f437220b5b3c627fb4a0fc8dc323363101f3c22a8f337612c2a1ddfb73b810c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:40:52.572438 env[1737]: time="2025-11-01T00:40:52.572385821Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\" returns image reference \"sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958\"" Nov 1 00:40:52.581366 env[1737]: time="2025-11-01T00:40:52.581313296Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Nov 1 00:40:52.608394 env[1737]: time="2025-11-01T00:40:52.608341135Z" level=info msg="CreateContainer within sandbox \"fc6af5320a304aabd8628fb005fb6e03aed63c46991bcc6fd199b5a0afe3eaae\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Nov 1 00:40:52.645476 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2970497121.mount: Deactivated successfully. Nov 1 00:40:52.653756 env[1737]: time="2025-11-01T00:40:52.653668432Z" level=info msg="CreateContainer within sandbox \"fc6af5320a304aabd8628fb005fb6e03aed63c46991bcc6fd199b5a0afe3eaae\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"21bb12266a69bfe965d7fc408b9c6714eee32039726d3a32ed3198b9f5344715\"" Nov 1 00:40:52.656895 env[1737]: time="2025-11-01T00:40:52.656830413Z" level=info msg="StartContainer for \"21bb12266a69bfe965d7fc408b9c6714eee32039726d3a32ed3198b9f5344715\"" Nov 1 00:40:52.696007 systemd[1]: Started cri-containerd-21bb12266a69bfe965d7fc408b9c6714eee32039726d3a32ed3198b9f5344715.scope. Nov 1 00:40:52.726451 kernel: kauditd_printk_skb: 172 callbacks suppressed Nov 1 00:40:52.726616 kernel: audit: type=1400 audit(1761957652.722:1007): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.740739 kernel: audit: type=1400 audit(1761957652.722:1008): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.751065 kernel: audit: type=1400 audit(1761957652.722:1009): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.751220 kernel: audit: type=1400 audit(1761957652.722:1010): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.763776 kernel: audit: type=1400 audit(1761957652.722:1011): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.779581 kernel: audit: type=1400 audit(1761957652.722:1012): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.779727 kernel: audit: type=1400 audit(1761957652.722:1013): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.790154 kernel: audit: type=1400 audit(1761957652.722:1014): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.799613 kernel: audit: type=1400 audit(1761957652.722:1015): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.725000 audit: BPF prog-id=132 op=LOAD Nov 1 00:40:52.726000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit[3318]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3156 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:52.812107 kernel: audit: type=1400 audit(1761957652.725:1016): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231626231323236366136396266653936356437666334303862396336 Nov 1 00:40:52.726000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit[3318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3156 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:52.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231626231323236366136396266653936356437666334303862396336 Nov 1 00:40:52.726000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.726000 audit: BPF prog-id=133 op=LOAD Nov 1 00:40:52.726000 audit[3318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000305190 items=0 ppid=3156 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:52.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231626231323236366136396266653936356437666334303862396336 Nov 1 00:40:52.732000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.732000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.732000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.732000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.732000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.732000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.732000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.732000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.732000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.732000 audit: BPF prog-id=134 op=LOAD Nov 1 00:40:52.732000 audit[3318]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003051d8 items=0 ppid=3156 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:52.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231626231323236366136396266653936356437666334303862396336 Nov 1 00:40:52.739000 audit: BPF prog-id=134 op=UNLOAD Nov 1 00:40:52.740000 audit: BPF prog-id=133 op=UNLOAD Nov 1 00:40:52.740000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.740000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.740000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.740000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.740000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.740000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.740000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.740000 audit[3318]: AVC avc: denied { perfmon } for pid=3318 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.740000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.740000 audit[3318]: AVC avc: denied { bpf } for pid=3318 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:40:52.740000 audit: BPF prog-id=135 op=LOAD Nov 1 00:40:52.740000 audit[3318]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003055e8 items=0 ppid=3156 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:52.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231626231323236366136396266653936356437666334303862396336 Nov 1 00:40:52.835676 env[1737]: time="2025-11-01T00:40:52.835114278Z" level=info msg="StartContainer for \"21bb12266a69bfe965d7fc408b9c6714eee32039726d3a32ed3198b9f5344715\" returns successfully" Nov 1 00:40:52.950778 kubelet[2730]: E1101 00:40:52.950679 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:40:54.106561 kubelet[2730]: I1101 00:40:54.106518 2730 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Nov 1 00:40:54.949359 kubelet[2730]: E1101 00:40:54.948727 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:40:55.276604 kubelet[2730]: I1101 00:40:55.276398 2730 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Nov 1 00:40:55.344246 kubelet[2730]: I1101 00:40:55.344165 2730 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-79b6c6cbc6-s7vtv" podStartSLOduration=4.417299116 podStartE2EDuration="9.335358959s" podCreationTimestamp="2025-11-01 00:40:46 +0000 UTC" firstStartedPulling="2025-11-01 00:40:47.656386469 +0000 UTC m=+21.064881969" lastFinishedPulling="2025-11-01 00:40:52.574445873 +0000 UTC m=+25.982941812" observedRunningTime="2025-11-01 00:40:53.271350325 +0000 UTC m=+26.679845833" watchObservedRunningTime="2025-11-01 00:40:55.335358959 +0000 UTC m=+28.743854447" Nov 1 00:40:55.385000 audit[3353]: NETFILTER_CFG table=filter:105 family=2 entries=21 op=nft_register_rule pid=3353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:55.385000 audit[3353]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffbfd9cf20 a2=0 a3=7fffbfd9cf0c items=0 ppid=2837 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:55.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:55.395000 audit[3353]: NETFILTER_CFG table=nat:106 family=2 entries=19 op=nft_register_chain pid=3353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:40:55.395000 audit[3353]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fffbfd9cf20 a2=0 a3=7fffbfd9cf0c items=0 ppid=2837 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:40:55.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:40:56.950072 kubelet[2730]: E1101 00:40:56.950011 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:40:58.950177 kubelet[2730]: E1101 00:40:58.949869 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:41:00.954467 kubelet[2730]: E1101 00:41:00.954292 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:41:01.965266 kubelet[2730]: E1101 00:41:01.965199 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:41:02.229809 env[1737]: time="2025-11-01T00:41:02.229399381Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:41:02.249958 env[1737]: time="2025-11-01T00:41:02.249858782Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:41:02.256522 env[1737]: time="2025-11-01T00:41:02.256473713Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:41:02.261519 env[1737]: time="2025-11-01T00:41:02.261339075Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:41:02.268441 env[1737]: time="2025-11-01T00:41:02.268366534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Nov 1 00:41:02.283667 env[1737]: time="2025-11-01T00:41:02.283609361Z" level=info msg="CreateContainer within sandbox \"380d2a5a095550588823b99f7f8c4c3be39a255d3c4e3021ab32bf6c93a35554\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Nov 1 00:41:02.341652 env[1737]: time="2025-11-01T00:41:02.325137458Z" level=info msg="CreateContainer within sandbox \"380d2a5a095550588823b99f7f8c4c3be39a255d3c4e3021ab32bf6c93a35554\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e55260f2368d52cf4de3e5a4046311926efa26f1989cf15bcf69c4655f13e100\"" Nov 1 00:41:02.341652 env[1737]: time="2025-11-01T00:41:02.334431214Z" level=info msg="StartContainer for \"e55260f2368d52cf4de3e5a4046311926efa26f1989cf15bcf69c4655f13e100\"" Nov 1 00:41:02.342551 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4007802025.mount: Deactivated successfully. Nov 1 00:41:02.460865 systemd[1]: run-containerd-runc-k8s.io-e55260f2368d52cf4de3e5a4046311926efa26f1989cf15bcf69c4655f13e100-runc.WCGGg2.mount: Deactivated successfully. Nov 1 00:41:02.476145 systemd[1]: Started cri-containerd-e55260f2368d52cf4de3e5a4046311926efa26f1989cf15bcf69c4655f13e100.scope. Nov 1 00:41:02.535368 kernel: kauditd_printk_skb: 53 callbacks suppressed Nov 1 00:41:02.539898 kernel: audit: type=1400 audit(1761957662.518:1027): avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.518000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.518000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbaa4348848 items=0 ppid=3178 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:02.562748 kernel: audit: type=1300 audit(1761957662.518:1027): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbaa4348848 items=0 ppid=3178 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:02.562943 kernel: audit: type=1327 audit(1761957662.518:1027): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535353236306632333638643532636634646533653561343034363331 Nov 1 00:41:02.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535353236306632333638643532636634646533653561343034363331 Nov 1 00:41:02.571023 kernel: audit: type=1400 audit(1761957662.518:1028): avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.518000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.585819 kernel: audit: type=1400 audit(1761957662.518:1028): avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.518000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.518000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.615051 kernel: audit: type=1400 audit(1761957662.518:1028): avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.615181 kernel: audit: type=1400 audit(1761957662.518:1028): avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.518000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.649041 kernel: audit: type=1400 audit(1761957662.518:1028): avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.518000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.518000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.667078 kernel: audit: type=1400 audit(1761957662.518:1028): avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.667226 kernel: audit: type=1400 audit(1761957662.518:1028): avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.518000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.671561 env[1737]: time="2025-11-01T00:41:02.660713906Z" level=info msg="StartContainer for \"e55260f2368d52cf4de3e5a4046311926efa26f1989cf15bcf69c4655f13e100\" returns successfully" Nov 1 00:41:02.518000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.518000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.518000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.518000 audit: BPF prog-id=136 op=LOAD Nov 1 00:41:02.518000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002c4f08 items=0 ppid=3178 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:02.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535353236306632333638643532636634646533653561343034363331 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit: BPF prog-id=137 op=LOAD Nov 1 00:41:02.538000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002c4f58 items=0 ppid=3178 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:02.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535353236306632333638643532636634646533653561343034363331 Nov 1 00:41:02.538000 audit: BPF prog-id=137 op=UNLOAD Nov 1 00:41:02.538000 audit: BPF prog-id=136 op=UNLOAD Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { perfmon } for pid=3365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit[3365]: AVC avc: denied { bpf } for pid=3365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:02.538000 audit: BPF prog-id=138 op=LOAD Nov 1 00:41:02.538000 audit[3365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002c4fe8 items=0 ppid=3178 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:02.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535353236306632333638643532636634646533653561343034363331 Nov 1 00:41:03.949347 kubelet[2730]: E1101 00:41:03.949277 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:41:04.238562 env[1737]: time="2025-11-01T00:41:04.237227971Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 00:41:04.249592 systemd[1]: cri-containerd-e55260f2368d52cf4de3e5a4046311926efa26f1989cf15bcf69c4655f13e100.scope: Deactivated successfully. Nov 1 00:41:04.253000 audit: BPF prog-id=138 op=UNLOAD Nov 1 00:41:04.294426 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e55260f2368d52cf4de3e5a4046311926efa26f1989cf15bcf69c4655f13e100-rootfs.mount: Deactivated successfully. Nov 1 00:41:04.347827 kubelet[2730]: I1101 00:41:04.325527 2730 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Nov 1 00:41:04.420802 env[1737]: time="2025-11-01T00:41:04.420735871Z" level=info msg="shim disconnected" id=e55260f2368d52cf4de3e5a4046311926efa26f1989cf15bcf69c4655f13e100 Nov 1 00:41:04.420802 env[1737]: time="2025-11-01T00:41:04.420805976Z" level=warning msg="cleaning up after shim disconnected" id=e55260f2368d52cf4de3e5a4046311926efa26f1989cf15bcf69c4655f13e100 namespace=k8s.io Nov 1 00:41:04.421277 env[1737]: time="2025-11-01T00:41:04.420817974Z" level=info msg="cleaning up dead shim" Nov 1 00:41:04.466573 env[1737]: time="2025-11-01T00:41:04.466050186Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:41:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3409 runtime=io.containerd.runc.v2\n" Nov 1 00:41:04.573320 systemd[1]: Created slice kubepods-burstable-pod1aa2b5ca_f58d_4ccd_b88e_60efe7d7746f.slice. Nov 1 00:41:04.629373 systemd[1]: Created slice kubepods-besteffort-pod67349f38_7770_459e_9c5a_e728b49cc9e0.slice. Nov 1 00:41:04.649907 systemd[1]: Created slice kubepods-besteffort-pod21d23048_45cc_482a_a891_7ca305e12df5.slice. Nov 1 00:41:04.714068 systemd[1]: Created slice kubepods-burstable-pod1214d512_7719_4ed4_8eb7_a357f4f0e4bc.slice. Nov 1 00:41:04.766394 kubelet[2730]: I1101 00:41:04.766311 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ctvlt\" (UniqueName: \"kubernetes.io/projected/1214d512-7719-4ed4-8eb7-a357f4f0e4bc-kube-api-access-ctvlt\") pod \"coredns-674b8bbfcf-4jl9s\" (UID: \"1214d512-7719-4ed4-8eb7-a357f4f0e4bc\") " pod="kube-system/coredns-674b8bbfcf-4jl9s" Nov 1 00:41:04.766756 kubelet[2730]: I1101 00:41:04.766727 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l9m22\" (UniqueName: \"kubernetes.io/projected/1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f-kube-api-access-l9m22\") pod \"coredns-674b8bbfcf-k7kbp\" (UID: \"1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f\") " pod="kube-system/coredns-674b8bbfcf-k7kbp" Nov 1 00:41:04.767347 kubelet[2730]: I1101 00:41:04.767318 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sk4qc\" (UniqueName: \"kubernetes.io/projected/67349f38-7770-459e-9c5a-e728b49cc9e0-kube-api-access-sk4qc\") pod \"calico-kube-controllers-5bb8fbd4f8-rkzw4\" (UID: \"67349f38-7770-459e-9c5a-e728b49cc9e0\") " pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" Nov 1 00:41:04.768426 kubelet[2730]: I1101 00:41:04.768405 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bm8z9\" (UniqueName: \"kubernetes.io/projected/21d23048-45cc-482a-a891-7ca305e12df5-kube-api-access-bm8z9\") pod \"goldmane-666569f655-4d2cg\" (UID: \"21d23048-45cc-482a-a891-7ca305e12df5\") " pod="calico-system/goldmane-666569f655-4d2cg" Nov 1 00:41:04.768819 kubelet[2730]: I1101 00:41:04.768785 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f-config-volume\") pod \"coredns-674b8bbfcf-k7kbp\" (UID: \"1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f\") " pod="kube-system/coredns-674b8bbfcf-k7kbp" Nov 1 00:41:04.769019 kubelet[2730]: I1101 00:41:04.768994 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/21d23048-45cc-482a-a891-7ca305e12df5-goldmane-ca-bundle\") pod \"goldmane-666569f655-4d2cg\" (UID: \"21d23048-45cc-482a-a891-7ca305e12df5\") " pod="calico-system/goldmane-666569f655-4d2cg" Nov 1 00:41:04.769245 kubelet[2730]: I1101 00:41:04.769139 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/21d23048-45cc-482a-a891-7ca305e12df5-goldmane-key-pair\") pod \"goldmane-666569f655-4d2cg\" (UID: \"21d23048-45cc-482a-a891-7ca305e12df5\") " pod="calico-system/goldmane-666569f655-4d2cg" Nov 1 00:41:04.770092 kubelet[2730]: I1101 00:41:04.770071 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/21d23048-45cc-482a-a891-7ca305e12df5-config\") pod \"goldmane-666569f655-4d2cg\" (UID: \"21d23048-45cc-482a-a891-7ca305e12df5\") " pod="calico-system/goldmane-666569f655-4d2cg" Nov 1 00:41:04.770390 kubelet[2730]: I1101 00:41:04.770232 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1214d512-7719-4ed4-8eb7-a357f4f0e4bc-config-volume\") pod \"coredns-674b8bbfcf-4jl9s\" (UID: \"1214d512-7719-4ed4-8eb7-a357f4f0e4bc\") " pod="kube-system/coredns-674b8bbfcf-4jl9s" Nov 1 00:41:04.770811 kubelet[2730]: I1101 00:41:04.770781 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/67349f38-7770-459e-9c5a-e728b49cc9e0-tigera-ca-bundle\") pod \"calico-kube-controllers-5bb8fbd4f8-rkzw4\" (UID: \"67349f38-7770-459e-9c5a-e728b49cc9e0\") " pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" Nov 1 00:41:04.806553 systemd[1]: Created slice kubepods-besteffort-poda7378ec3_c2b9_4f36_862d_27732fa47f40.slice. Nov 1 00:41:04.860660 systemd[1]: Created slice kubepods-besteffort-podba2e5d0e_e96a_42ab_9fa3_0da53dcc24f3.slice. Nov 1 00:41:04.876271 kubelet[2730]: I1101 00:41:04.876223 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pnb6v\" (UniqueName: \"kubernetes.io/projected/a7378ec3-c2b9-4f36-862d-27732fa47f40-kube-api-access-pnb6v\") pod \"whisker-84dd6b699f-pctd4\" (UID: \"a7378ec3-c2b9-4f36-862d-27732fa47f40\") " pod="calico-system/whisker-84dd6b699f-pctd4" Nov 1 00:41:04.876820 kubelet[2730]: I1101 00:41:04.876750 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gsczx\" (UniqueName: \"kubernetes.io/projected/a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7-kube-api-access-gsczx\") pod \"calico-apiserver-d49b764c9-pnm8b\" (UID: \"a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7\") " pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" Nov 1 00:41:04.877082 kubelet[2730]: I1101 00:41:04.877057 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rtlwv\" (UniqueName: \"kubernetes.io/projected/ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3-kube-api-access-rtlwv\") pod \"calico-apiserver-bb8db9787-cmqlg\" (UID: \"ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3\") " pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" Nov 1 00:41:04.877246 kubelet[2730]: I1101 00:41:04.877230 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a7378ec3-c2b9-4f36-862d-27732fa47f40-whisker-backend-key-pair\") pod \"whisker-84dd6b699f-pctd4\" (UID: \"a7378ec3-c2b9-4f36-862d-27732fa47f40\") " pod="calico-system/whisker-84dd6b699f-pctd4" Nov 1 00:41:04.877395 kubelet[2730]: I1101 00:41:04.877382 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a7378ec3-c2b9-4f36-862d-27732fa47f40-whisker-ca-bundle\") pod \"whisker-84dd6b699f-pctd4\" (UID: \"a7378ec3-c2b9-4f36-862d-27732fa47f40\") " pod="calico-system/whisker-84dd6b699f-pctd4" Nov 1 00:41:04.877485 kubelet[2730]: I1101 00:41:04.877472 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9n5s4\" (UniqueName: \"kubernetes.io/projected/8983267d-ef32-4d12-8dac-9ecb10367507-kube-api-access-9n5s4\") pod \"calico-apiserver-d49b764c9-wpz62\" (UID: \"8983267d-ef32-4d12-8dac-9ecb10367507\") " pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" Nov 1 00:41:04.877601 kubelet[2730]: I1101 00:41:04.877586 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7-calico-apiserver-certs\") pod \"calico-apiserver-d49b764c9-pnm8b\" (UID: \"a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7\") " pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" Nov 1 00:41:04.877722 kubelet[2730]: I1101 00:41:04.877709 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3-calico-apiserver-certs\") pod \"calico-apiserver-bb8db9787-cmqlg\" (UID: \"ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3\") " pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" Nov 1 00:41:04.877869 kubelet[2730]: I1101 00:41:04.877848 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8983267d-ef32-4d12-8dac-9ecb10367507-calico-apiserver-certs\") pod \"calico-apiserver-d49b764c9-wpz62\" (UID: \"8983267d-ef32-4d12-8dac-9ecb10367507\") " pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" Nov 1 00:41:04.934300 systemd[1]: Created slice kubepods-besteffort-poda2a22a4f_ddc0_4f49_94c7_8be12ac0f5e7.slice. Nov 1 00:41:04.982930 systemd[1]: Created slice kubepods-besteffort-pod8983267d_ef32_4d12_8dac_9ecb10367507.slice. Nov 1 00:41:05.186885 env[1737]: time="2025-11-01T00:41:05.186744728Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Nov 1 00:41:05.222910 env[1737]: time="2025-11-01T00:41:05.221774948Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-k7kbp,Uid:1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f,Namespace:kube-system,Attempt:0,}" Nov 1 00:41:05.239999 env[1737]: time="2025-11-01T00:41:05.237135059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-bb8db9787-cmqlg,Uid:ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3,Namespace:calico-apiserver,Attempt:0,}" Nov 1 00:41:05.240480 env[1737]: time="2025-11-01T00:41:05.240362349Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bb8fbd4f8-rkzw4,Uid:67349f38-7770-459e-9c5a-e728b49cc9e0,Namespace:calico-system,Attempt:0,}" Nov 1 00:41:05.278018 env[1737]: time="2025-11-01T00:41:05.277948777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49b764c9-pnm8b,Uid:a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7,Namespace:calico-apiserver,Attempt:0,}" Nov 1 00:41:05.380995 env[1737]: time="2025-11-01T00:41:05.380330331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-4d2cg,Uid:21d23048-45cc-482a-a891-7ca305e12df5,Namespace:calico-system,Attempt:0,}" Nov 1 00:41:05.436020 env[1737]: time="2025-11-01T00:41:05.415048030Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-4jl9s,Uid:1214d512-7719-4ed4-8eb7-a357f4f0e4bc,Namespace:kube-system,Attempt:0,}" Nov 1 00:41:05.456435 env[1737]: time="2025-11-01T00:41:05.456312430Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-84dd6b699f-pctd4,Uid:a7378ec3-c2b9-4f36-862d-27732fa47f40,Namespace:calico-system,Attempt:0,}" Nov 1 00:41:05.472028 env[1737]: time="2025-11-01T00:41:05.469155061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49b764c9-wpz62,Uid:8983267d-ef32-4d12-8dac-9ecb10367507,Namespace:calico-apiserver,Attempt:0,}" Nov 1 00:41:05.955258 systemd[1]: Created slice kubepods-besteffort-pod666be2c8_6518_4217_90fd_5cf3423de279.slice. Nov 1 00:41:05.961239 env[1737]: time="2025-11-01T00:41:05.961189333Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wrg9s,Uid:666be2c8-6518-4217-90fd-5cf3423de279,Namespace:calico-system,Attempt:0,}" Nov 1 00:41:06.031045 env[1737]: time="2025-11-01T00:41:06.030925701Z" level=error msg="Failed to destroy network for sandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.031473 env[1737]: time="2025-11-01T00:41:06.031420509Z" level=error msg="encountered an error cleaning up failed sandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.031586 env[1737]: time="2025-11-01T00:41:06.031509618Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49b764c9-pnm8b,Uid:a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.034200 kubelet[2730]: E1101 00:41:06.034125 2730 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.039137 kubelet[2730]: E1101 00:41:06.039054 2730 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" Nov 1 00:41:06.041567 kubelet[2730]: E1101 00:41:06.039171 2730 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" Nov 1 00:41:06.041567 kubelet[2730]: E1101 00:41:06.039718 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-d49b764c9-pnm8b_calico-apiserver(a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-d49b764c9-pnm8b_calico-apiserver(a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" podUID="a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7" Nov 1 00:41:06.073337 env[1737]: time="2025-11-01T00:41:06.073262169Z" level=error msg="Failed to destroy network for sandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.073778 env[1737]: time="2025-11-01T00:41:06.073730671Z" level=error msg="encountered an error cleaning up failed sandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.073880 env[1737]: time="2025-11-01T00:41:06.073818418Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-4d2cg,Uid:21d23048-45cc-482a-a891-7ca305e12df5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.074232 kubelet[2730]: E1101 00:41:06.074186 2730 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.077017 kubelet[2730]: E1101 00:41:06.074277 2730 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-4d2cg" Nov 1 00:41:06.077017 kubelet[2730]: E1101 00:41:06.074329 2730 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-4d2cg" Nov 1 00:41:06.077017 kubelet[2730]: E1101 00:41:06.074756 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-666569f655-4d2cg_calico-system(21d23048-45cc-482a-a891-7ca305e12df5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-666569f655-4d2cg_calico-system(21d23048-45cc-482a-a891-7ca305e12df5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:41:06.085548 env[1737]: time="2025-11-01T00:41:06.085478043Z" level=error msg="Failed to destroy network for sandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.086009 env[1737]: time="2025-11-01T00:41:06.085939025Z" level=error msg="encountered an error cleaning up failed sandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.086104 env[1737]: time="2025-11-01T00:41:06.086047556Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-4jl9s,Uid:1214d512-7719-4ed4-8eb7-a357f4f0e4bc,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.086416 kubelet[2730]: E1101 00:41:06.086355 2730 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.086500 kubelet[2730]: E1101 00:41:06.086465 2730 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-4jl9s" Nov 1 00:41:06.086546 kubelet[2730]: E1101 00:41:06.086492 2730 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-4jl9s" Nov 1 00:41:06.086631 kubelet[2730]: E1101 00:41:06.086586 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-4jl9s_kube-system(1214d512-7719-4ed4-8eb7-a357f4f0e4bc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-4jl9s_kube-system(1214d512-7719-4ed4-8eb7-a357f4f0e4bc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-4jl9s" podUID="1214d512-7719-4ed4-8eb7-a357f4f0e4bc" Nov 1 00:41:06.099405 env[1737]: time="2025-11-01T00:41:06.099330640Z" level=error msg="Failed to destroy network for sandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.099835 env[1737]: time="2025-11-01T00:41:06.099783624Z" level=error msg="encountered an error cleaning up failed sandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.099923 env[1737]: time="2025-11-01T00:41:06.099864043Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-bb8db9787-cmqlg,Uid:ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.100310 kubelet[2730]: E1101 00:41:06.100242 2730 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.100416 kubelet[2730]: E1101 00:41:06.100345 2730 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" Nov 1 00:41:06.100478 kubelet[2730]: E1101 00:41:06.100449 2730 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" Nov 1 00:41:06.100566 kubelet[2730]: E1101 00:41:06.100535 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-bb8db9787-cmqlg_calico-apiserver(ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-bb8db9787-cmqlg_calico-apiserver(ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" podUID="ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3" Nov 1 00:41:06.118857 env[1737]: time="2025-11-01T00:41:06.118784530Z" level=error msg="Failed to destroy network for sandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.119328 env[1737]: time="2025-11-01T00:41:06.119274193Z" level=error msg="encountered an error cleaning up failed sandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.119445 env[1737]: time="2025-11-01T00:41:06.119348755Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49b764c9-wpz62,Uid:8983267d-ef32-4d12-8dac-9ecb10367507,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.119940 kubelet[2730]: E1101 00:41:06.119723 2730 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.120149 kubelet[2730]: E1101 00:41:06.120024 2730 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" Nov 1 00:41:06.120149 kubelet[2730]: E1101 00:41:06.120066 2730 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" Nov 1 00:41:06.123034 kubelet[2730]: E1101 00:41:06.122926 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-d49b764c9-wpz62_calico-apiserver(8983267d-ef32-4d12-8dac-9ecb10367507)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-d49b764c9-wpz62_calico-apiserver(8983267d-ef32-4d12-8dac-9ecb10367507)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:41:06.132157 env[1737]: time="2025-11-01T00:41:06.132087467Z" level=error msg="Failed to destroy network for sandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.132831 env[1737]: time="2025-11-01T00:41:06.132779847Z" level=error msg="encountered an error cleaning up failed sandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.133061 env[1737]: time="2025-11-01T00:41:06.133010910Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bb8fbd4f8-rkzw4,Uid:67349f38-7770-459e-9c5a-e728b49cc9e0,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.134996 kubelet[2730]: E1101 00:41:06.133449 2730 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.134996 kubelet[2730]: E1101 00:41:06.133526 2730 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" Nov 1 00:41:06.134996 kubelet[2730]: E1101 00:41:06.133556 2730 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" Nov 1 00:41:06.136857 kubelet[2730]: E1101 00:41:06.133627 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5bb8fbd4f8-rkzw4_calico-system(67349f38-7770-459e-9c5a-e728b49cc9e0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5bb8fbd4f8-rkzw4_calico-system(67349f38-7770-459e-9c5a-e728b49cc9e0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:41:06.145144 env[1737]: time="2025-11-01T00:41:06.145072049Z" level=error msg="Failed to destroy network for sandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.146083 env[1737]: time="2025-11-01T00:41:06.146022723Z" level=error msg="encountered an error cleaning up failed sandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.146393 env[1737]: time="2025-11-01T00:41:06.146358554Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-k7kbp,Uid:1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.148197 kubelet[2730]: E1101 00:41:06.146726 2730 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.148197 kubelet[2730]: E1101 00:41:06.146800 2730 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-k7kbp" Nov 1 00:41:06.148197 kubelet[2730]: E1101 00:41:06.146866 2730 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-k7kbp" Nov 1 00:41:06.148438 kubelet[2730]: E1101 00:41:06.146935 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-k7kbp_kube-system(1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-k7kbp_kube-system(1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-k7kbp" podUID="1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f" Nov 1 00:41:06.150137 env[1737]: time="2025-11-01T00:41:06.150073005Z" level=error msg="Failed to destroy network for sandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.151389 env[1737]: time="2025-11-01T00:41:06.151344835Z" level=error msg="encountered an error cleaning up failed sandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.152882 env[1737]: time="2025-11-01T00:41:06.152810020Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-84dd6b699f-pctd4,Uid:a7378ec3-c2b9-4f36-862d-27732fa47f40,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.153536 kubelet[2730]: E1101 00:41:06.153429 2730 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.155179 kubelet[2730]: E1101 00:41:06.153751 2730 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-84dd6b699f-pctd4" Nov 1 00:41:06.155179 kubelet[2730]: E1101 00:41:06.153816 2730 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-84dd6b699f-pctd4" Nov 1 00:41:06.155179 kubelet[2730]: E1101 00:41:06.153887 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-84dd6b699f-pctd4_calico-system(a7378ec3-c2b9-4f36-862d-27732fa47f40)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-84dd6b699f-pctd4_calico-system(a7378ec3-c2b9-4f36-862d-27732fa47f40)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-84dd6b699f-pctd4" podUID="a7378ec3-c2b9-4f36-862d-27732fa47f40" Nov 1 00:41:06.189652 kubelet[2730]: I1101 00:41:06.189012 2730 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:06.195342 kubelet[2730]: I1101 00:41:06.194552 2730 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:06.197220 kubelet[2730]: I1101 00:41:06.197190 2730 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:06.199708 env[1737]: time="2025-11-01T00:41:06.199666194Z" level=info msg="StopPodSandbox for \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\"" Nov 1 00:41:06.200839 env[1737]: time="2025-11-01T00:41:06.200805999Z" level=info msg="StopPodSandbox for \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\"" Nov 1 00:41:06.201487 env[1737]: time="2025-11-01T00:41:06.201455361Z" level=info msg="StopPodSandbox for \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\"" Nov 1 00:41:06.202982 kubelet[2730]: I1101 00:41:06.202938 2730 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:06.204959 env[1737]: time="2025-11-01T00:41:06.204922595Z" level=info msg="StopPodSandbox for \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\"" Nov 1 00:41:06.208303 kubelet[2730]: I1101 00:41:06.207640 2730 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:06.210123 env[1737]: time="2025-11-01T00:41:06.210084040Z" level=info msg="StopPodSandbox for \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\"" Nov 1 00:41:06.214012 kubelet[2730]: I1101 00:41:06.213312 2730 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:06.214519 env[1737]: time="2025-11-01T00:41:06.214483996Z" level=info msg="StopPodSandbox for \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\"" Nov 1 00:41:06.223308 kubelet[2730]: I1101 00:41:06.222250 2730 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:06.226312 env[1737]: time="2025-11-01T00:41:06.226264682Z" level=info msg="StopPodSandbox for \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\"" Nov 1 00:41:06.244607 env[1737]: time="2025-11-01T00:41:06.244539484Z" level=error msg="Failed to destroy network for sandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.247371 env[1737]: time="2025-11-01T00:41:06.247307628Z" level=error msg="encountered an error cleaning up failed sandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.251140 env[1737]: time="2025-11-01T00:41:06.251069880Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wrg9s,Uid:666be2c8-6518-4217-90fd-5cf3423de279,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.256206 kubelet[2730]: E1101 00:41:06.251782 2730 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.256206 kubelet[2730]: E1101 00:41:06.252211 2730 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wrg9s" Nov 1 00:41:06.256206 kubelet[2730]: E1101 00:41:06.252273 2730 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wrg9s" Nov 1 00:41:06.257084 kubelet[2730]: E1101 00:41:06.252372 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wrg9s_calico-system(666be2c8-6518-4217-90fd-5cf3423de279)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wrg9s_calico-system(666be2c8-6518-4217-90fd-5cf3423de279)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:41:06.257084 kubelet[2730]: I1101 00:41:06.254075 2730 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:06.257827 env[1737]: time="2025-11-01T00:41:06.257786499Z" level=info msg="StopPodSandbox for \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\"" Nov 1 00:41:06.298117 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1-shm.mount: Deactivated successfully. Nov 1 00:41:06.298276 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29-shm.mount: Deactivated successfully. Nov 1 00:41:06.298366 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9-shm.mount: Deactivated successfully. Nov 1 00:41:06.410162 env[1737]: time="2025-11-01T00:41:06.410076862Z" level=error msg="StopPodSandbox for \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\" failed" error="failed to destroy network for sandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.410440 kubelet[2730]: E1101 00:41:06.410381 2730 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:06.410537 kubelet[2730]: E1101 00:41:06.410468 2730 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b"} Nov 1 00:41:06.410592 kubelet[2730]: E1101 00:41:06.410547 2730 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:41:06.410696 kubelet[2730]: E1101 00:41:06.410581 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" podUID="ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3" Nov 1 00:41:06.417769 env[1737]: time="2025-11-01T00:41:06.417697851Z" level=error msg="StopPodSandbox for \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\" failed" error="failed to destroy network for sandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.418643 kubelet[2730]: E1101 00:41:06.418391 2730 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:06.418643 kubelet[2730]: E1101 00:41:06.418477 2730 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4"} Nov 1 00:41:06.418643 kubelet[2730]: E1101 00:41:06.418555 2730 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a7378ec3-c2b9-4f36-862d-27732fa47f40\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:41:06.418643 kubelet[2730]: E1101 00:41:06.418604 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a7378ec3-c2b9-4f36-862d-27732fa47f40\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-84dd6b699f-pctd4" podUID="a7378ec3-c2b9-4f36-862d-27732fa47f40" Nov 1 00:41:06.446696 env[1737]: time="2025-11-01T00:41:06.446624502Z" level=error msg="StopPodSandbox for \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\" failed" error="failed to destroy network for sandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.447497 kubelet[2730]: E1101 00:41:06.447236 2730 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:06.447497 kubelet[2730]: E1101 00:41:06.447348 2730 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29"} Nov 1 00:41:06.447497 kubelet[2730]: E1101 00:41:06.447408 2730 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:41:06.447497 kubelet[2730]: E1101 00:41:06.447454 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-k7kbp" podUID="1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f" Nov 1 00:41:06.482225 env[1737]: time="2025-11-01T00:41:06.482066104Z" level=error msg="StopPodSandbox for \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\" failed" error="failed to destroy network for sandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.487035 kubelet[2730]: E1101 00:41:06.486629 2730 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:06.487035 kubelet[2730]: E1101 00:41:06.486721 2730 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224"} Nov 1 00:41:06.487035 kubelet[2730]: E1101 00:41:06.486787 2730 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8983267d-ef32-4d12-8dac-9ecb10367507\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:41:06.487035 kubelet[2730]: E1101 00:41:06.486964 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8983267d-ef32-4d12-8dac-9ecb10367507\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:41:06.490308 env[1737]: time="2025-11-01T00:41:06.490221200Z" level=error msg="StopPodSandbox for \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\" failed" error="failed to destroy network for sandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.492298 kubelet[2730]: E1101 00:41:06.491994 2730 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:06.492298 kubelet[2730]: E1101 00:41:06.492076 2730 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9"} Nov 1 00:41:06.492298 kubelet[2730]: E1101 00:41:06.492160 2730 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"67349f38-7770-459e-9c5a-e728b49cc9e0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:41:06.492298 kubelet[2730]: E1101 00:41:06.492230 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"67349f38-7770-459e-9c5a-e728b49cc9e0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:41:06.503084 env[1737]: time="2025-11-01T00:41:06.503017893Z" level=error msg="StopPodSandbox for \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\" failed" error="failed to destroy network for sandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.504068 kubelet[2730]: E1101 00:41:06.503736 2730 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:06.504068 kubelet[2730]: E1101 00:41:06.503831 2730 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1"} Nov 1 00:41:06.504068 kubelet[2730]: E1101 00:41:06.503910 2730 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:41:06.504068 kubelet[2730]: E1101 00:41:06.503958 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" podUID="a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7" Nov 1 00:41:06.517342 env[1737]: time="2025-11-01T00:41:06.517269204Z" level=error msg="StopPodSandbox for \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\" failed" error="failed to destroy network for sandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.518166 kubelet[2730]: E1101 00:41:06.517963 2730 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:06.518166 kubelet[2730]: E1101 00:41:06.518043 2730 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2"} Nov 1 00:41:06.518166 kubelet[2730]: E1101 00:41:06.518100 2730 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"21d23048-45cc-482a-a891-7ca305e12df5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:41:06.518166 kubelet[2730]: E1101 00:41:06.518129 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"21d23048-45cc-482a-a891-7ca305e12df5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:41:06.518757 env[1737]: time="2025-11-01T00:41:06.518633228Z" level=error msg="StopPodSandbox for \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\" failed" error="failed to destroy network for sandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:06.519073 kubelet[2730]: E1101 00:41:06.519033 2730 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:06.519192 kubelet[2730]: E1101 00:41:06.519086 2730 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6"} Nov 1 00:41:06.519192 kubelet[2730]: E1101 00:41:06.519128 2730 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1214d512-7719-4ed4-8eb7-a357f4f0e4bc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:41:06.519192 kubelet[2730]: E1101 00:41:06.519160 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1214d512-7719-4ed4-8eb7-a357f4f0e4bc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-4jl9s" podUID="1214d512-7719-4ed4-8eb7-a357f4f0e4bc" Nov 1 00:41:07.261487 kubelet[2730]: I1101 00:41:07.261450 2730 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:07.267467 env[1737]: time="2025-11-01T00:41:07.267416111Z" level=info msg="StopPodSandbox for \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\"" Nov 1 00:41:07.377171 env[1737]: time="2025-11-01T00:41:07.377097323Z" level=error msg="StopPodSandbox for \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\" failed" error="failed to destroy network for sandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 00:41:07.377901 kubelet[2730]: E1101 00:41:07.377705 2730 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:07.377901 kubelet[2730]: E1101 00:41:07.377774 2730 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900"} Nov 1 00:41:07.377901 kubelet[2730]: E1101 00:41:07.377823 2730 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"666be2c8-6518-4217-90fd-5cf3423de279\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 00:41:07.377901 kubelet[2730]: E1101 00:41:07.377858 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"666be2c8-6518-4217-90fd-5cf3423de279\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:41:14.891092 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount809557139.mount: Deactivated successfully. Nov 1 00:41:14.941273 env[1737]: time="2025-11-01T00:41:14.941216493Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:41:15.015273 env[1737]: time="2025-11-01T00:41:15.015210201Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:41:15.017888 env[1737]: time="2025-11-01T00:41:15.017836019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:41:15.020912 env[1737]: time="2025-11-01T00:41:15.020855061Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 00:41:15.021729 env[1737]: time="2025-11-01T00:41:15.021685165Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Nov 1 00:41:15.107292 env[1737]: time="2025-11-01T00:41:15.107245740Z" level=info msg="CreateContainer within sandbox \"380d2a5a095550588823b99f7f8c4c3be39a255d3c4e3021ab32bf6c93a35554\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Nov 1 00:41:15.195273 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4031120684.mount: Deactivated successfully. Nov 1 00:41:15.201736 env[1737]: time="2025-11-01T00:41:15.201666474Z" level=info msg="CreateContainer within sandbox \"380d2a5a095550588823b99f7f8c4c3be39a255d3c4e3021ab32bf6c93a35554\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2ede1154112e786a1d1f6f1a5e7725b94e751435f5b7a2d5d08c5add20aacf8b\"" Nov 1 00:41:15.203247 env[1737]: time="2025-11-01T00:41:15.203110266Z" level=info msg="StartContainer for \"2ede1154112e786a1d1f6f1a5e7725b94e751435f5b7a2d5d08c5add20aacf8b\"" Nov 1 00:41:15.233363 systemd[1]: Started cri-containerd-2ede1154112e786a1d1f6f1a5e7725b94e751435f5b7a2d5d08c5add20aacf8b.scope. Nov 1 00:41:15.298950 kernel: kauditd_printk_skb: 34 callbacks suppressed Nov 1 00:41:15.300046 kernel: audit: type=1400 audit(1761957675.289:1034): avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.289000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.313714 kernel: audit: type=1300 audit(1761957675.289:1034): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f3dbcc7b0a8 items=0 ppid=3178 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:15.289000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f3dbcc7b0a8 items=0 ppid=3178 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:15.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265646531313534313132653738366131643166366631613565373732 Nov 1 00:41:15.327140 kernel: audit: type=1327 audit(1761957675.289:1034): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265646531313534313132653738366131643166366631613565373732 Nov 1 00:41:15.289000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.289000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.343523 kernel: audit: type=1400 audit(1761957675.289:1035): avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.343679 kernel: audit: type=1400 audit(1761957675.289:1035): avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.289000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.351129 kernel: audit: type=1400 audit(1761957675.289:1035): avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.289000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.289000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.367031 kernel: audit: type=1400 audit(1761957675.289:1035): avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.367163 kernel: audit: type=1400 audit(1761957675.289:1035): avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.375860 kernel: audit: type=1400 audit(1761957675.289:1035): avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.289000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.376132 env[1737]: time="2025-11-01T00:41:15.368818233Z" level=info msg="StartContainer for \"2ede1154112e786a1d1f6f1a5e7725b94e751435f5b7a2d5d08c5add20aacf8b\" returns successfully" Nov 1 00:41:15.289000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.385237 kernel: audit: type=1400 audit(1761957675.289:1035): avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.289000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.289000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.289000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.289000 audit: BPF prog-id=139 op=LOAD Nov 1 00:41:15.289000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001e8a88 items=0 ppid=3178 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:15.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265646531313534313132653738366131643166366631613565373732 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit: BPF prog-id=140 op=LOAD Nov 1 00:41:15.298000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001e8ad8 items=0 ppid=3178 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:15.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265646531313534313132653738366131643166366631613565373732 Nov 1 00:41:15.298000 audit: BPF prog-id=140 op=UNLOAD Nov 1 00:41:15.298000 audit: BPF prog-id=139 op=UNLOAD Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { perfmon } for pid=3838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit[3838]: AVC avc: denied { bpf } for pid=3838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:15.298000 audit: BPF prog-id=141 op=LOAD Nov 1 00:41:15.298000 audit[3838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001e8b68 items=0 ppid=3178 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:15.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265646531313534313132653738366131643166366631613565373732 Nov 1 00:41:15.431701 kubelet[2730]: I1101 00:41:15.431610 2730 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-w8b9w" podStartSLOduration=1.028250894 podStartE2EDuration="28.427711561s" podCreationTimestamp="2025-11-01 00:40:47 +0000 UTC" firstStartedPulling="2025-11-01 00:40:47.623936649 +0000 UTC m=+21.032432159" lastFinishedPulling="2025-11-01 00:41:15.023397326 +0000 UTC m=+48.431892826" observedRunningTime="2025-11-01 00:41:15.427523845 +0000 UTC m=+48.836019353" watchObservedRunningTime="2025-11-01 00:41:15.427711561 +0000 UTC m=+48.836207069" Nov 1 00:41:16.143424 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Nov 1 00:41:16.143863 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Nov 1 00:41:16.409080 systemd[1]: run-containerd-runc-k8s.io-2ede1154112e786a1d1f6f1a5e7725b94e751435f5b7a2d5d08c5add20aacf8b-runc.1UKpFL.mount: Deactivated successfully. Nov 1 00:41:16.621798 env[1737]: time="2025-11-01T00:41:16.621751393Z" level=info msg="StopPodSandbox for \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\"" Nov 1 00:41:16.951869 env[1737]: time="2025-11-01T00:41:16.951213423Z" level=info msg="StopPodSandbox for \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\"" Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:16.775 [INFO][3932] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:16.777 [INFO][3932] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" iface="eth0" netns="/var/run/netns/cni-0505ff96-2165-7f01-8884-9f8455a4cabd" Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:16.777 [INFO][3932] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" iface="eth0" netns="/var/run/netns/cni-0505ff96-2165-7f01-8884-9f8455a4cabd" Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:16.781 [INFO][3932] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" iface="eth0" netns="/var/run/netns/cni-0505ff96-2165-7f01-8884-9f8455a4cabd" Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:16.784 [INFO][3932] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:16.784 [INFO][3932] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:17.179 [INFO][3939] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" HandleID="k8s-pod-network.8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Workload="ip--172--31--19--190-k8s-whisker--84dd6b699f--pctd4-eth0" Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:17.181 [INFO][3939] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:17.182 [INFO][3939] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:17.220 [WARNING][3939] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" HandleID="k8s-pod-network.8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Workload="ip--172--31--19--190-k8s-whisker--84dd6b699f--pctd4-eth0" Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:17.220 [INFO][3939] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" HandleID="k8s-pod-network.8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Workload="ip--172--31--19--190-k8s-whisker--84dd6b699f--pctd4-eth0" Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:17.229 [INFO][3939] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:17.243106 env[1737]: 2025-11-01 00:41:17.233 [INFO][3932] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:17.242031 systemd[1]: run-netns-cni\x2d0505ff96\x2d2165\x2d7f01\x2d8884\x2d9f8455a4cabd.mount: Deactivated successfully. Nov 1 00:41:17.244912 env[1737]: time="2025-11-01T00:41:17.244851246Z" level=info msg="TearDown network for sandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\" successfully" Nov 1 00:41:17.244912 env[1737]: time="2025-11-01T00:41:17.244895089Z" level=info msg="StopPodSandbox for \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\" returns successfully" Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.054 [INFO][3953] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.054 [INFO][3953] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" iface="eth0" netns="/var/run/netns/cni-fcba8e82-a907-1cd0-8578-8ce63823f88f" Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.055 [INFO][3953] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" iface="eth0" netns="/var/run/netns/cni-fcba8e82-a907-1cd0-8578-8ce63823f88f" Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.055 [INFO][3953] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" iface="eth0" netns="/var/run/netns/cni-fcba8e82-a907-1cd0-8578-8ce63823f88f" Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.055 [INFO][3953] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.055 [INFO][3953] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.176 [INFO][3969] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" HandleID="k8s-pod-network.7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.181 [INFO][3969] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.223 [INFO][3969] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.232 [WARNING][3969] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" HandleID="k8s-pod-network.7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.232 [INFO][3969] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" HandleID="k8s-pod-network.7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.237 [INFO][3969] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:17.260903 env[1737]: 2025-11-01 00:41:17.250 [INFO][3953] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:17.260903 env[1737]: time="2025-11-01T00:41:17.254232870Z" level=info msg="TearDown network for sandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\" successfully" Nov 1 00:41:17.260903 env[1737]: time="2025-11-01T00:41:17.254277559Z" level=info msg="StopPodSandbox for \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\" returns successfully" Nov 1 00:41:17.260903 env[1737]: time="2025-11-01T00:41:17.256623458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49b764c9-wpz62,Uid:8983267d-ef32-4d12-8dac-9ecb10367507,Namespace:calico-apiserver,Attempt:1,}" Nov 1 00:41:17.264221 systemd[1]: run-netns-cni\x2dfcba8e82\x2da907\x2d1cd0\x2d8578\x2d8ce63823f88f.mount: Deactivated successfully. Nov 1 00:41:17.323773 kubelet[2730]: I1101 00:41:17.323071 2730 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-pnb6v\" (UniqueName: \"kubernetes.io/projected/a7378ec3-c2b9-4f36-862d-27732fa47f40-kube-api-access-pnb6v\") pod \"a7378ec3-c2b9-4f36-862d-27732fa47f40\" (UID: \"a7378ec3-c2b9-4f36-862d-27732fa47f40\") " Nov 1 00:41:17.323773 kubelet[2730]: I1101 00:41:17.323595 2730 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a7378ec3-c2b9-4f36-862d-27732fa47f40-whisker-ca-bundle\") pod \"a7378ec3-c2b9-4f36-862d-27732fa47f40\" (UID: \"a7378ec3-c2b9-4f36-862d-27732fa47f40\") " Nov 1 00:41:17.323773 kubelet[2730]: I1101 00:41:17.323657 2730 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a7378ec3-c2b9-4f36-862d-27732fa47f40-whisker-backend-key-pair\") pod \"a7378ec3-c2b9-4f36-862d-27732fa47f40\" (UID: \"a7378ec3-c2b9-4f36-862d-27732fa47f40\") " Nov 1 00:41:17.336397 kubelet[2730]: I1101 00:41:17.333293 2730 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/a7378ec3-c2b9-4f36-862d-27732fa47f40-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "a7378ec3-c2b9-4f36-862d-27732fa47f40" (UID: "a7378ec3-c2b9-4f36-862d-27732fa47f40"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Nov 1 00:41:17.341674 systemd[1]: var-lib-kubelet-pods-a7378ec3\x2dc2b9\x2d4f36\x2d862d\x2d27732fa47f40-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dpnb6v.mount: Deactivated successfully. Nov 1 00:41:17.346155 kubelet[2730]: I1101 00:41:17.346051 2730 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/a7378ec3-c2b9-4f36-862d-27732fa47f40-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "a7378ec3-c2b9-4f36-862d-27732fa47f40" (UID: "a7378ec3-c2b9-4f36-862d-27732fa47f40"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Nov 1 00:41:17.346823 kubelet[2730]: I1101 00:41:17.346793 2730 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/a7378ec3-c2b9-4f36-862d-27732fa47f40-kube-api-access-pnb6v" (OuterVolumeSpecName: "kube-api-access-pnb6v") pod "a7378ec3-c2b9-4f36-862d-27732fa47f40" (UID: "a7378ec3-c2b9-4f36-862d-27732fa47f40"). InnerVolumeSpecName "kube-api-access-pnb6v". PluginName "kubernetes.io/projected", VolumeGIDValue "" Nov 1 00:41:17.392419 systemd[1]: Removed slice kubepods-besteffort-poda7378ec3_c2b9_4f36_862d_27732fa47f40.slice. Nov 1 00:41:17.429719 kubelet[2730]: I1101 00:41:17.429668 2730 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-pnb6v\" (UniqueName: \"kubernetes.io/projected/a7378ec3-c2b9-4f36-862d-27732fa47f40-kube-api-access-pnb6v\") on node \"ip-172-31-19-190\" DevicePath \"\"" Nov 1 00:41:17.430045 kubelet[2730]: I1101 00:41:17.429752 2730 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a7378ec3-c2b9-4f36-862d-27732fa47f40-whisker-ca-bundle\") on node \"ip-172-31-19-190\" DevicePath \"\"" Nov 1 00:41:17.430045 kubelet[2730]: I1101 00:41:17.429769 2730 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/a7378ec3-c2b9-4f36-862d-27732fa47f40-whisker-backend-key-pair\") on node \"ip-172-31-19-190\" DevicePath \"\"" Nov 1 00:41:17.550118 systemd[1]: Created slice kubepods-besteffort-podad238e2b_fbc2_4a12_80b4_cedf42c6dda0.slice. Nov 1 00:41:17.631273 kubelet[2730]: I1101 00:41:17.631217 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ad238e2b-fbc2-4a12-80b4-cedf42c6dda0-whisker-ca-bundle\") pod \"whisker-5c9fc5d7bc-cj29r\" (UID: \"ad238e2b-fbc2-4a12-80b4-cedf42c6dda0\") " pod="calico-system/whisker-5c9fc5d7bc-cj29r" Nov 1 00:41:17.631515 kubelet[2730]: I1101 00:41:17.631303 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/ad238e2b-fbc2-4a12-80b4-cedf42c6dda0-whisker-backend-key-pair\") pod \"whisker-5c9fc5d7bc-cj29r\" (UID: \"ad238e2b-fbc2-4a12-80b4-cedf42c6dda0\") " pod="calico-system/whisker-5c9fc5d7bc-cj29r" Nov 1 00:41:17.631515 kubelet[2730]: I1101 00:41:17.631357 2730 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wq5rt\" (UniqueName: \"kubernetes.io/projected/ad238e2b-fbc2-4a12-80b4-cedf42c6dda0-kube-api-access-wq5rt\") pod \"whisker-5c9fc5d7bc-cj29r\" (UID: \"ad238e2b-fbc2-4a12-80b4-cedf42c6dda0\") " pod="calico-system/whisker-5c9fc5d7bc-cj29r" Nov 1 00:41:17.660788 (udev-worker)[3890]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:41:17.668089 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:41:17.668245 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1ad4a802638: link becomes ready Nov 1 00:41:17.670388 systemd-networkd[1461]: cali1ad4a802638: Link UP Nov 1 00:41:17.670695 systemd-networkd[1461]: cali1ad4a802638: Gained carrier Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.380 [INFO][3979] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.411 [INFO][3979] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0 calico-apiserver-d49b764c9- calico-apiserver 8983267d-ef32-4d12-8dac-9ecb10367507 972 0 2025-11-01 00:40:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:d49b764c9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-19-190 calico-apiserver-d49b764c9-wpz62 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1ad4a802638 [] [] }} ContainerID="0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-wpz62" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-" Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.412 [INFO][3979] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-wpz62" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.473 [INFO][3995] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" HandleID="k8s-pod-network.0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.473 [INFO][3995] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" HandleID="k8s-pod-network.0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ccfe0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-19-190", "pod":"calico-apiserver-d49b764c9-wpz62", "timestamp":"2025-11-01 00:41:17.473256778 +0000 UTC"}, Hostname:"ip-172-31-19-190", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.473 [INFO][3995] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.473 [INFO][3995] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.474 [INFO][3995] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-190' Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.492 [INFO][3995] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" host="ip-172-31-19-190" Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.560 [INFO][3995] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-19-190" Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.582 [INFO][3995] ipam/ipam.go 511: Trying affinity for 192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.589 [INFO][3995] ipam/ipam.go 158: Attempting to load block cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.593 [INFO][3995] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.594 [INFO][3995] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" host="ip-172-31-19-190" Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.603 [INFO][3995] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45 Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.619 [INFO][3995] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" host="ip-172-31-19-190" Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.632 [INFO][3995] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.41.129/26] block=192.168.41.128/26 handle="k8s-pod-network.0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" host="ip-172-31-19-190" Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.632 [INFO][3995] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.41.129/26] handle="k8s-pod-network.0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" host="ip-172-31-19-190" Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.632 [INFO][3995] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:17.707183 env[1737]: 2025-11-01 00:41:17.633 [INFO][3995] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.41.129/26] IPv6=[] ContainerID="0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" HandleID="k8s-pod-network.0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:17.709369 env[1737]: 2025-11-01 00:41:17.636 [INFO][3979] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-wpz62" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0", GenerateName:"calico-apiserver-d49b764c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"8983267d-ef32-4d12-8dac-9ecb10367507", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49b764c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"", Pod:"calico-apiserver-d49b764c9-wpz62", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1ad4a802638", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:17.709369 env[1737]: 2025-11-01 00:41:17.636 [INFO][3979] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.41.129/32] ContainerID="0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-wpz62" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:17.709369 env[1737]: 2025-11-01 00:41:17.636 [INFO][3979] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1ad4a802638 ContainerID="0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-wpz62" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:17.709369 env[1737]: 2025-11-01 00:41:17.670 [INFO][3979] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-wpz62" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:17.709369 env[1737]: 2025-11-01 00:41:17.673 [INFO][3979] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-wpz62" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0", GenerateName:"calico-apiserver-d49b764c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"8983267d-ef32-4d12-8dac-9ecb10367507", ResourceVersion:"972", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49b764c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45", Pod:"calico-apiserver-d49b764c9-wpz62", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1ad4a802638", MAC:"26:23:b2:d0:f0:27", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:17.709369 env[1737]: 2025-11-01 00:41:17.702 [INFO][3979] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-wpz62" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:17.745497 env[1737]: time="2025-11-01T00:41:17.745405795Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:41:17.748688 env[1737]: time="2025-11-01T00:41:17.748642908Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:41:17.748916 env[1737]: time="2025-11-01T00:41:17.748884451Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:41:17.749420 env[1737]: time="2025-11-01T00:41:17.749377589Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45 pid=4015 runtime=io.containerd.runc.v2 Nov 1 00:41:17.771833 systemd[1]: Started cri-containerd-0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45.scope. Nov 1 00:41:17.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.796000 audit: BPF prog-id=142 op=LOAD Nov 1 00:41:17.796000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.796000 audit[4024]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4015 pid=4024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:17.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396463323636316138656433326633343162666239373536626431 Nov 1 00:41:17.796000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.796000 audit[4024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4015 pid=4024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:17.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396463323636316138656433326633343162666239373536626431 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit: BPF prog-id=143 op=LOAD Nov 1 00:41:17.797000 audit[4024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00031cc50 items=0 ppid=4015 pid=4024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:17.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396463323636316138656433326633343162666239373536626431 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit: BPF prog-id=144 op=LOAD Nov 1 00:41:17.797000 audit[4024]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00031cc98 items=0 ppid=4015 pid=4024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:17.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396463323636316138656433326633343162666239373536626431 Nov 1 00:41:17.797000 audit: BPF prog-id=144 op=UNLOAD Nov 1 00:41:17.797000 audit: BPF prog-id=143 op=UNLOAD Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { perfmon } for pid=4024 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit[4024]: AVC avc: denied { bpf } for pid=4024 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:17.797000 audit: BPF prog-id=145 op=LOAD Nov 1 00:41:17.797000 audit[4024]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00031d0a8 items=0 ppid=4015 pid=4024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:17.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062396463323636316138656433326633343162666239373536626431 Nov 1 00:41:17.838129 env[1737]: time="2025-11-01T00:41:17.838057136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49b764c9-wpz62,Uid:8983267d-ef32-4d12-8dac-9ecb10367507,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45\"" Nov 1 00:41:17.855498 env[1737]: time="2025-11-01T00:41:17.855458426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 00:41:17.877218 env[1737]: time="2025-11-01T00:41:17.877118686Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5c9fc5d7bc-cj29r,Uid:ad238e2b-fbc2-4a12-80b4-cedf42c6dda0,Namespace:calico-system,Attempt:0,}" Nov 1 00:41:17.950912 env[1737]: time="2025-11-01T00:41:17.950856514Z" level=info msg="StopPodSandbox for \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\"" Nov 1 00:41:17.962000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:41:17.962000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00307a660 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:41:17.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:41:17.962000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:41:17.962000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001956320 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:41:17.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:41:18.112292 env[1737]: time="2025-11-01T00:41:18.112224191Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:18.113726 env[1737]: time="2025-11-01T00:41:18.113597519Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 00:41:18.120914 kubelet[2730]: E1101 00:41:18.116563 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:18.121244 kubelet[2730]: E1101 00:41:18.120944 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:18.141732 systemd-networkd[1461]: cali77edb459b4b: Link UP Nov 1 00:41:18.147585 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali77edb459b4b: link becomes ready Nov 1 00:41:18.147765 kubelet[2730]: E1101 00:41:18.147474 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9n5s4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d49b764c9-wpz62_calico-apiserver(8983267d-ef32-4d12-8dac-9ecb10367507): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:18.149238 kubelet[2730]: E1101 00:41:18.149138 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:41:18.149500 systemd-networkd[1461]: cali77edb459b4b: Gained carrier Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.038 [INFO][4077] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.038 [INFO][4077] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" iface="eth0" netns="/var/run/netns/cni-f5a5d72e-5613-58ba-a51f-689b7745c28b" Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.039 [INFO][4077] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" iface="eth0" netns="/var/run/netns/cni-f5a5d72e-5613-58ba-a51f-689b7745c28b" Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.041 [INFO][4077] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" iface="eth0" netns="/var/run/netns/cni-f5a5d72e-5613-58ba-a51f-689b7745c28b" Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.041 [INFO][4077] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.041 [INFO][4077] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.105 [INFO][4092] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" HandleID="k8s-pod-network.d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.105 [INFO][4092] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.114 [INFO][4092] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.155 [WARNING][4092] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" HandleID="k8s-pod-network.d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.155 [INFO][4092] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" HandleID="k8s-pod-network.d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.161 [INFO][4092] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:18.169510 env[1737]: 2025-11-01 00:41:18.164 [INFO][4077] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:18.170582 env[1737]: time="2025-11-01T00:41:18.170530011Z" level=info msg="TearDown network for sandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\" successfully" Nov 1 00:41:18.170731 env[1737]: time="2025-11-01T00:41:18.170707767Z" level=info msg="StopPodSandbox for \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\" returns successfully" Nov 1 00:41:18.171919 env[1737]: time="2025-11-01T00:41:18.171887322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-k7kbp,Uid:1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f,Namespace:kube-system,Attempt:1,}" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:17.936 [INFO][4056] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:17.964 [INFO][4056] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0 whisker-5c9fc5d7bc- calico-system ad238e2b-fbc2-4a12-80b4-cedf42c6dda0 986 0 2025-11-01 00:41:17 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:5c9fc5d7bc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s ip-172-31-19-190 whisker-5c9fc5d7bc-cj29r eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali77edb459b4b [] [] }} ContainerID="fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" Namespace="calico-system" Pod="whisker-5c9fc5d7bc-cj29r" WorkloadEndpoint="ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:17.966 [INFO][4056] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" Namespace="calico-system" Pod="whisker-5c9fc5d7bc-cj29r" WorkloadEndpoint="ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.022 [INFO][4084] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" HandleID="k8s-pod-network.fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" Workload="ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.023 [INFO][4084] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" HandleID="k8s-pod-network.fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" Workload="ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c8fe0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-19-190", "pod":"whisker-5c9fc5d7bc-cj29r", "timestamp":"2025-11-01 00:41:18.022503204 +0000 UTC"}, Hostname:"ip-172-31-19-190", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.023 [INFO][4084] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.023 [INFO][4084] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.023 [INFO][4084] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-190' Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.043 [INFO][4084] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" host="ip-172-31-19-190" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.052 [INFO][4084] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-19-190" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.064 [INFO][4084] ipam/ipam.go 511: Trying affinity for 192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.067 [INFO][4084] ipam/ipam.go 158: Attempting to load block cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.072 [INFO][4084] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.072 [INFO][4084] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" host="ip-172-31-19-190" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.083 [INFO][4084] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.093 [INFO][4084] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" host="ip-172-31-19-190" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.109 [INFO][4084] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.41.130/26] block=192.168.41.128/26 handle="k8s-pod-network.fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" host="ip-172-31-19-190" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.110 [INFO][4084] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.41.130/26] handle="k8s-pod-network.fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" host="ip-172-31-19-190" Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.110 [INFO][4084] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:18.182073 env[1737]: 2025-11-01 00:41:18.110 [INFO][4084] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.41.130/26] IPv6=[] ContainerID="fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" HandleID="k8s-pod-network.fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" Workload="ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0" Nov 1 00:41:18.184442 env[1737]: 2025-11-01 00:41:18.119 [INFO][4056] cni-plugin/k8s.go 418: Populated endpoint ContainerID="fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" Namespace="calico-system" Pod="whisker-5c9fc5d7bc-cj29r" WorkloadEndpoint="ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0", GenerateName:"whisker-5c9fc5d7bc-", Namespace:"calico-system", SelfLink:"", UID:"ad238e2b-fbc2-4a12-80b4-cedf42c6dda0", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 41, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"5c9fc5d7bc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"", Pod:"whisker-5c9fc5d7bc-cj29r", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.41.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali77edb459b4b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:18.184442 env[1737]: 2025-11-01 00:41:18.119 [INFO][4056] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.41.130/32] ContainerID="fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" Namespace="calico-system" Pod="whisker-5c9fc5d7bc-cj29r" WorkloadEndpoint="ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0" Nov 1 00:41:18.184442 env[1737]: 2025-11-01 00:41:18.119 [INFO][4056] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali77edb459b4b ContainerID="fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" Namespace="calico-system" Pod="whisker-5c9fc5d7bc-cj29r" WorkloadEndpoint="ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0" Nov 1 00:41:18.184442 env[1737]: 2025-11-01 00:41:18.154 [INFO][4056] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" Namespace="calico-system" Pod="whisker-5c9fc5d7bc-cj29r" WorkloadEndpoint="ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0" Nov 1 00:41:18.184442 env[1737]: 2025-11-01 00:41:18.154 [INFO][4056] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" Namespace="calico-system" Pod="whisker-5c9fc5d7bc-cj29r" WorkloadEndpoint="ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0", GenerateName:"whisker-5c9fc5d7bc-", Namespace:"calico-system", SelfLink:"", UID:"ad238e2b-fbc2-4a12-80b4-cedf42c6dda0", ResourceVersion:"986", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 41, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"5c9fc5d7bc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d", Pod:"whisker-5c9fc5d7bc-cj29r", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.41.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali77edb459b4b", MAC:"76:99:2c:46:20:ac", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:18.184442 env[1737]: 2025-11-01 00:41:18.174 [INFO][4056] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d" Namespace="calico-system" Pod="whisker-5c9fc5d7bc-cj29r" WorkloadEndpoint="ip--172--31--19--190-k8s-whisker--5c9fc5d7bc--cj29r-eth0" Nov 1 00:41:18.226996 env[1737]: time="2025-11-01T00:41:18.226880134Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:41:18.227232 env[1737]: time="2025-11-01T00:41:18.226963550Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:41:18.227232 env[1737]: time="2025-11-01T00:41:18.227023264Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:41:18.227789 env[1737]: time="2025-11-01T00:41:18.227720046Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d pid=4159 runtime=io.containerd.runc.v2 Nov 1 00:41:18.262823 systemd[1]: run-netns-cni\x2df5a5d72e\x2d5613\x2d58ba\x2da51f\x2d689b7745c28b.mount: Deactivated successfully. Nov 1 00:41:18.278458 systemd[1]: var-lib-kubelet-pods-a7378ec3\x2dc2b9\x2d4f36\x2d862d\x2d27732fa47f40-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Nov 1 00:41:18.293116 systemd[1]: Started cri-containerd-fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d.scope. Nov 1 00:41:18.305000 audit[4127]: AVC avc: denied { write } for pid=4127 comm="tee" name="fd" dev="proc" ino=26818 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:41:18.305000 audit[4127]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc997637cb a2=241 a3=1b6 items=1 ppid=4105 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.305000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Nov 1 00:41:18.305000 audit: PATH item=0 name="/dev/fd/63" inode=25919 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:41:18.305000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:41:18.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.336000 audit: BPF prog-id=146 op=LOAD Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4159 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663306663323863623136616264313363396363333035313033326266 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4159 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663306663323863623136616264313363396363333035313033326266 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit: BPF prog-id=147 op=LOAD Nov 1 00:41:18.337000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003f6e80 items=0 ppid=4159 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663306663323863623136616264313363396363333035313033326266 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit: BPF prog-id=148 op=LOAD Nov 1 00:41:18.337000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003f6ec8 items=0 ppid=4159 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663306663323863623136616264313363396363333035313033326266 Nov 1 00:41:18.337000 audit: BPF prog-id=148 op=UNLOAD Nov 1 00:41:18.337000 audit: BPF prog-id=147 op=UNLOAD Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { perfmon } for pid=4170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit[4170]: AVC avc: denied { bpf } for pid=4170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.337000 audit: BPF prog-id=149 op=LOAD Nov 1 00:41:18.337000 audit[4170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003f72d8 items=0 ppid=4159 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663306663323863623136616264313363396363333035313033326266 Nov 1 00:41:18.369000 audit[4198]: AVC avc: denied { write } for pid=4198 comm="tee" name="fd" dev="proc" ino=26847 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:41:18.369000 audit[4198]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe6ca37dd a2=241 a3=1b6 items=1 ppid=4122 pid=4198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.369000 audit: CWD cwd="/etc/service/enabled/cni/log" Nov 1 00:41:18.369000 audit: PATH item=0 name="/dev/fd/63" inode=26824 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:41:18.369000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:41:18.409851 kubelet[2730]: E1101 00:41:18.409787 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:41:18.428038 env[1737]: time="2025-11-01T00:41:18.427772720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5c9fc5d7bc-cj29r,Uid:ad238e2b-fbc2-4a12-80b4-cedf42c6dda0,Namespace:calico-system,Attempt:0,} returns sandbox id \"fc0fc28cb16abd13c9cc3051032bfbba83b23e838ad6842e99c14b366113053d\"" Nov 1 00:41:18.435259 env[1737]: time="2025-11-01T00:41:18.435214688Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Nov 1 00:41:18.461000 audit[4225]: AVC avc: denied { write } for pid=4225 comm="tee" name="fd" dev="proc" ino=26069 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:41:18.461000 audit[4225]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca0b5a7db a2=241 a3=1b6 items=1 ppid=4114 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.461000 audit: CWD cwd="/etc/service/enabled/confd/log" Nov 1 00:41:18.461000 audit: PATH item=0 name="/dev/fd/63" inode=26861 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:41:18.461000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:41:18.483000 audit[4235]: AVC avc: denied { write } for pid=4235 comm="tee" name="fd" dev="proc" ino=26074 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:41:18.487000 audit[4227]: AVC avc: denied { write } for pid=4227 comm="tee" name="fd" dev="proc" ino=26879 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:41:18.487000 audit[4227]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9176d7cc a2=241 a3=1b6 items=1 ppid=4124 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.487000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Nov 1 00:41:18.487000 audit: PATH item=0 name="/dev/fd/63" inode=26864 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:41:18.487000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:41:18.498000 audit[4237]: AVC avc: denied { write } for pid=4237 comm="tee" name="fd" dev="proc" ino=26077 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:41:18.498000 audit[4237]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3c0c27dc a2=241 a3=1b6 items=1 ppid=4130 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.498000 audit: CWD cwd="/etc/service/enabled/bird/log" Nov 1 00:41:18.498000 audit: PATH item=0 name="/dev/fd/63" inode=26874 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:41:18.498000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:41:18.483000 audit[4235]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc820d7db a2=241 a3=1b6 items=1 ppid=4111 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.483000 audit: CWD cwd="/etc/service/enabled/bird6/log" Nov 1 00:41:18.483000 audit: PATH item=0 name="/dev/fd/63" inode=26873 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:41:18.483000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:41:18.521546 systemd-networkd[1461]: calid8d10140e55: Link UP Nov 1 00:41:18.527130 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid8d10140e55: link becomes ready Nov 1 00:41:18.526648 systemd-networkd[1461]: calid8d10140e55: Gained carrier Nov 1 00:41:18.528000 audit[4242]: AVC avc: denied { write } for pid=4242 comm="tee" name="fd" dev="proc" ino=26085 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 00:41:18.528000 audit[4242]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2166a7db a2=241 a3=1b6 items=1 ppid=4128 pid=4242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.528000 audit: CWD cwd="/etc/service/enabled/felix/log" Nov 1 00:41:18.528000 audit: PATH item=0 name="/dev/fd/63" inode=26876 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 00:41:18.528000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.300 [INFO][4138] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.320 [INFO][4138] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0 coredns-674b8bbfcf- kube-system 1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f 995 0 2025-11-01 00:40:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-19-190 coredns-674b8bbfcf-k7kbp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid8d10140e55 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" Namespace="kube-system" Pod="coredns-674b8bbfcf-k7kbp" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-" Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.320 [INFO][4138] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" Namespace="kube-system" Pod="coredns-674b8bbfcf-k7kbp" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.391 [INFO][4201] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" HandleID="k8s-pod-network.21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.391 [INFO][4201] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" HandleID="k8s-pod-network.21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025d010), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-19-190", "pod":"coredns-674b8bbfcf-k7kbp", "timestamp":"2025-11-01 00:41:18.391143296 +0000 UTC"}, Hostname:"ip-172-31-19-190", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.391 [INFO][4201] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.391 [INFO][4201] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.392 [INFO][4201] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-190' Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.424 [INFO][4201] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" host="ip-172-31-19-190" Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.444 [INFO][4201] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-19-190" Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.465 [INFO][4201] ipam/ipam.go 511: Trying affinity for 192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.468 [INFO][4201] ipam/ipam.go 158: Attempting to load block cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.472 [INFO][4201] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.473 [INFO][4201] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" host="ip-172-31-19-190" Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.476 [INFO][4201] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90 Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.484 [INFO][4201] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" host="ip-172-31-19-190" Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.497 [INFO][4201] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.41.131/26] block=192.168.41.128/26 handle="k8s-pod-network.21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" host="ip-172-31-19-190" Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.497 [INFO][4201] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.41.131/26] handle="k8s-pod-network.21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" host="ip-172-31-19-190" Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.497 [INFO][4201] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:18.559247 env[1737]: 2025-11-01 00:41:18.497 [INFO][4201] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.41.131/26] IPv6=[] ContainerID="21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" HandleID="k8s-pod-network.21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:18.560349 env[1737]: 2025-11-01 00:41:18.501 [INFO][4138] cni-plugin/k8s.go 418: Populated endpoint ContainerID="21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" Namespace="kube-system" Pod="coredns-674b8bbfcf-k7kbp" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"", Pod:"coredns-674b8bbfcf-k7kbp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid8d10140e55", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:18.560349 env[1737]: 2025-11-01 00:41:18.501 [INFO][4138] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.41.131/32] ContainerID="21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" Namespace="kube-system" Pod="coredns-674b8bbfcf-k7kbp" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:18.560349 env[1737]: 2025-11-01 00:41:18.501 [INFO][4138] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid8d10140e55 ContainerID="21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" Namespace="kube-system" Pod="coredns-674b8bbfcf-k7kbp" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:18.560349 env[1737]: 2025-11-01 00:41:18.531 [INFO][4138] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" Namespace="kube-system" Pod="coredns-674b8bbfcf-k7kbp" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:18.560349 env[1737]: 2025-11-01 00:41:18.536 [INFO][4138] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" Namespace="kube-system" Pod="coredns-674b8bbfcf-k7kbp" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f", ResourceVersion:"995", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90", Pod:"coredns-674b8bbfcf-k7kbp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid8d10140e55", MAC:"ee:90:bf:ed:af:08", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:18.560349 env[1737]: 2025-11-01 00:41:18.556 [INFO][4138] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90" Namespace="kube-system" Pod="coredns-674b8bbfcf-k7kbp" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:18.590672 env[1737]: time="2025-11-01T00:41:18.590324956Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:41:18.590672 env[1737]: time="2025-11-01T00:41:18.590392467Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:41:18.590672 env[1737]: time="2025-11-01T00:41:18.590406648Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:41:18.591103 env[1737]: time="2025-11-01T00:41:18.590814224Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90 pid=4262 runtime=io.containerd.runc.v2 Nov 1 00:41:18.644000 audit[4281]: NETFILTER_CFG table=filter:107 family=2 entries=20 op=nft_register_rule pid=4281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:18.644000 audit[4281]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffdfc7b6480 a2=0 a3=7ffdfc7b646c items=0 ppid=2837 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.644000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:18.659451 systemd[1]: Started cri-containerd-21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90.scope. Nov 1 00:41:18.671000 audit[4281]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:18.671000 audit[4281]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdfc7b6480 a2=0 a3=0 items=0 ppid=2837 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:18.689697 env[1737]: time="2025-11-01T00:41:18.689639147Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:18.691071 env[1737]: time="2025-11-01T00:41:18.691008206Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Nov 1 00:41:18.691623 kubelet[2730]: E1101 00:41:18.691560 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 00:41:18.691771 kubelet[2730]: E1101 00:41:18.691637 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 00:41:18.691861 kubelet[2730]: E1101 00:41:18.691811 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:51a637753dc8497c80682bb02487956c,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-wq5rt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c9fc5d7bc-cj29r_calico-system(ad238e2b-fbc2-4a12-80b4-cedf42c6dda0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:18.694415 env[1737]: time="2025-11-01T00:41:18.694374129Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Nov 1 00:41:18.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit: BPF prog-id=150 op=LOAD Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4262 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636231363830633834333365353365313261303735656664303438 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4262 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636231363830633834333365353365313261303735656664303438 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit: BPF prog-id=151 op=LOAD Nov 1 00:41:18.700000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002b1250 items=0 ppid=4262 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636231363830633834333365353365313261303735656664303438 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.700000 audit: BPF prog-id=152 op=LOAD Nov 1 00:41:18.700000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002b1298 items=0 ppid=4262 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636231363830633834333365353365313261303735656664303438 Nov 1 00:41:18.701000 audit: BPF prog-id=152 op=UNLOAD Nov 1 00:41:18.701000 audit: BPF prog-id=151 op=UNLOAD Nov 1 00:41:18.701000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.701000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.701000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.701000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.701000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.701000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.701000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.701000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.701000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.701000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.701000 audit: BPF prog-id=153 op=LOAD Nov 1 00:41:18.701000 audit[4273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002b16a8 items=0 ppid=4262 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231636231363830633834333365353365313261303735656664303438 Nov 1 00:41:18.782295 env[1737]: time="2025-11-01T00:41:18.782233825Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-k7kbp,Uid:1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f,Namespace:kube-system,Attempt:1,} returns sandbox id \"21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90\"" Nov 1 00:41:18.788706 env[1737]: time="2025-11-01T00:41:18.788659170Z" level=info msg="CreateContainer within sandbox \"21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Nov 1 00:41:18.812835 env[1737]: time="2025-11-01T00:41:18.812770314Z" level=info msg="CreateContainer within sandbox \"21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e139cd5b090cf568abd635640981482f5cb0fa13ce67a414df00feef6d3dfcc0\"" Nov 1 00:41:18.813849 env[1737]: time="2025-11-01T00:41:18.813792215Z" level=info msg="StartContainer for \"e139cd5b090cf568abd635640981482f5cb0fa13ce67a414df00feef6d3dfcc0\"" Nov 1 00:41:18.839186 systemd[1]: Started cri-containerd-e139cd5b090cf568abd635640981482f5cb0fa13ce67a414df00feef6d3dfcc0.scope. Nov 1 00:41:18.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.879000 audit: BPF prog-id=154 op=LOAD Nov 1 00:41:18.884000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.884000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4262 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333963643562303930636635363861626436333536343039383134 Nov 1 00:41:18.884000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.884000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4262 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333963643562303930636635363861626436333536343039383134 Nov 1 00:41:18.884000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.884000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.884000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.884000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.884000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.884000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.884000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.884000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.884000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.884000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.884000 audit: BPF prog-id=155 op=LOAD Nov 1 00:41:18.884000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00024dd90 items=0 ppid=4262 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333963643562303930636635363861626436333536343039383134 Nov 1 00:41:18.888000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.888000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.888000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.888000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.888000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.888000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.888000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.888000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.888000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.888000 audit: BPF prog-id=156 op=LOAD Nov 1 00:41:18.888000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00024ddd8 items=0 ppid=4262 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333963643562303930636635363861626436333536343039383134 Nov 1 00:41:18.891000 audit: BPF prog-id=156 op=UNLOAD Nov 1 00:41:18.891000 audit: BPF prog-id=155 op=UNLOAD Nov 1 00:41:18.891000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.891000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.891000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.891000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.891000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.891000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.891000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.891000 audit[4304]: AVC avc: denied { perfmon } for pid=4304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.891000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.891000 audit[4304]: AVC avc: denied { bpf } for pid=4304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:18.891000 audit: BPF prog-id=157 op=LOAD Nov 1 00:41:18.891000 audit[4304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003961e8 items=0 ppid=4262 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:18.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531333963643562303930636635363861626436333536343039383134 Nov 1 00:41:18.924418 env[1737]: time="2025-11-01T00:41:18.924269390Z" level=info msg="StartContainer for \"e139cd5b090cf568abd635640981482f5cb0fa13ce67a414df00feef6d3dfcc0\" returns successfully" Nov 1 00:41:18.951086 env[1737]: time="2025-11-01T00:41:18.951036248Z" level=info msg="StopPodSandbox for \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\"" Nov 1 00:41:18.958426 kubelet[2730]: I1101 00:41:18.958375 2730 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="a7378ec3-c2b9-4f36-862d-27732fa47f40" path="/var/lib/kubelet/pods/a7378ec3-c2b9-4f36-862d-27732fa47f40/volumes" Nov 1 00:41:18.969146 env[1737]: time="2025-11-01T00:41:18.969088042Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:18.970807 env[1737]: time="2025-11-01T00:41:18.970737375Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Nov 1 00:41:18.971353 kubelet[2730]: E1101 00:41:18.971289 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 00:41:18.971482 kubelet[2730]: E1101 00:41:18.971365 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 00:41:18.971596 kubelet[2730]: E1101 00:41:18.971539 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-wq5rt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c9fc5d7bc-cj29r_calico-system(ad238e2b-fbc2-4a12-80b4-cedf42c6dda0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:18.973108 kubelet[2730]: E1101 00:41:18.973055 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-5c9fc5d7bc-cj29r" podUID="ad238e2b-fbc2-4a12-80b4-cedf42c6dda0" Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.052 [INFO][4339] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.053 [INFO][4339] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" iface="eth0" netns="/var/run/netns/cni-c5f6c6ce-d8d7-2b11-9dd1-46faa7daef7c" Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.053 [INFO][4339] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" iface="eth0" netns="/var/run/netns/cni-c5f6c6ce-d8d7-2b11-9dd1-46faa7daef7c" Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.053 [INFO][4339] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" iface="eth0" netns="/var/run/netns/cni-c5f6c6ce-d8d7-2b11-9dd1-46faa7daef7c" Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.055 [INFO][4339] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.055 [INFO][4339] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.109 [INFO][4348] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" HandleID="k8s-pod-network.5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Workload="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.110 [INFO][4348] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.110 [INFO][4348] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.123 [WARNING][4348] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" HandleID="k8s-pod-network.5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Workload="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.124 [INFO][4348] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" HandleID="k8s-pod-network.5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Workload="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.126 [INFO][4348] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:19.132169 env[1737]: 2025-11-01 00:41:19.129 [INFO][4339] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:19.133200 env[1737]: time="2025-11-01T00:41:19.133153213Z" level=info msg="TearDown network for sandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\" successfully" Nov 1 00:41:19.133350 env[1737]: time="2025-11-01T00:41:19.133326983Z" level=info msg="StopPodSandbox for \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\" returns successfully" Nov 1 00:41:19.134678 env[1737]: time="2025-11-01T00:41:19.134641515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bb8fbd4f8-rkzw4,Uid:67349f38-7770-459e-9c5a-e728b49cc9e0,Namespace:calico-system,Attempt:1,}" Nov 1 00:41:19.259519 systemd[1]: run-containerd-runc-k8s.io-21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90-runc.HwDe8c.mount: Deactivated successfully. Nov 1 00:41:19.259689 systemd[1]: run-netns-cni\x2dc5f6c6ce\x2dd8d7\x2d2b11\x2d9dd1\x2d46faa7daef7c.mount: Deactivated successfully. Nov 1 00:41:19.366855 systemd-networkd[1461]: cali59445e29506: Link UP Nov 1 00:41:19.374651 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:41:19.374814 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali59445e29506: link becomes ready Nov 1 00:41:19.376313 systemd-networkd[1461]: cali59445e29506: Gained carrier Nov 1 00:41:19.388271 systemd-networkd[1461]: cali1ad4a802638: Gained IPv6LL Nov 1 00:41:19.414958 kubelet[2730]: E1101 00:41:19.414904 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-5c9fc5d7bc-cj29r" podUID="ad238e2b-fbc2-4a12-80b4-cedf42c6dda0" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.231 [INFO][4355] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0 calico-kube-controllers-5bb8fbd4f8- calico-system 67349f38-7770-459e-9c5a-e728b49cc9e0 1020 0 2025-11-01 00:40:47 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5bb8fbd4f8 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-19-190 calico-kube-controllers-5bb8fbd4f8-rkzw4 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali59445e29506 [] [] }} ContainerID="5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" Namespace="calico-system" Pod="calico-kube-controllers-5bb8fbd4f8-rkzw4" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.232 [INFO][4355] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" Namespace="calico-system" Pod="calico-kube-controllers-5bb8fbd4f8-rkzw4" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.296 [INFO][4370] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" HandleID="k8s-pod-network.5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" Workload="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.296 [INFO][4370] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" HandleID="k8s-pod-network.5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" Workload="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d55a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-19-190", "pod":"calico-kube-controllers-5bb8fbd4f8-rkzw4", "timestamp":"2025-11-01 00:41:19.296367682 +0000 UTC"}, Hostname:"ip-172-31-19-190", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.296 [INFO][4370] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.296 [INFO][4370] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.297 [INFO][4370] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-190' Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.309 [INFO][4370] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" host="ip-172-31-19-190" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.316 [INFO][4370] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-19-190" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.323 [INFO][4370] ipam/ipam.go 511: Trying affinity for 192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.326 [INFO][4370] ipam/ipam.go 158: Attempting to load block cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.331 [INFO][4370] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.331 [INFO][4370] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" host="ip-172-31-19-190" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.335 [INFO][4370] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.347 [INFO][4370] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" host="ip-172-31-19-190" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.359 [INFO][4370] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.41.132/26] block=192.168.41.128/26 handle="k8s-pod-network.5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" host="ip-172-31-19-190" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.359 [INFO][4370] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.41.132/26] handle="k8s-pod-network.5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" host="ip-172-31-19-190" Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.359 [INFO][4370] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:19.418019 env[1737]: 2025-11-01 00:41:19.359 [INFO][4370] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.41.132/26] IPv6=[] ContainerID="5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" HandleID="k8s-pod-network.5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" Workload="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:19.419119 env[1737]: 2025-11-01 00:41:19.363 [INFO][4355] cni-plugin/k8s.go 418: Populated endpoint ContainerID="5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" Namespace="calico-system" Pod="calico-kube-controllers-5bb8fbd4f8-rkzw4" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0", GenerateName:"calico-kube-controllers-5bb8fbd4f8-", Namespace:"calico-system", SelfLink:"", UID:"67349f38-7770-459e-9c5a-e728b49cc9e0", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bb8fbd4f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"", Pod:"calico-kube-controllers-5bb8fbd4f8-rkzw4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.41.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali59445e29506", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:19.419119 env[1737]: 2025-11-01 00:41:19.363 [INFO][4355] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.41.132/32] ContainerID="5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" Namespace="calico-system" Pod="calico-kube-controllers-5bb8fbd4f8-rkzw4" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:19.419119 env[1737]: 2025-11-01 00:41:19.363 [INFO][4355] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali59445e29506 ContainerID="5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" Namespace="calico-system" Pod="calico-kube-controllers-5bb8fbd4f8-rkzw4" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:19.419119 env[1737]: 2025-11-01 00:41:19.375 [INFO][4355] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" Namespace="calico-system" Pod="calico-kube-controllers-5bb8fbd4f8-rkzw4" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:19.419119 env[1737]: 2025-11-01 00:41:19.375 [INFO][4355] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" Namespace="calico-system" Pod="calico-kube-controllers-5bb8fbd4f8-rkzw4" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0", GenerateName:"calico-kube-controllers-5bb8fbd4f8-", Namespace:"calico-system", SelfLink:"", UID:"67349f38-7770-459e-9c5a-e728b49cc9e0", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bb8fbd4f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d", Pod:"calico-kube-controllers-5bb8fbd4f8-rkzw4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.41.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali59445e29506", MAC:"66:20:17:b9:c8:21", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:19.419119 env[1737]: 2025-11-01 00:41:19.401 [INFO][4355] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d" Namespace="calico-system" Pod="calico-kube-controllers-5bb8fbd4f8-rkzw4" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:19.428852 kubelet[2730]: E1101 00:41:19.426221 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:41:19.448774 env[1737]: time="2025-11-01T00:41:19.448667629Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:41:19.448990 env[1737]: time="2025-11-01T00:41:19.448789248Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:41:19.448990 env[1737]: time="2025-11-01T00:41:19.448821055Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:41:19.449139 env[1737]: time="2025-11-01T00:41:19.449092479Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d pid=4408 runtime=io.containerd.runc.v2 Nov 1 00:41:19.493000 audit[4428]: NETFILTER_CFG table=filter:109 family=2 entries=20 op=nft_register_rule pid=4428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:19.493000 audit[4428]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe978e62c0 a2=0 a3=7ffe978e62ac items=0 ppid=2837 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:19.496000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.496000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.496000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.496000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.496000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.496000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.496000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.496000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.496000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.496000 audit: BPF prog-id=158 op=LOAD Nov 1 00:41:19.496000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc6e637290 a2=98 a3=1fffffffffffffff items=0 ppid=4129 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.496000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:41:19.496000 audit: BPF prog-id=158 op=UNLOAD Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit: BPF prog-id=159 op=LOAD Nov 1 00:41:19.497000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc6e637170 a2=94 a3=3 items=0 ppid=4129 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.497000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:41:19.497000 audit: BPF prog-id=159 op=UNLOAD Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit: BPF prog-id=160 op=LOAD Nov 1 00:41:19.497000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc6e6371b0 a2=94 a3=7ffc6e637390 items=0 ppid=4129 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.497000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:41:19.497000 audit: BPF prog-id=160 op=UNLOAD Nov 1 00:41:19.497000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.497000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc6e637280 a2=50 a3=a000000085 items=0 ppid=4129 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.497000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 00:41:19.504000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.504000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.504000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.504000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.504000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.504000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.504000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.504000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.504000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.504000 audit: BPF prog-id=161 op=LOAD Nov 1 00:41:19.504000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd11c7fa40 a2=98 a3=3 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.504000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.504000 audit: BPF prog-id=161 op=UNLOAD Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit: BPF prog-id=162 op=LOAD Nov 1 00:41:19.507000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd11c7f830 a2=94 a3=54428f items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.507000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.507000 audit: BPF prog-id=162 op=UNLOAD Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.507000 audit: BPF prog-id=163 op=LOAD Nov 1 00:41:19.507000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd11c7f860 a2=94 a3=2 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.507000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.508000 audit: BPF prog-id=163 op=UNLOAD Nov 1 00:41:19.520000 audit[4428]: NETFILTER_CFG table=nat:110 family=2 entries=14 op=nft_register_rule pid=4428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:19.520000 audit[4428]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe978e62c0 a2=0 a3=0 items=0 ppid=2837 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.520000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:19.541261 systemd[1]: Started cri-containerd-5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d.scope. Nov 1 00:41:19.556074 kubelet[2730]: I1101 00:41:19.555032 2730 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-k7kbp" podStartSLOduration=50.555007084 podStartE2EDuration="50.555007084s" podCreationTimestamp="2025-11-01 00:40:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-11-01 00:41:19.550818724 +0000 UTC m=+52.959314233" watchObservedRunningTime="2025-11-01 00:41:19.555007084 +0000 UTC m=+52.963502593" Nov 1 00:41:19.583000 audit[4452]: NETFILTER_CFG table=filter:111 family=2 entries=20 op=nft_register_rule pid=4452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:19.583000 audit[4452]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff612bcb20 a2=0 a3=7fff612bcb0c items=0 ppid=2837 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.583000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:19.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.590000 audit: BPF prog-id=164 op=LOAD Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4408 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533343730313762383538636633313639623665363130663364643161 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4408 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533343730313762383538636633313639623665363130663364643161 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit: BPF prog-id=165 op=LOAD Nov 1 00:41:19.592000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003bc4a0 items=0 ppid=4408 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533343730313762383538636633313639623665363130663364643161 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit: BPF prog-id=166 op=LOAD Nov 1 00:41:19.592000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003bc4e8 items=0 ppid=4408 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533343730313762383538636633313639623665363130663364643161 Nov 1 00:41:19.592000 audit: BPF prog-id=166 op=UNLOAD Nov 1 00:41:19.592000 audit: BPF prog-id=165 op=UNLOAD Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { perfmon } for pid=4422 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit[4422]: AVC avc: denied { bpf } for pid=4422 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.592000 audit: BPF prog-id=167 op=LOAD Nov 1 00:41:19.592000 audit[4422]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003bc8f8 items=0 ppid=4408 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533343730313762383538636633313639623665363130663364643161 Nov 1 00:41:19.593000 audit[4452]: NETFILTER_CFG table=nat:112 family=2 entries=14 op=nft_register_rule pid=4452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:19.593000 audit[4452]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff612bcb20 a2=0 a3=0 items=0 ppid=2837 pid=4452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.593000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:19.645718 env[1737]: time="2025-11-01T00:41:19.645659133Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5bb8fbd4f8-rkzw4,Uid:67349f38-7770-459e-9c5a-e728b49cc9e0,Namespace:calico-system,Attempt:1,} returns sandbox id \"5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d\"" Nov 1 00:41:19.648783 env[1737]: time="2025-11-01T00:41:19.648739799Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Nov 1 00:41:19.732000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.732000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.732000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.732000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.732000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.732000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.732000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.732000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.732000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.732000 audit: BPF prog-id=168 op=LOAD Nov 1 00:41:19.732000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd11c7f720 a2=94 a3=1 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.732000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.732000 audit: BPF prog-id=168 op=UNLOAD Nov 1 00:41:19.732000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.732000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd11c7f7f0 a2=50 a3=7ffd11c7f8d0 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.732000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd11c7f730 a2=28 a3=0 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11c7f760 a2=28 a3=0 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11c7f670 a2=28 a3=0 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd11c7f780 a2=28 a3=0 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd11c7f760 a2=28 a3=0 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd11c7f750 a2=28 a3=0 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd11c7f780 a2=28 a3=0 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11c7f760 a2=28 a3=0 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11c7f780 a2=28 a3=0 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd11c7f750 a2=28 a3=0 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd11c7f7c0 a2=28 a3=0 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd11c7f570 a2=50 a3=1 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit: BPF prog-id=169 op=LOAD Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd11c7f570 a2=94 a3=5 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit: BPF prog-id=169 op=UNLOAD Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd11c7f620 a2=50 a3=1 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd11c7f740 a2=4 a3=38 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.744000 audit[4433]: AVC avc: denied { confidentiality } for pid=4433 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:41:19.744000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd11c7f790 a2=94 a3=6 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.744000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { confidentiality } for pid=4433 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:41:19.745000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd11c7ef40 a2=94 a3=88 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.745000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.745000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd11c7ef40 a2=94 a3=88 items=0 ppid=4129 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.745000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 00:41:19.759000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.759000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.759000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.759000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.759000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.759000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.759000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.759000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.759000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.759000 audit: BPF prog-id=170 op=LOAD Nov 1 00:41:19.759000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd18237320 a2=98 a3=1999999999999999 items=0 ppid=4129 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.759000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:41:19.761000 audit: BPF prog-id=170 op=UNLOAD Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit: BPF prog-id=171 op=LOAD Nov 1 00:41:19.761000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd18237200 a2=94 a3=ffff items=0 ppid=4129 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.761000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:41:19.761000 audit: BPF prog-id=171 op=UNLOAD Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.761000 audit: BPF prog-id=172 op=LOAD Nov 1 00:41:19.761000 audit[4463]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd18237240 a2=94 a3=7ffd18237420 items=0 ppid=4129 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.761000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 00:41:19.762000 audit: BPF prog-id=172 op=UNLOAD Nov 1 00:41:19.900460 systemd-networkd[1461]: vxlan.calico: Link UP Nov 1 00:41:19.900470 systemd-networkd[1461]: vxlan.calico: Gained carrier Nov 1 00:41:19.911653 env[1737]: time="2025-11-01T00:41:19.911597466Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:19.912625 env[1737]: time="2025-11-01T00:41:19.912567165Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Nov 1 00:41:19.913691 kubelet[2730]: E1101 00:41:19.913007 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 00:41:19.913691 kubelet[2730]: E1101 00:41:19.913096 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 00:41:19.913691 kubelet[2730]: E1101 00:41:19.913350 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-sk4qc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-5bb8fbd4f8-rkzw4_calico-system(67349f38-7770-459e-9c5a-e728b49cc9e0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:19.914816 kubelet[2730]: E1101 00:41:19.914720 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:41:19.931313 (udev-worker)[4023]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:41:19.934000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.934000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.934000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.934000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.934000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.934000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.934000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.934000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.934000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.934000 audit: BPF prog-id=173 op=LOAD Nov 1 00:41:19.934000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8140d2d0 a2=98 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.934000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.934000 audit: BPF prog-id=173 op=UNLOAD Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit: BPF prog-id=174 op=LOAD Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8140d0e0 a2=94 a3=54428f items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.936000 audit: BPF prog-id=174 op=UNLOAD Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit: BPF prog-id=175 op=LOAD Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8140d110 a2=94 a3=2 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.936000 audit: BPF prog-id=175 op=UNLOAD Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8140cfe0 a2=28 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8140d010 a2=28 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8140cf20 a2=28 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8140d030 a2=28 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8140d010 a2=28 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8140d000 a2=28 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8140d030 a2=28 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8140d010 a2=28 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8140d030 a2=28 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8140d000 a2=28 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.936000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.936000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc8140d070 a2=28 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.936000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.939000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.939000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.939000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.939000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.939000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.939000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.939000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.939000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.939000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.939000 audit: BPF prog-id=176 op=LOAD Nov 1 00:41:19.939000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8140cee0 a2=94 a3=0 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.939000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.939000 audit: BPF prog-id=176 op=UNLOAD Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc8140ced0 a2=50 a3=2800 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.940000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc8140ced0 a2=50 a3=2800 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.940000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit: BPF prog-id=177 op=LOAD Nov 1 00:41:19.940000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8140c6f0 a2=94 a3=2 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.940000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.940000 audit: BPF prog-id=177 op=UNLOAD Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { perfmon } for pid=4489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit[4489]: AVC avc: denied { bpf } for pid=4489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.940000 audit: BPF prog-id=178 op=LOAD Nov 1 00:41:19.940000 audit[4489]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8140c7f0 a2=94 a3=30 items=0 ppid=4129 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.940000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 00:41:19.967101 env[1737]: time="2025-11-01T00:41:19.960651719Z" level=info msg="StopPodSandbox for \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\"" Nov 1 00:41:19.967101 env[1737]: time="2025-11-01T00:41:19.964332954Z" level=info msg="StopPodSandbox for \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\"" Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit: BPF prog-id=179 op=LOAD Nov 1 00:41:19.967000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd84d4a040 a2=98 a3=0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:19.967000 audit: BPF prog-id=179 op=UNLOAD Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.967000 audit: BPF prog-id=180 op=LOAD Nov 1 00:41:19.967000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd84d49e30 a2=94 a3=54428f items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:19.968000 audit: BPF prog-id=180 op=UNLOAD Nov 1 00:41:19.968000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.968000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.968000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.968000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.968000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.968000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.968000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.968000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.968000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:19.968000 audit: BPF prog-id=181 op=LOAD Nov 1 00:41:19.968000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd84d49e60 a2=94 a3=2 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:19.968000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:19.968000 audit: BPF prog-id=181 op=UNLOAD Nov 1 00:41:20.157780 systemd-networkd[1461]: cali77edb459b4b: Gained IPv6LL Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.069 [INFO][4508] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.069 [INFO][4508] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" iface="eth0" netns="/var/run/netns/cni-cfc455bd-58c7-8367-6ae8-f3ea89e8a42c" Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.070 [INFO][4508] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" iface="eth0" netns="/var/run/netns/cni-cfc455bd-58c7-8367-6ae8-f3ea89e8a42c" Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.070 [INFO][4508] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" iface="eth0" netns="/var/run/netns/cni-cfc455bd-58c7-8367-6ae8-f3ea89e8a42c" Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.070 [INFO][4508] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.070 [INFO][4508] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.176 [INFO][4526] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" HandleID="k8s-pod-network.891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.188 [INFO][4526] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.189 [INFO][4526] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.198 [WARNING][4526] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" HandleID="k8s-pod-network.891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.198 [INFO][4526] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" HandleID="k8s-pod-network.891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.201 [INFO][4526] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:20.209091 env[1737]: 2025-11-01 00:41:20.205 [INFO][4508] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:20.217669 systemd[1]: run-netns-cni\x2dcfc455bd\x2d58c7\x2d8367\x2d6ae8\x2df3ea89e8a42c.mount: Deactivated successfully. Nov 1 00:41:20.221131 env[1737]: time="2025-11-01T00:41:20.221078743Z" level=info msg="TearDown network for sandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\" successfully" Nov 1 00:41:20.221290 env[1737]: time="2025-11-01T00:41:20.221269540Z" level=info msg="StopPodSandbox for \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\" returns successfully" Nov 1 00:41:20.222437 env[1737]: time="2025-11-01T00:41:20.222389527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49b764c9-pnm8b,Uid:a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7,Namespace:calico-apiserver,Attempt:1,}" Nov 1 00:41:20.285118 systemd-networkd[1461]: calid8d10140e55: Gained IPv6LL Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.115 [INFO][4518] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.115 [INFO][4518] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" iface="eth0" netns="/var/run/netns/cni-77c214a0-88b0-ea0a-e89f-df873f8d6c97" Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.117 [INFO][4518] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" iface="eth0" netns="/var/run/netns/cni-77c214a0-88b0-ea0a-e89f-df873f8d6c97" Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.117 [INFO][4518] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" iface="eth0" netns="/var/run/netns/cni-77c214a0-88b0-ea0a-e89f-df873f8d6c97" Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.117 [INFO][4518] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.117 [INFO][4518] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.229 [INFO][4533] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" HandleID="k8s-pod-network.232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Workload="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.229 [INFO][4533] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.230 [INFO][4533] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.242 [WARNING][4533] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" HandleID="k8s-pod-network.232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Workload="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.242 [INFO][4533] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" HandleID="k8s-pod-network.232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Workload="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.246 [INFO][4533] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:20.289011 env[1737]: 2025-11-01 00:41:20.281 [INFO][4518] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:20.296277 systemd[1]: run-netns-cni\x2d77c214a0\x2d88b0\x2dea0a\x2de89f\x2ddf873f8d6c97.mount: Deactivated successfully. Nov 1 00:41:20.299449 env[1737]: time="2025-11-01T00:41:20.298928785Z" level=info msg="TearDown network for sandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\" successfully" Nov 1 00:41:20.299449 env[1737]: time="2025-11-01T00:41:20.299023288Z" level=info msg="StopPodSandbox for \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\" returns successfully" Nov 1 00:41:20.303916 env[1737]: time="2025-11-01T00:41:20.303863071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-bb8db9787-cmqlg,Uid:ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3,Namespace:calico-apiserver,Attempt:1,}" Nov 1 00:41:20.313000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.316170 kernel: kauditd_printk_skb: 770 callbacks suppressed Nov 1 00:41:20.316731 kernel: audit: type=1400 audit(1761957680.313:1216): avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.324409 kernel: audit: type=1400 audit(1761957680.313:1216): avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.313000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.313000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.313000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.334702 kernel: audit: type=1400 audit(1761957680.313:1216): avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.334830 kernel: audit: type=1400 audit(1761957680.313:1216): avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.313000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.343015 kernel: audit: type=1400 audit(1761957680.313:1216): avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.313000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.355013 kernel: audit: type=1400 audit(1761957680.313:1216): avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.373001 kernel: audit: type=1400 audit(1761957680.313:1216): avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.373250 kernel: audit: type=1400 audit(1761957680.313:1216): avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.313000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.313000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.313000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381129 kernel: audit: type=1400 audit(1761957680.313:1216): avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381248 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Nov 1 00:41:20.313000 audit: BPF prog-id=182 op=LOAD Nov 1 00:41:20.313000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd84d49d20 a2=94 a3=1 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.313000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.329000 audit: BPF prog-id=182 op=UNLOAD Nov 1 00:41:20.329000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.329000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd84d49df0 a2=50 a3=7ffd84d49ed0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.329000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd84d49d30 a2=28 a3=0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd84d49d60 a2=28 a3=0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd84d49c70 a2=28 a3=0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd84d49d80 a2=28 a3=0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd84d49d60 a2=28 a3=0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd84d49d50 a2=28 a3=0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd84d49d80 a2=28 a3=0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd84d49d60 a2=28 a3=0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd84d49d80 a2=28 a3=0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd84d49d50 a2=28 a3=0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd84d49dc0 a2=28 a3=0 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd84d49b70 a2=50 a3=1 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.375000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd84d49b70 a2=94 a3=5 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.381000 audit: BPF prog-id=183 op=UNLOAD Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd84d49c20 a2=50 a3=1 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.381000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd84d49d40 a2=4 a3=38 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.381000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.381000 audit[4499]: AVC avc: denied { confidentiality } for pid=4499 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:41:20.381000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd84d49d90 a2=94 a3=6 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.381000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { confidentiality } for pid=4499 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:41:20.382000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd84d49540 a2=94 a3=88 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.382000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { perfmon } for pid=4499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.382000 audit[4499]: AVC avc: denied { confidentiality } for pid=4499 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 00:41:20.382000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd84d49540 a2=94 a3=88 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.382000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.383000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.383000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd84d4af70 a2=10 a3=f8f00800 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.383000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.383000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.383000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd84d4ae10 a2=10 a3=3 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.383000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.383000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.383000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd84d4adb0 a2=10 a3=3 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.383000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.384000 audit[4499]: AVC avc: denied { bpf } for pid=4499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.384000 audit[4499]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd84d4adb0 a2=10 a3=7 items=0 ppid=4129 pid=4499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.384000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 00:41:20.397000 audit: BPF prog-id=178 op=UNLOAD Nov 1 00:41:20.397000 audit[4492]: SYSCALL arch=c000003e syscall=47 success=yes exit=188 a0=12 a1=7ffdc18113d0 a2=0 a3=22 items=0 ppid=1453 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.397000 audit: SOCKADDR saddr=10000000CFB2EDB100000000 Nov 1 00:41:20.397000 audit: PROCTITLE proctitle="(udev-worker)" Nov 1 00:41:20.409000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:41:20.409000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c003d4a740 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:41:20.409000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:41:20.409000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:41:20.409000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c004cdd4a0 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:41:20.409000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:41:20.422000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:41:20.422000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c004cdd530 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:41:20.422000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:41:20.423000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524014 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:41:20.423000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c009f09620 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:41:20.423000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:41:20.433239 kubelet[2730]: E1101 00:41:20.433148 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:41:20.434542 kubelet[2730]: E1101 00:41:20.434442 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-5c9fc5d7bc-cj29r" podUID="ad238e2b-fbc2-4a12-80b4-cedf42c6dda0" Nov 1 00:41:20.437000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:41:20.437000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c003d4aee0 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:41:20.437000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:41:20.437000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:41:20.437000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c009f09da0 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:41:20.437000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:41:20.476128 systemd-networkd[1461]: cali59445e29506: Gained IPv6LL Nov 1 00:41:20.579000 audit[4315]: AVC avc: denied { getattr } for pid=4315 comm="coredns" path="cgroup:[4026532753]" dev="nsfs" ino=4026532753 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c740 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Nov 1 00:41:20.579000 audit[4315]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a810 a2=c00039f7c8 a3=0 items=0 ppid=4262 pid=4315 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c740 key=(null) Nov 1 00:41:20.579000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Nov 1 00:41:20.674284 (udev-worker)[4492]: Network interface NamePolicy= disabled on kernel command line. Nov 1 00:41:20.677101 systemd-networkd[1461]: calie44bb1af7d5: Link UP Nov 1 00:41:20.681319 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie44bb1af7d5: link becomes ready Nov 1 00:41:20.681709 systemd-networkd[1461]: calie44bb1af7d5: Gained carrier Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.465 [INFO][4541] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0 calico-apiserver-d49b764c9- calico-apiserver a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7 1045 0 2025-11-01 00:40:39 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:d49b764c9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-19-190 calico-apiserver-d49b764c9-pnm8b eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie44bb1af7d5 [] [] }} ContainerID="83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-pnm8b" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-" Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.466 [INFO][4541] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-pnm8b" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.580 [INFO][4571] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" HandleID="k8s-pod-network.83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.580 [INFO][4571] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" HandleID="k8s-pod-network.83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cdb30), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-19-190", "pod":"calico-apiserver-d49b764c9-pnm8b", "timestamp":"2025-11-01 00:41:20.580076196 +0000 UTC"}, Hostname:"ip-172-31-19-190", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.580 [INFO][4571] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.581 [INFO][4571] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.581 [INFO][4571] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-190' Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.603 [INFO][4571] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" host="ip-172-31-19-190" Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.623 [INFO][4571] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-19-190" Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.632 [INFO][4571] ipam/ipam.go 511: Trying affinity for 192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.635 [INFO][4571] ipam/ipam.go 158: Attempting to load block cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.640 [INFO][4571] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.640 [INFO][4571] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" host="ip-172-31-19-190" Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.642 [INFO][4571] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5 Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.651 [INFO][4571] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" host="ip-172-31-19-190" Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.661 [INFO][4571] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.41.133/26] block=192.168.41.128/26 handle="k8s-pod-network.83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" host="ip-172-31-19-190" Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.661 [INFO][4571] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.41.133/26] handle="k8s-pod-network.83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" host="ip-172-31-19-190" Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.661 [INFO][4571] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:20.733644 env[1737]: 2025-11-01 00:41:20.661 [INFO][4571] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.41.133/26] IPv6=[] ContainerID="83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" HandleID="k8s-pod-network.83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:20.734617 env[1737]: 2025-11-01 00:41:20.666 [INFO][4541] cni-plugin/k8s.go 418: Populated endpoint ContainerID="83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-pnm8b" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0", GenerateName:"calico-apiserver-d49b764c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7", ResourceVersion:"1045", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49b764c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"", Pod:"calico-apiserver-d49b764c9-pnm8b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie44bb1af7d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:20.734617 env[1737]: 2025-11-01 00:41:20.666 [INFO][4541] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.41.133/32] ContainerID="83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-pnm8b" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:20.734617 env[1737]: 2025-11-01 00:41:20.666 [INFO][4541] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie44bb1af7d5 ContainerID="83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-pnm8b" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:20.734617 env[1737]: 2025-11-01 00:41:20.683 [INFO][4541] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-pnm8b" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:20.734617 env[1737]: 2025-11-01 00:41:20.686 [INFO][4541] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-pnm8b" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0", GenerateName:"calico-apiserver-d49b764c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7", ResourceVersion:"1045", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49b764c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5", Pod:"calico-apiserver-d49b764c9-pnm8b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie44bb1af7d5", MAC:"36:65:b9:12:a3:25", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:20.734617 env[1737]: 2025-11-01 00:41:20.724 [INFO][4541] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5" Namespace="calico-apiserver" Pod="calico-apiserver-d49b764c9-pnm8b" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:20.759543 env[1737]: time="2025-11-01T00:41:20.759430029Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:41:20.759830 env[1737]: time="2025-11-01T00:41:20.759789206Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:41:20.759950 env[1737]: time="2025-11-01T00:41:20.759924997Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:41:20.760298 env[1737]: time="2025-11-01T00:41:20.760262286Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5 pid=4621 runtime=io.containerd.runc.v2 Nov 1 00:41:20.782000 audit[4614]: NETFILTER_CFG table=mangle:113 family=2 entries=16 op=nft_register_chain pid=4614 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:41:20.782000 audit[4614]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe4380b820 a2=0 a3=7ffe4380b80c items=0 ppid=4129 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.782000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:41:20.798562 systemd-networkd[1461]: calic77b6520130: Link UP Nov 1 00:41:20.804586 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic77b6520130: link becomes ready Nov 1 00:41:20.804335 systemd-networkd[1461]: calic77b6520130: Gained carrier Nov 1 00:41:20.837698 systemd[1]: Started cri-containerd-83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5.scope. Nov 1 00:41:20.860000 audit[4612]: NETFILTER_CFG table=raw:114 family=2 entries=21 op=nft_register_chain pid=4612 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:41:20.860000 audit[4612]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdb19a3d40 a2=0 a3=7ffdb19a3d2c items=0 ppid=4129 pid=4612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.860000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.511 [INFO][4553] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0 calico-apiserver-bb8db9787- calico-apiserver ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3 1046 0 2025-11-01 00:40:41 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:bb8db9787 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-19-190 calico-apiserver-bb8db9787-cmqlg eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic77b6520130 [] [] }} ContainerID="bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" Namespace="calico-apiserver" Pod="calico-apiserver-bb8db9787-cmqlg" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-" Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.511 [INFO][4553] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" Namespace="calico-apiserver" Pod="calico-apiserver-bb8db9787-cmqlg" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.613 [INFO][4582] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" HandleID="k8s-pod-network.bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" Workload="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.613 [INFO][4582] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" HandleID="k8s-pod-network.bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" Workload="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd7f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-19-190", "pod":"calico-apiserver-bb8db9787-cmqlg", "timestamp":"2025-11-01 00:41:20.613454823 +0000 UTC"}, Hostname:"ip-172-31-19-190", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.613 [INFO][4582] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.661 [INFO][4582] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.662 [INFO][4582] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-190' Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.706 [INFO][4582] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" host="ip-172-31-19-190" Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.723 [INFO][4582] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-19-190" Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.736 [INFO][4582] ipam/ipam.go 511: Trying affinity for 192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.740 [INFO][4582] ipam/ipam.go 158: Attempting to load block cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.743 [INFO][4582] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.743 [INFO][4582] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" host="ip-172-31-19-190" Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.748 [INFO][4582] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246 Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.755 [INFO][4582] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" host="ip-172-31-19-190" Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.778 [INFO][4582] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.41.134/26] block=192.168.41.128/26 handle="k8s-pod-network.bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" host="ip-172-31-19-190" Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.778 [INFO][4582] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.41.134/26] handle="k8s-pod-network.bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" host="ip-172-31-19-190" Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.778 [INFO][4582] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:20.877569 env[1737]: 2025-11-01 00:41:20.778 [INFO][4582] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.41.134/26] IPv6=[] ContainerID="bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" HandleID="k8s-pod-network.bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" Workload="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:20.878777 env[1737]: 2025-11-01 00:41:20.789 [INFO][4553] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" Namespace="calico-apiserver" Pod="calico-apiserver-bb8db9787-cmqlg" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0", GenerateName:"calico-apiserver-bb8db9787-", Namespace:"calico-apiserver", SelfLink:"", UID:"ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"bb8db9787", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"", Pod:"calico-apiserver-bb8db9787-cmqlg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic77b6520130", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:20.878777 env[1737]: 2025-11-01 00:41:20.789 [INFO][4553] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.41.134/32] ContainerID="bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" Namespace="calico-apiserver" Pod="calico-apiserver-bb8db9787-cmqlg" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:20.878777 env[1737]: 2025-11-01 00:41:20.789 [INFO][4553] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic77b6520130 ContainerID="bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" Namespace="calico-apiserver" Pod="calico-apiserver-bb8db9787-cmqlg" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:20.878777 env[1737]: 2025-11-01 00:41:20.829 [INFO][4553] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" Namespace="calico-apiserver" Pod="calico-apiserver-bb8db9787-cmqlg" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:20.878777 env[1737]: 2025-11-01 00:41:20.851 [INFO][4553] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" Namespace="calico-apiserver" Pod="calico-apiserver-bb8db9787-cmqlg" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0", GenerateName:"calico-apiserver-bb8db9787-", Namespace:"calico-apiserver", SelfLink:"", UID:"ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3", ResourceVersion:"1046", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"bb8db9787", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246", Pod:"calico-apiserver-bb8db9787-cmqlg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic77b6520130", MAC:"1e:39:f5:aa:df:7a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:20.878777 env[1737]: 2025-11-01 00:41:20.872 [INFO][4553] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246" Namespace="calico-apiserver" Pod="calico-apiserver-bb8db9787-cmqlg" WorkloadEndpoint="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:20.906182 env[1737]: time="2025-11-01T00:41:20.906068039Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:41:20.906476 env[1737]: time="2025-11-01T00:41:20.906442755Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:41:20.906641 env[1737]: time="2025-11-01T00:41:20.906615078Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:41:20.907193 env[1737]: time="2025-11-01T00:41:20.907118580Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246 pid=4663 runtime=io.containerd.runc.v2 Nov 1 00:41:20.936214 systemd[1]: Started cri-containerd-bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246.scope. Nov 1 00:41:20.950766 env[1737]: time="2025-11-01T00:41:20.950716794Z" level=info msg="StopPodSandbox for \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\"" Nov 1 00:41:20.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.985000 audit: BPF prog-id=184 op=LOAD Nov 1 00:41:20.986000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.986000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4621 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623064303463373233663535323932656162373164326464363632 Nov 1 00:41:20.986000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.986000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4621 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623064303463373233663535323932656162373164326464363632 Nov 1 00:41:20.987000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.987000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.987000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.987000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.987000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.987000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.987000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.987000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.987000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.987000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.987000 audit: BPF prog-id=185 op=LOAD Nov 1 00:41:20.987000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a8710 items=0 ppid=4621 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623064303463373233663535323932656162373164326464363632 Nov 1 00:41:20.988000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.988000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.988000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.988000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.988000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.988000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.988000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.988000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.988000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.988000 audit: BPF prog-id=186 op=LOAD Nov 1 00:41:20.988000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a8758 items=0 ppid=4621 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623064303463373233663535323932656162373164326464363632 Nov 1 00:41:20.989000 audit: BPF prog-id=186 op=UNLOAD Nov 1 00:41:20.989000 audit: BPF prog-id=185 op=UNLOAD Nov 1 00:41:20.989000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.989000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.989000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.989000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.989000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.989000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.989000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.989000 audit[4631]: AVC avc: denied { perfmon } for pid=4631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.989000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.989000 audit[4631]: AVC avc: denied { bpf } for pid=4631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:20.989000 audit: BPF prog-id=187 op=LOAD Nov 1 00:41:20.989000 audit[4631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a8b68 items=0 ppid=4621 pid=4631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:20.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833623064303463373233663535323932656162373164326464363632 Nov 1 00:41:21.054112 systemd-networkd[1461]: vxlan.calico: Gained IPv6LL Nov 1 00:41:21.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.098000 audit: BPF prog-id=188 op=LOAD Nov 1 00:41:21.098000 audit[4674]: NETFILTER_CFG table=nat:115 family=2 entries=15 op=nft_register_chain pid=4674 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:41:21.100000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.100000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4663 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333064336539626533636566386561383863376566623038616339 Nov 1 00:41:21.100000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.100000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4663 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333064336539626533636566386561383863376566623038616339 Nov 1 00:41:21.101000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.101000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.101000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.101000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.101000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.101000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.101000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.101000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.101000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.101000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.101000 audit: BPF prog-id=189 op=LOAD Nov 1 00:41:21.101000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000402210 items=0 ppid=4663 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333064336539626533636566386561383863376566623038616339 Nov 1 00:41:21.102000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.102000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.102000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.102000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.102000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.102000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.102000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.102000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.102000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.102000 audit: BPF prog-id=190 op=LOAD Nov 1 00:41:21.102000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000402258 items=0 ppid=4663 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333064336539626533636566386561383863376566623038616339 Nov 1 00:41:21.104000 audit: BPF prog-id=190 op=UNLOAD Nov 1 00:41:21.104000 audit: BPF prog-id=189 op=UNLOAD Nov 1 00:41:21.104000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.104000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.104000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.104000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.104000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.104000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.104000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.104000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.104000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.104000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.104000 audit: BPF prog-id=191 op=LOAD Nov 1 00:41:21.104000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000402668 items=0 ppid=4663 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263333064336539626533636566386561383863376566623038616339 Nov 1 00:41:21.217268 env[1737]: time="2025-11-01T00:41:21.212389972Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d49b764c9-pnm8b,Uid:a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5\"" Nov 1 00:41:21.220553 env[1737]: time="2025-11-01T00:41:21.220507274Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 00:41:21.098000 audit[4674]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffebafb5b10 a2=0 a3=7ffebafb5afc items=0 ppid=4129 pid=4674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.098000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:41:21.309191 env[1737]: time="2025-11-01T00:41:21.309111460Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-bb8db9787-cmqlg,Uid:ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246\"" Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.147 [INFO][4694] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.148 [INFO][4694] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" iface="eth0" netns="/var/run/netns/cni-68ebab01-b453-10bc-d17e-cefe916aad79" Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.148 [INFO][4694] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" iface="eth0" netns="/var/run/netns/cni-68ebab01-b453-10bc-d17e-cefe916aad79" Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.148 [INFO][4694] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" iface="eth0" netns="/var/run/netns/cni-68ebab01-b453-10bc-d17e-cefe916aad79" Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.148 [INFO][4694] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.148 [INFO][4694] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.269 [INFO][4712] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" HandleID="k8s-pod-network.c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Workload="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.274 [INFO][4712] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.274 [INFO][4712] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.305 [WARNING][4712] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" HandleID="k8s-pod-network.c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Workload="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.305 [INFO][4712] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" HandleID="k8s-pod-network.c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Workload="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.328 [INFO][4712] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:21.335621 env[1737]: 2025-11-01 00:41:21.331 [INFO][4694] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:21.343073 env[1737]: time="2025-11-01T00:41:21.341141142Z" level=info msg="TearDown network for sandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\" successfully" Nov 1 00:41:21.343073 env[1737]: time="2025-11-01T00:41:21.341208450Z" level=info msg="StopPodSandbox for \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\" returns successfully" Nov 1 00:41:21.343535 systemd[1]: run-netns-cni\x2d68ebab01\x2db453\x2d10bc\x2dd17e\x2dcefe916aad79.mount: Deactivated successfully. Nov 1 00:41:21.346541 env[1737]: time="2025-11-01T00:41:21.346492886Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-4d2cg,Uid:21d23048-45cc-482a-a891-7ca305e12df5,Namespace:calico-system,Attempt:1,}" Nov 1 00:41:21.319000 audit[4683]: NETFILTER_CFG table=filter:116 family=2 entries=198 op=nft_register_chain pid=4683 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:41:21.319000 audit[4683]: SYSCALL arch=c000003e syscall=46 success=yes exit=114752 a0=3 a1=7ffeb8c8ca00 a2=0 a3=7ffeb8c8c9ec items=0 ppid=4129 pid=4683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.319000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:41:21.443875 kubelet[2730]: E1101 00:41:21.443818 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:41:21.482681 env[1737]: time="2025-11-01T00:41:21.482543820Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:21.485190 env[1737]: time="2025-11-01T00:41:21.485113054Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 00:41:21.485719 kubelet[2730]: E1101 00:41:21.485663 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:21.485862 kubelet[2730]: E1101 00:41:21.485729 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:21.486107 kubelet[2730]: E1101 00:41:21.486050 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-gsczx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d49b764c9-pnm8b_calico-apiserver(a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:21.486721 env[1737]: time="2025-11-01T00:41:21.486677824Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 00:41:21.487673 kubelet[2730]: E1101 00:41:21.487635 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" podUID="a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7" Nov 1 00:41:21.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.19.190:22-147.75.109.163:56822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:21.536550 systemd[1]: Started sshd@7-172.31.19.190:22-147.75.109.163:56822.service. Nov 1 00:41:21.548000 audit[4757]: NETFILTER_CFG table=filter:117 family=2 entries=78 op=nft_register_chain pid=4757 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:41:21.548000 audit[4757]: SYSCALL arch=c000003e syscall=46 success=yes exit=44440 a0=3 a1=7ffc65885300 a2=0 a3=7ffc658852ec items=0 ppid=4129 pid=4757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.548000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:41:21.714144 systemd-networkd[1461]: calic7bf51b43f3: Link UP Nov 1 00:41:21.717348 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:41:21.717501 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic7bf51b43f3: link becomes ready Nov 1 00:41:21.717697 systemd-networkd[1461]: calic7bf51b43f3: Gained carrier Nov 1 00:41:21.723567 env[1737]: time="2025-11-01T00:41:21.723483645Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:21.743126 env[1737]: time="2025-11-01T00:41:21.727414830Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 00:41:21.743278 kubelet[2730]: E1101 00:41:21.727898 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:21.743278 kubelet[2730]: E1101 00:41:21.728052 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:21.743278 kubelet[2730]: E1101 00:41:21.728773 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rtlwv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-bb8db9787-cmqlg_calico-apiserver(ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:21.743278 kubelet[2730]: E1101 00:41:21.730017 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" podUID="ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.510 [INFO][4738] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0 goldmane-666569f655- calico-system 21d23048-45cc-482a-a891-7ca305e12df5 1075 0 2025-11-01 00:40:43 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:666569f655 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s ip-172-31-19-190 goldmane-666569f655-4d2cg eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calic7bf51b43f3 [] [] }} ContainerID="2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" Namespace="calico-system" Pod="goldmane-666569f655-4d2cg" WorkloadEndpoint="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.510 [INFO][4738] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" Namespace="calico-system" Pod="goldmane-666569f655-4d2cg" WorkloadEndpoint="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.603 [INFO][4755] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" HandleID="k8s-pod-network.2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" Workload="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.603 [INFO][4755] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" HandleID="k8s-pod-network.2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" Workload="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4fe0), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-19-190", "pod":"goldmane-666569f655-4d2cg", "timestamp":"2025-11-01 00:41:21.603475229 +0000 UTC"}, Hostname:"ip-172-31-19-190", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.603 [INFO][4755] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.604 [INFO][4755] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.604 [INFO][4755] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-190' Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.620 [INFO][4755] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" host="ip-172-31-19-190" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.628 [INFO][4755] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-19-190" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.640 [INFO][4755] ipam/ipam.go 511: Trying affinity for 192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.645 [INFO][4755] ipam/ipam.go 158: Attempting to load block cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.657 [INFO][4755] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.657 [INFO][4755] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" host="ip-172-31-19-190" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.666 [INFO][4755] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2 Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.676 [INFO][4755] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" host="ip-172-31-19-190" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.696 [INFO][4755] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.41.135/26] block=192.168.41.128/26 handle="k8s-pod-network.2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" host="ip-172-31-19-190" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.696 [INFO][4755] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.41.135/26] handle="k8s-pod-network.2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" host="ip-172-31-19-190" Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.696 [INFO][4755] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:21.763941 env[1737]: 2025-11-01 00:41:21.696 [INFO][4755] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.41.135/26] IPv6=[] ContainerID="2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" HandleID="k8s-pod-network.2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" Workload="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:21.765110 env[1737]: 2025-11-01 00:41:21.705 [INFO][4738] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" Namespace="calico-system" Pod="goldmane-666569f655-4d2cg" WorkloadEndpoint="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"21d23048-45cc-482a-a891-7ca305e12df5", ResourceVersion:"1075", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"", Pod:"goldmane-666569f655-4d2cg", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.41.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calic7bf51b43f3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:21.765110 env[1737]: 2025-11-01 00:41:21.705 [INFO][4738] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.41.135/32] ContainerID="2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" Namespace="calico-system" Pod="goldmane-666569f655-4d2cg" WorkloadEndpoint="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:21.765110 env[1737]: 2025-11-01 00:41:21.705 [INFO][4738] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic7bf51b43f3 ContainerID="2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" Namespace="calico-system" Pod="goldmane-666569f655-4d2cg" WorkloadEndpoint="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:21.765110 env[1737]: 2025-11-01 00:41:21.719 [INFO][4738] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" Namespace="calico-system" Pod="goldmane-666569f655-4d2cg" WorkloadEndpoint="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:21.765110 env[1737]: 2025-11-01 00:41:21.723 [INFO][4738] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" Namespace="calico-system" Pod="goldmane-666569f655-4d2cg" WorkloadEndpoint="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"21d23048-45cc-482a-a891-7ca305e12df5", ResourceVersion:"1075", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2", Pod:"goldmane-666569f655-4d2cg", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.41.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calic7bf51b43f3", MAC:"2e:7d:81:04:64:da", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:21.765110 env[1737]: 2025-11-01 00:41:21.758 [INFO][4738] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2" Namespace="calico-system" Pod="goldmane-666569f655-4d2cg" WorkloadEndpoint="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:21.789000 audit[4774]: NETFILTER_CFG table=filter:118 family=2 entries=70 op=nft_register_chain pid=4774 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:41:21.789000 audit[4774]: SYSCALL arch=c000003e syscall=46 success=yes exit=33972 a0=3 a1=7fff004f0500 a2=0 a3=7fff004f04ec items=0 ppid=4129 pid=4774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.789000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:41:21.798329 env[1737]: time="2025-11-01T00:41:21.798167640Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:41:21.798513 env[1737]: time="2025-11-01T00:41:21.798356158Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:41:21.798513 env[1737]: time="2025-11-01T00:41:21.798422164Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:41:21.798713 env[1737]: time="2025-11-01T00:41:21.798667619Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2 pid=4782 runtime=io.containerd.runc.v2 Nov 1 00:41:21.815000 audit[4756]: USER_ACCT pid=4756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:21.817941 sshd[4756]: Accepted publickey for core from 147.75.109.163 port 56822 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:41:21.818000 audit[4756]: CRED_ACQ pid=4756 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:21.818000 audit[4756]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfcf88a10 a2=3 a3=0 items=0 ppid=1 pid=4756 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.818000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:21.822429 sshd[4756]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:41:21.832996 systemd[1]: Started cri-containerd-2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2.scope. Nov 1 00:41:21.846267 systemd-logind[1728]: New session 8 of user core. Nov 1 00:41:21.847894 systemd[1]: Started session-8.scope. Nov 1 00:41:21.857000 audit[4756]: USER_START pid=4756 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:21.859000 audit[4800]: CRED_ACQ pid=4800 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:21.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.888000 audit: BPF prog-id=192 op=LOAD Nov 1 00:41:21.888000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.888000 audit[4791]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=4782 pid=4791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231393963653430336566653631353131613562646138653663336236 Nov 1 00:41:21.888000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.888000 audit[4791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=4782 pid=4791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231393963653430336566653631353131613562646138653663336236 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit: BPF prog-id=193 op=LOAD Nov 1 00:41:21.889000 audit[4791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c00031cc10 items=0 ppid=4782 pid=4791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231393963653430336566653631353131613562646138653663336236 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit: BPF prog-id=194 op=LOAD Nov 1 00:41:21.889000 audit[4791]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c00031cc58 items=0 ppid=4782 pid=4791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231393963653430336566653631353131613562646138653663336236 Nov 1 00:41:21.889000 audit: BPF prog-id=194 op=UNLOAD Nov 1 00:41:21.889000 audit: BPF prog-id=193 op=UNLOAD Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { perfmon } for pid=4791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit[4791]: AVC avc: denied { bpf } for pid=4791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:21.889000 audit: BPF prog-id=195 op=LOAD Nov 1 00:41:21.889000 audit[4791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c00031d068 items=0 ppid=4782 pid=4791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:21.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231393963653430336566653631353131613562646138653663336236 Nov 1 00:41:21.932554 env[1737]: time="2025-11-01T00:41:21.932503916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-4d2cg,Uid:21d23048-45cc-482a-a891-7ca305e12df5,Namespace:calico-system,Attempt:1,} returns sandbox id \"2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2\"" Nov 1 00:41:21.938330 env[1737]: time="2025-11-01T00:41:21.938286832Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Nov 1 00:41:21.955140 env[1737]: time="2025-11-01T00:41:21.955076547Z" level=info msg="StopPodSandbox for \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\"" Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.065 [INFO][4826] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.067 [INFO][4826] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" iface="eth0" netns="/var/run/netns/cni-199601c4-b9a5-ca21-2b53-7f16b59d987e" Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.067 [INFO][4826] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" iface="eth0" netns="/var/run/netns/cni-199601c4-b9a5-ca21-2b53-7f16b59d987e" Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.072 [INFO][4826] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" iface="eth0" netns="/var/run/netns/cni-199601c4-b9a5-ca21-2b53-7f16b59d987e" Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.073 [INFO][4826] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.074 [INFO][4826] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.118 [INFO][4836] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" HandleID="k8s-pod-network.195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.118 [INFO][4836] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.119 [INFO][4836] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.128 [WARNING][4836] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" HandleID="k8s-pod-network.195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.128 [INFO][4836] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" HandleID="k8s-pod-network.195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.130 [INFO][4836] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:22.138738 env[1737]: 2025-11-01 00:41:22.134 [INFO][4826] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:22.140661 env[1737]: time="2025-11-01T00:41:22.139247027Z" level=info msg="TearDown network for sandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\" successfully" Nov 1 00:41:22.140661 env[1737]: time="2025-11-01T00:41:22.139295687Z" level=info msg="StopPodSandbox for \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\" returns successfully" Nov 1 00:41:22.141123 env[1737]: time="2025-11-01T00:41:22.141082424Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-4jl9s,Uid:1214d512-7719-4ed4-8eb7-a357f4f0e4bc,Namespace:kube-system,Attempt:1,}" Nov 1 00:41:22.227443 env[1737]: time="2025-11-01T00:41:22.216825740Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:22.230796 env[1737]: time="2025-11-01T00:41:22.230703826Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Nov 1 00:41:22.241478 kubelet[2730]: E1101 00:41:22.231157 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 00:41:22.241478 kubelet[2730]: E1101 00:41:22.231222 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 00:41:22.241478 kubelet[2730]: E1101 00:41:22.240794 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-bm8z9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-4d2cg_calico-system(21d23048-45cc-482a-a891-7ca305e12df5): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:22.242290 kubelet[2730]: E1101 00:41:22.242052 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:41:22.264349 systemd[1]: run-netns-cni\x2d199601c4\x2db9a5\x2dca21\x2d2b53\x2d7f16b59d987e.mount: Deactivated successfully. Nov 1 00:41:22.278304 systemd-networkd[1461]: calie44bb1af7d5: Gained IPv6LL Nov 1 00:41:22.458836 kubelet[2730]: E1101 00:41:22.458324 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" podUID="ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3" Nov 1 00:41:22.458836 kubelet[2730]: E1101 00:41:22.458459 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" podUID="a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7" Nov 1 00:41:22.460017 kubelet[2730]: E1101 00:41:22.459930 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:41:22.542000 audit[4864]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=4864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:22.542000 audit[4864]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffc10d77a0 a2=0 a3=7fffc10d778c items=0 ppid=2837 pid=4864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:22.542000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:22.549000 audit[4864]: NETFILTER_CFG table=nat:120 family=2 entries=14 op=nft_register_rule pid=4864 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:22.549000 audit[4864]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffc10d77a0 a2=0 a3=0 items=0 ppid=2837 pid=4864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:22.549000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:22.583000 audit[4866]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=4866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:22.583000 audit[4866]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc8aa4f200 a2=0 a3=7ffc8aa4f1ec items=0 ppid=2837 pid=4866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:22.583000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:22.616502 systemd-networkd[1461]: cali4cd743c72ea: Link UP Nov 1 00:41:22.622042 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4cd743c72ea: link becomes ready Nov 1 00:41:22.619529 systemd-networkd[1461]: cali4cd743c72ea: Gained carrier Nov 1 00:41:22.634000 audit[4866]: NETFILTER_CFG table=nat:122 family=2 entries=14 op=nft_register_rule pid=4866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:22.634000 audit[4866]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc8aa4f200 a2=0 a3=0 items=0 ppid=2837 pid=4866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:22.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.336 [INFO][4845] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0 coredns-674b8bbfcf- kube-system 1214d512-7719-4ed4-8eb7-a357f4f0e4bc 1111 0 2025-11-01 00:40:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-19-190 coredns-674b8bbfcf-4jl9s eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4cd743c72ea [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" Namespace="kube-system" Pod="coredns-674b8bbfcf-4jl9s" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-" Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.337 [INFO][4845] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" Namespace="kube-system" Pod="coredns-674b8bbfcf-4jl9s" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.420 [INFO][4857] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" HandleID="k8s-pod-network.09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.421 [INFO][4857] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" HandleID="k8s-pod-network.09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000251590), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-19-190", "pod":"coredns-674b8bbfcf-4jl9s", "timestamp":"2025-11-01 00:41:22.420764764 +0000 UTC"}, Hostname:"ip-172-31-19-190", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.421 [INFO][4857] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.421 [INFO][4857] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.421 [INFO][4857] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-190' Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.436 [INFO][4857] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" host="ip-172-31-19-190" Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.445 [INFO][4857] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-19-190" Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.462 [INFO][4857] ipam/ipam.go 511: Trying affinity for 192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.494 [INFO][4857] ipam/ipam.go 158: Attempting to load block cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.516 [INFO][4857] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.516 [INFO][4857] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" host="ip-172-31-19-190" Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.523 [INFO][4857] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.538 [INFO][4857] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" host="ip-172-31-19-190" Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.602 [INFO][4857] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.41.136/26] block=192.168.41.128/26 handle="k8s-pod-network.09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" host="ip-172-31-19-190" Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.602 [INFO][4857] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.41.136/26] handle="k8s-pod-network.09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" host="ip-172-31-19-190" Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.602 [INFO][4857] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:22.652580 env[1737]: 2025-11-01 00:41:22.602 [INFO][4857] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.41.136/26] IPv6=[] ContainerID="09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" HandleID="k8s-pod-network.09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:22.654213 env[1737]: 2025-11-01 00:41:22.607 [INFO][4845] cni-plugin/k8s.go 418: Populated endpoint ContainerID="09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" Namespace="kube-system" Pod="coredns-674b8bbfcf-4jl9s" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"1214d512-7719-4ed4-8eb7-a357f4f0e4bc", ResourceVersion:"1111", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"", Pod:"coredns-674b8bbfcf-4jl9s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4cd743c72ea", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:22.654213 env[1737]: 2025-11-01 00:41:22.607 [INFO][4845] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.41.136/32] ContainerID="09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" Namespace="kube-system" Pod="coredns-674b8bbfcf-4jl9s" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:22.654213 env[1737]: 2025-11-01 00:41:22.607 [INFO][4845] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4cd743c72ea ContainerID="09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" Namespace="kube-system" Pod="coredns-674b8bbfcf-4jl9s" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:22.654213 env[1737]: 2025-11-01 00:41:22.622 [INFO][4845] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" Namespace="kube-system" Pod="coredns-674b8bbfcf-4jl9s" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:22.654213 env[1737]: 2025-11-01 00:41:22.623 [INFO][4845] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" Namespace="kube-system" Pod="coredns-674b8bbfcf-4jl9s" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"1214d512-7719-4ed4-8eb7-a357f4f0e4bc", ResourceVersion:"1111", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b", Pod:"coredns-674b8bbfcf-4jl9s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4cd743c72ea", MAC:"92:b5:dd:03:7a:58", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:22.654213 env[1737]: 2025-11-01 00:41:22.641 [INFO][4845] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b" Namespace="kube-system" Pod="coredns-674b8bbfcf-4jl9s" WorkloadEndpoint="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:22.682000 audit[4878]: NETFILTER_CFG table=filter:123 family=2 entries=52 op=nft_register_chain pid=4878 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:41:22.682000 audit[4878]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffcad0feec0 a2=0 a3=7ffcad0feeac items=0 ppid=4129 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:22.682000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:41:22.693024 env[1737]: time="2025-11-01T00:41:22.692158619Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:41:22.693203 env[1737]: time="2025-11-01T00:41:22.693044677Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:41:22.693203 env[1737]: time="2025-11-01T00:41:22.693082421Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:41:22.694507 env[1737]: time="2025-11-01T00:41:22.693331658Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b pid=4884 runtime=io.containerd.runc.v2 Nov 1 00:41:22.716267 systemd-networkd[1461]: calic77b6520130: Gained IPv6LL Nov 1 00:41:22.734135 systemd[1]: Started cri-containerd-09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b.scope. Nov 1 00:41:22.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.780000 audit: BPF prog-id=196 op=LOAD Nov 1 00:41:22.782000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.782000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=4884 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:22.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039623065386132306539313261636234613738616561366537383863 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=4884 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:22.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039623065386132306539313261636234613738616561366537383863 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit: BPF prog-id=197 op=LOAD Nov 1 00:41:22.783000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0001e3a40 items=0 ppid=4884 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:22.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039623065386132306539313261636234613738616561366537383863 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.783000 audit: BPF prog-id=198 op=LOAD Nov 1 00:41:22.783000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0001e3a88 items=0 ppid=4884 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:22.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039623065386132306539313261636234613738616561366537383863 Nov 1 00:41:22.785000 audit: BPF prog-id=198 op=UNLOAD Nov 1 00:41:22.785000 audit: BPF prog-id=197 op=UNLOAD Nov 1 00:41:22.785000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.785000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.785000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.785000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.785000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.785000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.785000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.785000 audit[4894]: AVC avc: denied { perfmon } for pid=4894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.785000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.785000 audit[4894]: AVC avc: denied { bpf } for pid=4894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:22.785000 audit: BPF prog-id=199 op=LOAD Nov 1 00:41:22.785000 audit[4894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0001e3e98 items=0 ppid=4884 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:22.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039623065386132306539313261636234613738616561366537383863 Nov 1 00:41:22.844757 env[1737]: time="2025-11-01T00:41:22.844705859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-4jl9s,Uid:1214d512-7719-4ed4-8eb7-a357f4f0e4bc,Namespace:kube-system,Attempt:1,} returns sandbox id \"09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b\"" Nov 1 00:41:22.859823 env[1737]: time="2025-11-01T00:41:22.859769996Z" level=info msg="CreateContainer within sandbox \"09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Nov 1 00:41:22.904150 env[1737]: time="2025-11-01T00:41:22.904085768Z" level=info msg="CreateContainer within sandbox \"09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ee983d8ee7b4ebae7ce6f6287c8e94f69efbda1452d702f173777a2e72f2934e\"" Nov 1 00:41:22.905417 env[1737]: time="2025-11-01T00:41:22.905376295Z" level=info msg="StartContainer for \"ee983d8ee7b4ebae7ce6f6287c8e94f69efbda1452d702f173777a2e72f2934e\"" Nov 1 00:41:22.961339 env[1737]: time="2025-11-01T00:41:22.961288983Z" level=info msg="StopPodSandbox for \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\"" Nov 1 00:41:22.971515 systemd[1]: Started cri-containerd-ee983d8ee7b4ebae7ce6f6287c8e94f69efbda1452d702f173777a2e72f2934e.scope. Nov 1 00:41:23.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.081000 audit: BPF prog-id=200 op=LOAD Nov 1 00:41:23.085000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.085000 audit[4925]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4884 pid=4925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565393833643865653762346562616537636536663632383763386539 Nov 1 00:41:23.085000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.085000 audit[4925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4884 pid=4925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565393833643865653762346562616537636536663632383763386539 Nov 1 00:41:23.085000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.085000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.085000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.085000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.085000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.085000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.085000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.085000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.085000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.085000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.085000 audit: BPF prog-id=201 op=LOAD Nov 1 00:41:23.085000 audit[4925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00019d4f0 items=0 ppid=4884 pid=4925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565393833643865653762346562616537636536663632383763386539 Nov 1 00:41:23.087000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.087000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.087000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.087000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.087000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.087000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.087000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.087000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.087000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.087000 audit: BPF prog-id=202 op=LOAD Nov 1 00:41:23.087000 audit[4925]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00019d538 items=0 ppid=4884 pid=4925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565393833643865653762346562616537636536663632383763386539 Nov 1 00:41:23.088000 audit: BPF prog-id=202 op=UNLOAD Nov 1 00:41:23.089000 audit: BPF prog-id=201 op=UNLOAD Nov 1 00:41:23.089000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.089000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.089000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.089000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.089000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.089000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.089000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.089000 audit[4925]: AVC avc: denied { perfmon } for pid=4925 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.089000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.089000 audit[4925]: AVC avc: denied { bpf } for pid=4925 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.089000 audit: BPF prog-id=203 op=LOAD Nov 1 00:41:23.089000 audit[4925]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00019d948 items=0 ppid=4884 pid=4925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565393833643865653762346562616537636536663632383763386539 Nov 1 00:41:23.157470 env[1737]: time="2025-11-01T00:41:23.157409333Z" level=info msg="StartContainer for \"ee983d8ee7b4ebae7ce6f6287c8e94f69efbda1452d702f173777a2e72f2934e\" returns successfully" Nov 1 00:41:23.173748 sshd[4756]: pam_unix(sshd:session): session closed for user core Nov 1 00:41:23.173000 audit[4756]: USER_END pid=4756 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:23.174000 audit[4756]: CRED_DISP pid=4756 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:23.185769 systemd[1]: sshd@7-172.31.19.190:22-147.75.109.163:56822.service: Deactivated successfully. Nov 1 00:41:23.187116 systemd[1]: session-8.scope: Deactivated successfully. Nov 1 00:41:23.188002 systemd-logind[1728]: Session 8 logged out. Waiting for processes to exit. Nov 1 00:41:23.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.19.190:22-147.75.109.163:56822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:23.189885 systemd-logind[1728]: Removed session 8. Nov 1 00:41:23.250000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:41:23.250000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000076d60 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:41:23.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:41:23.252000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:41:23.252000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000076d80 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:41:23.252000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:41:23.268000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:41:23.268000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0003f1a20 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:41:23.268000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:41:23.250000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:41:23.250000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0003f19c0 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:41:23.250000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.194 [INFO][4945] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.194 [INFO][4945] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" iface="eth0" netns="/var/run/netns/cni-91527ffe-fa00-23c7-f4a9-4e707bbc3375" Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.195 [INFO][4945] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" iface="eth0" netns="/var/run/netns/cni-91527ffe-fa00-23c7-f4a9-4e707bbc3375" Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.195 [INFO][4945] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" iface="eth0" netns="/var/run/netns/cni-91527ffe-fa00-23c7-f4a9-4e707bbc3375" Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.195 [INFO][4945] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.195 [INFO][4945] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.275 [INFO][4969] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" HandleID="k8s-pod-network.5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Workload="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.275 [INFO][4969] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.275 [INFO][4969] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.288 [WARNING][4969] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" HandleID="k8s-pod-network.5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Workload="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.288 [INFO][4969] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" HandleID="k8s-pod-network.5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Workload="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.297 [INFO][4969] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:23.306146 env[1737]: 2025-11-01 00:41:23.301 [INFO][4945] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:23.311159 systemd[1]: run-netns-cni\x2d91527ffe\x2dfa00\x2d23c7\x2df4a9\x2d4e707bbc3375.mount: Deactivated successfully. Nov 1 00:41:23.311643 env[1737]: time="2025-11-01T00:41:23.311580414Z" level=info msg="TearDown network for sandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\" successfully" Nov 1 00:41:23.311744 env[1737]: time="2025-11-01T00:41:23.311643740Z" level=info msg="StopPodSandbox for \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\" returns successfully" Nov 1 00:41:23.316253 env[1737]: time="2025-11-01T00:41:23.316205255Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wrg9s,Uid:666be2c8-6518-4217-90fd-5cf3423de279,Namespace:calico-system,Attempt:1,}" Nov 1 00:41:23.320000 audit[4950]: AVC avc: denied { getattr } for pid=4950 comm="coredns" path="cgroup:[4026532559]" dev="nsfs" ino=4026532559 scontext=system_u:system_r:svirt_lxc_net_t:s0:c474,c1002 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Nov 1 00:41:23.320000 audit[4950]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005ac00 a2=c0004d7d78 a3=0 items=0 ppid=4884 pid=4950 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c474,c1002 key=(null) Nov 1 00:41:23.320000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Nov 1 00:41:23.469836 kubelet[2730]: E1101 00:41:23.469792 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:41:23.582342 kubelet[2730]: I1101 00:41:23.580664 2730 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-4jl9s" podStartSLOduration=54.580638591 podStartE2EDuration="54.580638591s" podCreationTimestamp="2025-11-01 00:40:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-11-01 00:41:23.522578428 +0000 UTC m=+56.931073937" watchObservedRunningTime="2025-11-01 00:41:23.580638591 +0000 UTC m=+56.989134100" Nov 1 00:41:23.665261 systemd-networkd[1461]: cali3a614cfa06a: Link UP Nov 1 00:41:23.673500 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 00:41:23.673686 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3a614cfa06a: link becomes ready Nov 1 00:41:23.674076 systemd-networkd[1461]: cali3a614cfa06a: Gained carrier Nov 1 00:41:23.678419 systemd-networkd[1461]: calic7bf51b43f3: Gained IPv6LL Nov 1 00:41:23.706000 audit[5001]: NETFILTER_CFG table=filter:124 family=2 entries=20 op=nft_register_rule pid=5001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:23.706000 audit[5001]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe86f09da0 a2=0 a3=7ffe86f09d8c items=0 ppid=2837 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.706000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:23.710000 audit[5001]: NETFILTER_CFG table=nat:125 family=2 entries=14 op=nft_register_rule pid=5001 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:23.710000 audit[5001]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe86f09da0 a2=0 a3=0 items=0 ppid=2837 pid=5001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.710000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.429 [INFO][4976] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0 csi-node-driver- calico-system 666be2c8-6518-4217-90fd-5cf3423de279 1149 0 2025-11-01 00:40:47 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-19-190 csi-node-driver-wrg9s eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali3a614cfa06a [] [] }} ContainerID="b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" Namespace="calico-system" Pod="csi-node-driver-wrg9s" WorkloadEndpoint="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-" Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.429 [INFO][4976] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" Namespace="calico-system" Pod="csi-node-driver-wrg9s" WorkloadEndpoint="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.540 [INFO][4992] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" HandleID="k8s-pod-network.b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" Workload="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.541 [INFO][4992] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" HandleID="k8s-pod-network.b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" Workload="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000251590), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-19-190", "pod":"csi-node-driver-wrg9s", "timestamp":"2025-11-01 00:41:23.540633846 +0000 UTC"}, Hostname:"ip-172-31-19-190", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.541 [INFO][4992] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.541 [INFO][4992] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.541 [INFO][4992] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-19-190' Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.565 [INFO][4992] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" host="ip-172-31-19-190" Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.591 [INFO][4992] ipam/ipam.go 394: Looking up existing affinities for host host="ip-172-31-19-190" Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.599 [INFO][4992] ipam/ipam.go 511: Trying affinity for 192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.603 [INFO][4992] ipam/ipam.go 158: Attempting to load block cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.614 [INFO][4992] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.41.128/26 host="ip-172-31-19-190" Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.614 [INFO][4992] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.41.128/26 handle="k8s-pod-network.b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" host="ip-172-31-19-190" Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.621 [INFO][4992] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.630 [INFO][4992] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.41.128/26 handle="k8s-pod-network.b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" host="ip-172-31-19-190" Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.651 [INFO][4992] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.41.137/26] block=192.168.41.128/26 handle="k8s-pod-network.b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" host="ip-172-31-19-190" Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.651 [INFO][4992] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.41.137/26] handle="k8s-pod-network.b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" host="ip-172-31-19-190" Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.651 [INFO][4992] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:23.722225 env[1737]: 2025-11-01 00:41:23.651 [INFO][4992] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.41.137/26] IPv6=[] ContainerID="b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" HandleID="k8s-pod-network.b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" Workload="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:23.723344 env[1737]: 2025-11-01 00:41:23.654 [INFO][4976] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" Namespace="calico-system" Pod="csi-node-driver-wrg9s" WorkloadEndpoint="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"666be2c8-6518-4217-90fd-5cf3423de279", ResourceVersion:"1149", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"", Pod:"csi-node-driver-wrg9s", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.41.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3a614cfa06a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:23.723344 env[1737]: 2025-11-01 00:41:23.655 [INFO][4976] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.41.137/32] ContainerID="b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" Namespace="calico-system" Pod="csi-node-driver-wrg9s" WorkloadEndpoint="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:23.723344 env[1737]: 2025-11-01 00:41:23.655 [INFO][4976] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3a614cfa06a ContainerID="b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" Namespace="calico-system" Pod="csi-node-driver-wrg9s" WorkloadEndpoint="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:23.723344 env[1737]: 2025-11-01 00:41:23.666 [INFO][4976] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" Namespace="calico-system" Pod="csi-node-driver-wrg9s" WorkloadEndpoint="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:23.723344 env[1737]: 2025-11-01 00:41:23.666 [INFO][4976] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" Namespace="calico-system" Pod="csi-node-driver-wrg9s" WorkloadEndpoint="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"666be2c8-6518-4217-90fd-5cf3423de279", ResourceVersion:"1149", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b", Pod:"csi-node-driver-wrg9s", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.41.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3a614cfa06a", MAC:"6e:d7:5f:68:39:82", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:23.723344 env[1737]: 2025-11-01 00:41:23.718 [INFO][4976] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b" Namespace="calico-system" Pod="csi-node-driver-wrg9s" WorkloadEndpoint="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:23.743009 env[1737]: time="2025-11-01T00:41:23.741372414Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 00:41:23.743009 env[1737]: time="2025-11-01T00:41:23.741514359Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 00:41:23.743009 env[1737]: time="2025-11-01T00:41:23.741550481Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 00:41:23.743009 env[1737]: time="2025-11-01T00:41:23.741814168Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b pid=5014 runtime=io.containerd.runc.v2 Nov 1 00:41:23.793439 systemd[1]: Started cri-containerd-b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b.scope. Nov 1 00:41:23.832000 audit[5036]: NETFILTER_CFG table=filter:126 family=2 entries=60 op=nft_register_chain pid=5036 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 00:41:23.832000 audit[5036]: SYSCALL arch=c000003e syscall=46 success=yes exit=26688 a0=3 a1=7ffc0158cb30 a2=0 a3=7ffc0158cb1c items=0 ppid=4129 pid=5036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.832000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 00:41:23.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.891000 audit: BPF prog-id=204 op=LOAD Nov 1 00:41:23.893000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.893000 audit[5025]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5014 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232346366613134333333353035313435623866323130373164643061 Nov 1 00:41:23.893000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.893000 audit[5025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5014 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232346366613134333333353035313435623866323130373164643061 Nov 1 00:41:23.894000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.894000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.894000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.894000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.894000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.894000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.894000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.894000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.894000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.894000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.894000 audit: BPF prog-id=205 op=LOAD Nov 1 00:41:23.894000 audit[5025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000366b10 items=0 ppid=5014 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232346366613134333333353035313435623866323130373164643061 Nov 1 00:41:23.895000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.895000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.895000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.895000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.895000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.895000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.895000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.895000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.895000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.895000 audit: BPF prog-id=206 op=LOAD Nov 1 00:41:23.895000 audit[5025]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000366b58 items=0 ppid=5014 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232346366613134333333353035313435623866323130373164643061 Nov 1 00:41:23.895000 audit: BPF prog-id=206 op=UNLOAD Nov 1 00:41:23.896000 audit: BPF prog-id=205 op=UNLOAD Nov 1 00:41:23.896000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.896000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.896000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.896000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.896000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.896000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.896000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.896000 audit[5025]: AVC avc: denied { perfmon } for pid=5025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.896000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.896000 audit[5025]: AVC avc: denied { bpf } for pid=5025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:41:23.896000 audit: BPF prog-id=207 op=LOAD Nov 1 00:41:23.896000 audit[5025]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000366f68 items=0 ppid=5014 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:23.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232346366613134333333353035313435623866323130373164643061 Nov 1 00:41:23.919377 env[1737]: time="2025-11-01T00:41:23.919315390Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wrg9s,Uid:666be2c8-6518-4217-90fd-5cf3423de279,Namespace:calico-system,Attempt:1,} returns sandbox id \"b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b\"" Nov 1 00:41:23.922235 env[1737]: time="2025-11-01T00:41:23.922190007Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:41:24.177127 env[1737]: time="2025-11-01T00:41:24.177053891Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:24.180012 env[1737]: time="2025-11-01T00:41:24.179846425Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:41:24.180764 kubelet[2730]: E1101 00:41:24.180521 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:41:24.180764 kubelet[2730]: E1101 00:41:24.180599 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:41:24.183781 kubelet[2730]: E1101 00:41:24.183718 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fb5cm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wrg9s_calico-system(666be2c8-6518-4217-90fd-5cf3423de279): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:24.186824 env[1737]: time="2025-11-01T00:41:24.186779907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:41:24.263281 systemd[1]: run-containerd-runc-k8s.io-b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b-runc.BzgdQF.mount: Deactivated successfully. Nov 1 00:41:24.318113 systemd-networkd[1461]: cali4cd743c72ea: Gained IPv6LL Nov 1 00:41:24.454206 env[1737]: time="2025-11-01T00:41:24.454060527Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:24.456544 env[1737]: time="2025-11-01T00:41:24.456464878Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:41:24.457190 kubelet[2730]: E1101 00:41:24.457027 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:41:24.457331 kubelet[2730]: E1101 00:41:24.457305 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:41:24.457548 kubelet[2730]: E1101 00:41:24.457514 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fb5cm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wrg9s_calico-system(666be2c8-6518-4217-90fd-5cf3423de279): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:24.459102 kubelet[2730]: E1101 00:41:24.459030 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:41:24.473183 kubelet[2730]: E1101 00:41:24.473131 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:41:24.700333 systemd-networkd[1461]: cali3a614cfa06a: Gained IPv6LL Nov 1 00:41:24.744000 audit[5051]: NETFILTER_CFG table=filter:127 family=2 entries=17 op=nft_register_rule pid=5051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:24.744000 audit[5051]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffe08788e0 a2=0 a3=7fffe08788cc items=0 ppid=2837 pid=5051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:24.744000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:24.750000 audit[5051]: NETFILTER_CFG table=nat:128 family=2 entries=35 op=nft_register_chain pid=5051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:24.750000 audit[5051]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffe08788e0 a2=0 a3=7fffe08788cc items=0 ppid=2837 pid=5051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:24.750000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:25.478843 kubelet[2730]: E1101 00:41:25.478788 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:41:26.941933 env[1737]: time="2025-11-01T00:41:26.941524908Z" level=info msg="StopPodSandbox for \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\"" Nov 1 00:41:27.144287 env[1737]: 2025-11-01 00:41:27.080 [WARNING][5066] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0", GenerateName:"calico-apiserver-bb8db9787-", Namespace:"calico-apiserver", SelfLink:"", UID:"ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3", ResourceVersion:"1128", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"bb8db9787", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246", Pod:"calico-apiserver-bb8db9787-cmqlg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic77b6520130", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:27.144287 env[1737]: 2025-11-01 00:41:27.080 [INFO][5066] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:27.144287 env[1737]: 2025-11-01 00:41:27.080 [INFO][5066] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" iface="eth0" netns="" Nov 1 00:41:27.144287 env[1737]: 2025-11-01 00:41:27.080 [INFO][5066] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:27.144287 env[1737]: 2025-11-01 00:41:27.081 [INFO][5066] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:27.144287 env[1737]: 2025-11-01 00:41:27.120 [INFO][5075] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" HandleID="k8s-pod-network.232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Workload="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:27.144287 env[1737]: 2025-11-01 00:41:27.120 [INFO][5075] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:27.144287 env[1737]: 2025-11-01 00:41:27.120 [INFO][5075] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:27.144287 env[1737]: 2025-11-01 00:41:27.127 [WARNING][5075] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" HandleID="k8s-pod-network.232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Workload="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:27.144287 env[1737]: 2025-11-01 00:41:27.128 [INFO][5075] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" HandleID="k8s-pod-network.232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Workload="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:27.144287 env[1737]: 2025-11-01 00:41:27.136 [INFO][5075] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:27.144287 env[1737]: 2025-11-01 00:41:27.140 [INFO][5066] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:27.144849 env[1737]: time="2025-11-01T00:41:27.144339693Z" level=info msg="TearDown network for sandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\" successfully" Nov 1 00:41:27.144849 env[1737]: time="2025-11-01T00:41:27.144382797Z" level=info msg="StopPodSandbox for \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\" returns successfully" Nov 1 00:41:27.145565 env[1737]: time="2025-11-01T00:41:27.145526336Z" level=info msg="RemovePodSandbox for \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\"" Nov 1 00:41:27.145694 env[1737]: time="2025-11-01T00:41:27.145575484Z" level=info msg="Forcibly stopping sandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\"" Nov 1 00:41:27.294867 env[1737]: 2025-11-01 00:41:27.204 [WARNING][5089] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0", GenerateName:"calico-apiserver-bb8db9787-", Namespace:"calico-apiserver", SelfLink:"", UID:"ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3", ResourceVersion:"1128", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"bb8db9787", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"bc30d3e9be3cef8ea88c7efb08ac9285ecebd1dd9f1001e3fd3aee1a9bbf7246", Pod:"calico-apiserver-bb8db9787-cmqlg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic77b6520130", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:27.294867 env[1737]: 2025-11-01 00:41:27.204 [INFO][5089] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:27.294867 env[1737]: 2025-11-01 00:41:27.205 [INFO][5089] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" iface="eth0" netns="" Nov 1 00:41:27.294867 env[1737]: 2025-11-01 00:41:27.205 [INFO][5089] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:27.294867 env[1737]: 2025-11-01 00:41:27.205 [INFO][5089] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:27.294867 env[1737]: 2025-11-01 00:41:27.250 [INFO][5096] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" HandleID="k8s-pod-network.232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Workload="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:27.294867 env[1737]: 2025-11-01 00:41:27.251 [INFO][5096] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:27.294867 env[1737]: 2025-11-01 00:41:27.251 [INFO][5096] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:27.294867 env[1737]: 2025-11-01 00:41:27.267 [WARNING][5096] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" HandleID="k8s-pod-network.232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Workload="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:27.294867 env[1737]: 2025-11-01 00:41:27.267 [INFO][5096] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" HandleID="k8s-pod-network.232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Workload="ip--172--31--19--190-k8s-calico--apiserver--bb8db9787--cmqlg-eth0" Nov 1 00:41:27.294867 env[1737]: 2025-11-01 00:41:27.275 [INFO][5096] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:27.294867 env[1737]: 2025-11-01 00:41:27.280 [INFO][5089] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b" Nov 1 00:41:27.294867 env[1737]: time="2025-11-01T00:41:27.292766210Z" level=info msg="TearDown network for sandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\" successfully" Nov 1 00:41:27.302608 env[1737]: time="2025-11-01T00:41:27.302542905Z" level=info msg="RemovePodSandbox \"232bc188483ab00350c5fe03f772b66e363016805b405b18e9ffabbf43efd04b\" returns successfully" Nov 1 00:41:27.303541 env[1737]: time="2025-11-01T00:41:27.303457148Z" level=info msg="StopPodSandbox for \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\"" Nov 1 00:41:27.398759 env[1737]: 2025-11-01 00:41:27.349 [WARNING][5110] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f", ResourceVersion:"1035", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90", Pod:"coredns-674b8bbfcf-k7kbp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid8d10140e55", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:27.398759 env[1737]: 2025-11-01 00:41:27.349 [INFO][5110] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:27.398759 env[1737]: 2025-11-01 00:41:27.349 [INFO][5110] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" iface="eth0" netns="" Nov 1 00:41:27.398759 env[1737]: 2025-11-01 00:41:27.349 [INFO][5110] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:27.398759 env[1737]: 2025-11-01 00:41:27.349 [INFO][5110] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:27.398759 env[1737]: 2025-11-01 00:41:27.379 [INFO][5117] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" HandleID="k8s-pod-network.d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:27.398759 env[1737]: 2025-11-01 00:41:27.379 [INFO][5117] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:27.398759 env[1737]: 2025-11-01 00:41:27.379 [INFO][5117] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:27.398759 env[1737]: 2025-11-01 00:41:27.386 [WARNING][5117] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" HandleID="k8s-pod-network.d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:27.398759 env[1737]: 2025-11-01 00:41:27.388 [INFO][5117] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" HandleID="k8s-pod-network.d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:27.398759 env[1737]: 2025-11-01 00:41:27.391 [INFO][5117] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:27.398759 env[1737]: 2025-11-01 00:41:27.394 [INFO][5110] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:27.399514 env[1737]: time="2025-11-01T00:41:27.398795741Z" level=info msg="TearDown network for sandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\" successfully" Nov 1 00:41:27.399514 env[1737]: time="2025-11-01T00:41:27.398841076Z" level=info msg="StopPodSandbox for \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\" returns successfully" Nov 1 00:41:27.399617 env[1737]: time="2025-11-01T00:41:27.399560154Z" level=info msg="RemovePodSandbox for \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\"" Nov 1 00:41:27.400618 env[1737]: time="2025-11-01T00:41:27.399604118Z" level=info msg="Forcibly stopping sandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\"" Nov 1 00:41:27.522639 env[1737]: 2025-11-01 00:41:27.470 [WARNING][5132] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"1aa2b5ca-f58d-4ccd-b88e-60efe7d7746f", ResourceVersion:"1035", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"21cb1680c8433e53e12a075efd0482cc5cb0f11de89b22d3e765a8759f838e90", Pod:"coredns-674b8bbfcf-k7kbp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid8d10140e55", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:27.522639 env[1737]: 2025-11-01 00:41:27.471 [INFO][5132] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:27.522639 env[1737]: 2025-11-01 00:41:27.471 [INFO][5132] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" iface="eth0" netns="" Nov 1 00:41:27.522639 env[1737]: 2025-11-01 00:41:27.471 [INFO][5132] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:27.522639 env[1737]: 2025-11-01 00:41:27.471 [INFO][5132] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:27.522639 env[1737]: 2025-11-01 00:41:27.502 [INFO][5139] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" HandleID="k8s-pod-network.d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:27.522639 env[1737]: 2025-11-01 00:41:27.503 [INFO][5139] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:27.522639 env[1737]: 2025-11-01 00:41:27.503 [INFO][5139] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:27.522639 env[1737]: 2025-11-01 00:41:27.513 [WARNING][5139] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" HandleID="k8s-pod-network.d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:27.522639 env[1737]: 2025-11-01 00:41:27.513 [INFO][5139] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" HandleID="k8s-pod-network.d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--k7kbp-eth0" Nov 1 00:41:27.522639 env[1737]: 2025-11-01 00:41:27.515 [INFO][5139] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:27.522639 env[1737]: 2025-11-01 00:41:27.518 [INFO][5132] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29" Nov 1 00:41:27.524724 env[1737]: time="2025-11-01T00:41:27.522651283Z" level=info msg="TearDown network for sandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\" successfully" Nov 1 00:41:27.532005 env[1737]: time="2025-11-01T00:41:27.531560120Z" level=info msg="RemovePodSandbox \"d267eedac82b3322818c5a24ebe5285ecbd32b21f6d4476b764d015cfc9e1c29\" returns successfully" Nov 1 00:41:27.540768 env[1737]: time="2025-11-01T00:41:27.540718768Z" level=info msg="StopPodSandbox for \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\"" Nov 1 00:41:27.661513 env[1737]: 2025-11-01 00:41:27.610 [WARNING][5156] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0", GenerateName:"calico-kube-controllers-5bb8fbd4f8-", Namespace:"calico-system", SelfLink:"", UID:"67349f38-7770-459e-9c5a-e728b49cc9e0", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bb8fbd4f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d", Pod:"calico-kube-controllers-5bb8fbd4f8-rkzw4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.41.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali59445e29506", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:27.661513 env[1737]: 2025-11-01 00:41:27.610 [INFO][5156] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:27.661513 env[1737]: 2025-11-01 00:41:27.610 [INFO][5156] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" iface="eth0" netns="" Nov 1 00:41:27.661513 env[1737]: 2025-11-01 00:41:27.610 [INFO][5156] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:27.661513 env[1737]: 2025-11-01 00:41:27.610 [INFO][5156] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:27.661513 env[1737]: 2025-11-01 00:41:27.644 [INFO][5164] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" HandleID="k8s-pod-network.5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Workload="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:27.661513 env[1737]: 2025-11-01 00:41:27.645 [INFO][5164] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:27.661513 env[1737]: 2025-11-01 00:41:27.645 [INFO][5164] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:27.661513 env[1737]: 2025-11-01 00:41:27.653 [WARNING][5164] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" HandleID="k8s-pod-network.5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Workload="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:27.661513 env[1737]: 2025-11-01 00:41:27.653 [INFO][5164] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" HandleID="k8s-pod-network.5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Workload="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:27.661513 env[1737]: 2025-11-01 00:41:27.655 [INFO][5164] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:27.661513 env[1737]: 2025-11-01 00:41:27.658 [INFO][5156] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:27.662366 env[1737]: time="2025-11-01T00:41:27.662314386Z" level=info msg="TearDown network for sandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\" successfully" Nov 1 00:41:27.662471 env[1737]: time="2025-11-01T00:41:27.662444549Z" level=info msg="StopPodSandbox for \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\" returns successfully" Nov 1 00:41:27.663130 env[1737]: time="2025-11-01T00:41:27.663090797Z" level=info msg="RemovePodSandbox for \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\"" Nov 1 00:41:27.663238 env[1737]: time="2025-11-01T00:41:27.663141698Z" level=info msg="Forcibly stopping sandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\"" Nov 1 00:41:27.763164 env[1737]: 2025-11-01 00:41:27.713 [WARNING][5178] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0", GenerateName:"calico-kube-controllers-5bb8fbd4f8-", Namespace:"calico-system", SelfLink:"", UID:"67349f38-7770-459e-9c5a-e728b49cc9e0", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5bb8fbd4f8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"5347017b858cf3169b6e610f3dd1ae35033e4b6ebf16582c540076350bfbf43d", Pod:"calico-kube-controllers-5bb8fbd4f8-rkzw4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.41.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali59445e29506", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:27.763164 env[1737]: 2025-11-01 00:41:27.713 [INFO][5178] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:27.763164 env[1737]: 2025-11-01 00:41:27.713 [INFO][5178] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" iface="eth0" netns="" Nov 1 00:41:27.763164 env[1737]: 2025-11-01 00:41:27.713 [INFO][5178] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:27.763164 env[1737]: 2025-11-01 00:41:27.713 [INFO][5178] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:27.763164 env[1737]: 2025-11-01 00:41:27.742 [INFO][5186] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" HandleID="k8s-pod-network.5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Workload="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:27.763164 env[1737]: 2025-11-01 00:41:27.746 [INFO][5186] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:27.763164 env[1737]: 2025-11-01 00:41:27.746 [INFO][5186] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:27.763164 env[1737]: 2025-11-01 00:41:27.754 [WARNING][5186] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" HandleID="k8s-pod-network.5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Workload="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:27.763164 env[1737]: 2025-11-01 00:41:27.754 [INFO][5186] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" HandleID="k8s-pod-network.5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Workload="ip--172--31--19--190-k8s-calico--kube--controllers--5bb8fbd4f8--rkzw4-eth0" Nov 1 00:41:27.763164 env[1737]: 2025-11-01 00:41:27.757 [INFO][5186] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:27.763164 env[1737]: 2025-11-01 00:41:27.759 [INFO][5178] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9" Nov 1 00:41:27.764197 env[1737]: time="2025-11-01T00:41:27.764133652Z" level=info msg="TearDown network for sandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\" successfully" Nov 1 00:41:27.771351 env[1737]: time="2025-11-01T00:41:27.771294632Z" level=info msg="RemovePodSandbox \"5e28acfcea239944d4eb573c66c4991437856712581b84c3a85631520e3369a9\" returns successfully" Nov 1 00:41:27.788208 env[1737]: time="2025-11-01T00:41:27.786136239Z" level=info msg="StopPodSandbox for \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\"" Nov 1 00:41:27.889155 env[1737]: 2025-11-01 00:41:27.840 [WARNING][5201] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" WorkloadEndpoint="ip--172--31--19--190-k8s-whisker--84dd6b699f--pctd4-eth0" Nov 1 00:41:27.889155 env[1737]: 2025-11-01 00:41:27.840 [INFO][5201] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:27.889155 env[1737]: 2025-11-01 00:41:27.841 [INFO][5201] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" iface="eth0" netns="" Nov 1 00:41:27.889155 env[1737]: 2025-11-01 00:41:27.841 [INFO][5201] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:27.889155 env[1737]: 2025-11-01 00:41:27.841 [INFO][5201] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:27.889155 env[1737]: 2025-11-01 00:41:27.868 [INFO][5208] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" HandleID="k8s-pod-network.8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Workload="ip--172--31--19--190-k8s-whisker--84dd6b699f--pctd4-eth0" Nov 1 00:41:27.889155 env[1737]: 2025-11-01 00:41:27.868 [INFO][5208] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:27.889155 env[1737]: 2025-11-01 00:41:27.868 [INFO][5208] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:27.889155 env[1737]: 2025-11-01 00:41:27.878 [WARNING][5208] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" HandleID="k8s-pod-network.8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Workload="ip--172--31--19--190-k8s-whisker--84dd6b699f--pctd4-eth0" Nov 1 00:41:27.889155 env[1737]: 2025-11-01 00:41:27.878 [INFO][5208] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" HandleID="k8s-pod-network.8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Workload="ip--172--31--19--190-k8s-whisker--84dd6b699f--pctd4-eth0" Nov 1 00:41:27.889155 env[1737]: 2025-11-01 00:41:27.882 [INFO][5208] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:27.889155 env[1737]: 2025-11-01 00:41:27.886 [INFO][5201] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:27.889782 env[1737]: time="2025-11-01T00:41:27.889191564Z" level=info msg="TearDown network for sandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\" successfully" Nov 1 00:41:27.889782 env[1737]: time="2025-11-01T00:41:27.889233442Z" level=info msg="StopPodSandbox for \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\" returns successfully" Nov 1 00:41:27.889907 env[1737]: time="2025-11-01T00:41:27.889876505Z" level=info msg="RemovePodSandbox for \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\"" Nov 1 00:41:27.890069 env[1737]: time="2025-11-01T00:41:27.890005572Z" level=info msg="Forcibly stopping sandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\"" Nov 1 00:41:27.999752 env[1737]: 2025-11-01 00:41:27.936 [WARNING][5222] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" WorkloadEndpoint="ip--172--31--19--190-k8s-whisker--84dd6b699f--pctd4-eth0" Nov 1 00:41:27.999752 env[1737]: 2025-11-01 00:41:27.936 [INFO][5222] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:27.999752 env[1737]: 2025-11-01 00:41:27.937 [INFO][5222] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" iface="eth0" netns="" Nov 1 00:41:27.999752 env[1737]: 2025-11-01 00:41:27.937 [INFO][5222] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:27.999752 env[1737]: 2025-11-01 00:41:27.937 [INFO][5222] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:27.999752 env[1737]: 2025-11-01 00:41:27.978 [INFO][5229] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" HandleID="k8s-pod-network.8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Workload="ip--172--31--19--190-k8s-whisker--84dd6b699f--pctd4-eth0" Nov 1 00:41:27.999752 env[1737]: 2025-11-01 00:41:27.978 [INFO][5229] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:27.999752 env[1737]: 2025-11-01 00:41:27.978 [INFO][5229] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:27.999752 env[1737]: 2025-11-01 00:41:27.987 [WARNING][5229] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" HandleID="k8s-pod-network.8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Workload="ip--172--31--19--190-k8s-whisker--84dd6b699f--pctd4-eth0" Nov 1 00:41:27.999752 env[1737]: 2025-11-01 00:41:27.987 [INFO][5229] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" HandleID="k8s-pod-network.8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Workload="ip--172--31--19--190-k8s-whisker--84dd6b699f--pctd4-eth0" Nov 1 00:41:27.999752 env[1737]: 2025-11-01 00:41:27.990 [INFO][5229] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:27.999752 env[1737]: 2025-11-01 00:41:27.993 [INFO][5222] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4" Nov 1 00:41:27.999752 env[1737]: time="2025-11-01T00:41:27.996874167Z" level=info msg="TearDown network for sandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\" successfully" Nov 1 00:41:28.004998 env[1737]: time="2025-11-01T00:41:28.004920527Z" level=info msg="RemovePodSandbox \"8fd196fda2477e637baba532b6a5a046eb3b89c821f024a94c2f4a3d9def44c4\" returns successfully" Nov 1 00:41:28.008302 env[1737]: time="2025-11-01T00:41:28.008258647Z" level=info msg="StopPodSandbox for \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\"" Nov 1 00:41:28.175665 env[1737]: 2025-11-01 00:41:28.097 [WARNING][5246] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"666be2c8-6518-4217-90fd-5cf3423de279", ResourceVersion:"1187", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b", Pod:"csi-node-driver-wrg9s", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.41.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3a614cfa06a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:28.175665 env[1737]: 2025-11-01 00:41:28.098 [INFO][5246] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:28.175665 env[1737]: 2025-11-01 00:41:28.098 [INFO][5246] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" iface="eth0" netns="" Nov 1 00:41:28.175665 env[1737]: 2025-11-01 00:41:28.098 [INFO][5246] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:28.175665 env[1737]: 2025-11-01 00:41:28.098 [INFO][5246] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:28.175665 env[1737]: 2025-11-01 00:41:28.142 [INFO][5254] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" HandleID="k8s-pod-network.5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Workload="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:28.175665 env[1737]: 2025-11-01 00:41:28.143 [INFO][5254] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:28.175665 env[1737]: 2025-11-01 00:41:28.143 [INFO][5254] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:28.175665 env[1737]: 2025-11-01 00:41:28.162 [WARNING][5254] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" HandleID="k8s-pod-network.5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Workload="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:28.175665 env[1737]: 2025-11-01 00:41:28.162 [INFO][5254] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" HandleID="k8s-pod-network.5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Workload="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:28.175665 env[1737]: 2025-11-01 00:41:28.165 [INFO][5254] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:28.175665 env[1737]: 2025-11-01 00:41:28.170 [INFO][5246] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:28.177177 env[1737]: time="2025-11-01T00:41:28.175714893Z" level=info msg="TearDown network for sandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\" successfully" Nov 1 00:41:28.177177 env[1737]: time="2025-11-01T00:41:28.175765013Z" level=info msg="StopPodSandbox for \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\" returns successfully" Nov 1 00:41:28.177177 env[1737]: time="2025-11-01T00:41:28.176770205Z" level=info msg="RemovePodSandbox for \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\"" Nov 1 00:41:28.177177 env[1737]: time="2025-11-01T00:41:28.176834004Z" level=info msg="Forcibly stopping sandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\"" Nov 1 00:41:28.207316 kernel: kauditd_printk_skb: 555 callbacks suppressed Nov 1 00:41:28.207475 kernel: audit: type=1130 audit(1761957688.201:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.19.190:22-147.75.109.163:56834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:28.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.19.190:22-147.75.109.163:56834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:28.202447 systemd[1]: Started sshd@8-172.31.19.190:22-147.75.109.163:56834.service. Nov 1 00:41:28.369515 env[1737]: 2025-11-01 00:41:28.289 [WARNING][5269] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"666be2c8-6518-4217-90fd-5cf3423de279", ResourceVersion:"1187", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"b24cfa14333505145b8f21071dd0a9399ac30ebefbc3298e02213a9082d0227b", Pod:"csi-node-driver-wrg9s", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.41.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3a614cfa06a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:28.369515 env[1737]: 2025-11-01 00:41:28.289 [INFO][5269] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:28.369515 env[1737]: 2025-11-01 00:41:28.289 [INFO][5269] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" iface="eth0" netns="" Nov 1 00:41:28.369515 env[1737]: 2025-11-01 00:41:28.289 [INFO][5269] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:28.369515 env[1737]: 2025-11-01 00:41:28.289 [INFO][5269] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:28.369515 env[1737]: 2025-11-01 00:41:28.344 [INFO][5279] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" HandleID="k8s-pod-network.5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Workload="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:28.369515 env[1737]: 2025-11-01 00:41:28.345 [INFO][5279] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:28.369515 env[1737]: 2025-11-01 00:41:28.345 [INFO][5279] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:28.369515 env[1737]: 2025-11-01 00:41:28.359 [WARNING][5279] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" HandleID="k8s-pod-network.5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Workload="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:28.369515 env[1737]: 2025-11-01 00:41:28.360 [INFO][5279] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" HandleID="k8s-pod-network.5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Workload="ip--172--31--19--190-k8s-csi--node--driver--wrg9s-eth0" Nov 1 00:41:28.369515 env[1737]: 2025-11-01 00:41:28.363 [INFO][5279] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:28.369515 env[1737]: 2025-11-01 00:41:28.366 [INFO][5269] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900" Nov 1 00:41:28.370309 env[1737]: time="2025-11-01T00:41:28.369498681Z" level=info msg="TearDown network for sandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\" successfully" Nov 1 00:41:28.386958 env[1737]: time="2025-11-01T00:41:28.386886283Z" level=info msg="RemovePodSandbox \"5ab5e4dce1b4b915172b755802f4ca7a2894b403c042c0ff64b7422db775b900\" returns successfully" Nov 1 00:41:28.388900 env[1737]: time="2025-11-01T00:41:28.388854955Z" level=info msg="StopPodSandbox for \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\"" Nov 1 00:41:28.463000 audit[5274]: USER_ACCT pid=5274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:28.472692 sshd[5274]: Accepted publickey for core from 147.75.109.163 port 56834 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:41:28.478859 kernel: audit: type=1101 audit(1761957688.463:1389): pid=5274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:28.478951 kernel: audit: type=1103 audit(1761957688.471:1390): pid=5274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:28.471000 audit[5274]: CRED_ACQ pid=5274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:28.474919 sshd[5274]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:41:28.485001 kernel: audit: type=1006 audit(1761957688.471:1391): pid=5274 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Nov 1 00:41:28.471000 audit[5274]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc095c2e50 a2=3 a3=0 items=0 ppid=1 pid=5274 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:28.486404 systemd[1]: Started session-9.scope. Nov 1 00:41:28.488572 systemd-logind[1728]: New session 9 of user core. Nov 1 00:41:28.492997 kernel: audit: type=1300 audit(1761957688.471:1391): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc095c2e50 a2=3 a3=0 items=0 ppid=1 pid=5274 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:28.471000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:28.497104 kernel: audit: type=1327 audit(1761957688.471:1391): proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:28.504083 kernel: audit: type=1105 audit(1761957688.496:1392): pid=5274 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:28.496000 audit[5274]: USER_START pid=5274 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:28.507000 audit[5301]: CRED_ACQ pid=5301 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:28.516002 kernel: audit: type=1103 audit(1761957688.507:1393): pid=5301 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:28.603787 env[1737]: 2025-11-01 00:41:28.463 [WARNING][5294] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"21d23048-45cc-482a-a891-7ca305e12df5", ResourceVersion:"1158", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2", Pod:"goldmane-666569f655-4d2cg", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.41.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calic7bf51b43f3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:28.603787 env[1737]: 2025-11-01 00:41:28.473 [INFO][5294] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:28.603787 env[1737]: 2025-11-01 00:41:28.474 [INFO][5294] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" iface="eth0" netns="" Nov 1 00:41:28.603787 env[1737]: 2025-11-01 00:41:28.474 [INFO][5294] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:28.603787 env[1737]: 2025-11-01 00:41:28.474 [INFO][5294] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:28.603787 env[1737]: 2025-11-01 00:41:28.558 [INFO][5302] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" HandleID="k8s-pod-network.c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Workload="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:28.603787 env[1737]: 2025-11-01 00:41:28.558 [INFO][5302] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:28.603787 env[1737]: 2025-11-01 00:41:28.559 [INFO][5302] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:28.603787 env[1737]: 2025-11-01 00:41:28.582 [WARNING][5302] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" HandleID="k8s-pod-network.c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Workload="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:28.603787 env[1737]: 2025-11-01 00:41:28.582 [INFO][5302] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" HandleID="k8s-pod-network.c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Workload="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:28.603787 env[1737]: 2025-11-01 00:41:28.585 [INFO][5302] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:28.603787 env[1737]: 2025-11-01 00:41:28.590 [INFO][5294] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:28.604535 env[1737]: time="2025-11-01T00:41:28.603837845Z" level=info msg="TearDown network for sandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\" successfully" Nov 1 00:41:28.604535 env[1737]: time="2025-11-01T00:41:28.603880224Z" level=info msg="StopPodSandbox for \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\" returns successfully" Nov 1 00:41:28.607024 env[1737]: time="2025-11-01T00:41:28.605025825Z" level=info msg="RemovePodSandbox for \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\"" Nov 1 00:41:28.607024 env[1737]: time="2025-11-01T00:41:28.605073324Z" level=info msg="Forcibly stopping sandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\"" Nov 1 00:41:28.825551 env[1737]: 2025-11-01 00:41:28.709 [WARNING][5320] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"21d23048-45cc-482a-a891-7ca305e12df5", ResourceVersion:"1158", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"2199ce403efe61511a5bda8e6c3b6bfe761620005afd8870d97dccdaeb4761f2", Pod:"goldmane-666569f655-4d2cg", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.41.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calic7bf51b43f3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:28.825551 env[1737]: 2025-11-01 00:41:28.709 [INFO][5320] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:28.825551 env[1737]: 2025-11-01 00:41:28.709 [INFO][5320] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" iface="eth0" netns="" Nov 1 00:41:28.825551 env[1737]: 2025-11-01 00:41:28.709 [INFO][5320] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:28.825551 env[1737]: 2025-11-01 00:41:28.709 [INFO][5320] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:28.825551 env[1737]: 2025-11-01 00:41:28.802 [INFO][5330] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" HandleID="k8s-pod-network.c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Workload="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:28.825551 env[1737]: 2025-11-01 00:41:28.803 [INFO][5330] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:28.825551 env[1737]: 2025-11-01 00:41:28.803 [INFO][5330] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:28.825551 env[1737]: 2025-11-01 00:41:28.814 [WARNING][5330] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" HandleID="k8s-pod-network.c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Workload="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:28.825551 env[1737]: 2025-11-01 00:41:28.814 [INFO][5330] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" HandleID="k8s-pod-network.c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Workload="ip--172--31--19--190-k8s-goldmane--666569f655--4d2cg-eth0" Nov 1 00:41:28.825551 env[1737]: 2025-11-01 00:41:28.817 [INFO][5330] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:28.825551 env[1737]: 2025-11-01 00:41:28.820 [INFO][5320] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2" Nov 1 00:41:28.825551 env[1737]: time="2025-11-01T00:41:28.825510613Z" level=info msg="TearDown network for sandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\" successfully" Nov 1 00:41:28.835918 env[1737]: time="2025-11-01T00:41:28.835815006Z" level=info msg="RemovePodSandbox \"c8fe079a1bf1759aeeb1adff821b7a5c5242a8c3c23722f219ba919996503fe2\" returns successfully" Nov 1 00:41:28.836795 env[1737]: time="2025-11-01T00:41:28.836686058Z" level=info msg="StopPodSandbox for \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\"" Nov 1 00:41:28.997044 env[1737]: 2025-11-01 00:41:28.916 [WARNING][5344] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0", GenerateName:"calico-apiserver-d49b764c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"8983267d-ef32-4d12-8dac-9ecb10367507", ResourceVersion:"1034", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49b764c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45", Pod:"calico-apiserver-d49b764c9-wpz62", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1ad4a802638", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:28.997044 env[1737]: 2025-11-01 00:41:28.917 [INFO][5344] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:28.997044 env[1737]: 2025-11-01 00:41:28.917 [INFO][5344] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" iface="eth0" netns="" Nov 1 00:41:28.997044 env[1737]: 2025-11-01 00:41:28.917 [INFO][5344] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:28.997044 env[1737]: 2025-11-01 00:41:28.917 [INFO][5344] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:28.997044 env[1737]: 2025-11-01 00:41:28.968 [INFO][5353] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" HandleID="k8s-pod-network.7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:28.997044 env[1737]: 2025-11-01 00:41:28.969 [INFO][5353] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:28.997044 env[1737]: 2025-11-01 00:41:28.969 [INFO][5353] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:28.997044 env[1737]: 2025-11-01 00:41:28.982 [WARNING][5353] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" HandleID="k8s-pod-network.7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:28.997044 env[1737]: 2025-11-01 00:41:28.983 [INFO][5353] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" HandleID="k8s-pod-network.7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:28.997044 env[1737]: 2025-11-01 00:41:28.989 [INFO][5353] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:28.997044 env[1737]: 2025-11-01 00:41:28.994 [INFO][5344] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:28.998739 env[1737]: time="2025-11-01T00:41:28.997268168Z" level=info msg="TearDown network for sandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\" successfully" Nov 1 00:41:28.998739 env[1737]: time="2025-11-01T00:41:28.997328489Z" level=info msg="StopPodSandbox for \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\" returns successfully" Nov 1 00:41:29.000271 env[1737]: time="2025-11-01T00:41:29.000226363Z" level=info msg="RemovePodSandbox for \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\"" Nov 1 00:41:29.001187 env[1737]: time="2025-11-01T00:41:29.001116295Z" level=info msg="Forcibly stopping sandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\"" Nov 1 00:41:29.072968 sshd[5274]: pam_unix(sshd:session): session closed for user core Nov 1 00:41:29.078000 audit[5274]: USER_END pid=5274 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:29.081491 systemd[1]: sshd@8-172.31.19.190:22-147.75.109.163:56834.service: Deactivated successfully. Nov 1 00:41:29.090005 kernel: audit: type=1106 audit(1761957689.078:1394): pid=5274 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:29.083261 systemd[1]: session-9.scope: Deactivated successfully. Nov 1 00:41:29.085815 systemd-logind[1728]: Session 9 logged out. Waiting for processes to exit. Nov 1 00:41:29.087722 systemd-logind[1728]: Removed session 9. Nov 1 00:41:29.101128 kernel: audit: type=1104 audit(1761957689.078:1395): pid=5274 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:29.078000 audit[5274]: CRED_DISP pid=5274 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:29.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.19.190:22-147.75.109.163:56834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:29.156626 env[1737]: 2025-11-01 00:41:29.070 [WARNING][5369] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0", GenerateName:"calico-apiserver-d49b764c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"8983267d-ef32-4d12-8dac-9ecb10367507", ResourceVersion:"1034", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49b764c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"0b9dc2661a8ed32f341bfb9756bd103c8c8dbca9e2ed0c2429f764c6cc7dde45", Pod:"calico-apiserver-d49b764c9-wpz62", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1ad4a802638", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:29.156626 env[1737]: 2025-11-01 00:41:29.071 [INFO][5369] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:29.156626 env[1737]: 2025-11-01 00:41:29.071 [INFO][5369] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" iface="eth0" netns="" Nov 1 00:41:29.156626 env[1737]: 2025-11-01 00:41:29.071 [INFO][5369] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:29.156626 env[1737]: 2025-11-01 00:41:29.071 [INFO][5369] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:29.156626 env[1737]: 2025-11-01 00:41:29.127 [INFO][5377] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" HandleID="k8s-pod-network.7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:29.156626 env[1737]: 2025-11-01 00:41:29.128 [INFO][5377] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:29.156626 env[1737]: 2025-11-01 00:41:29.128 [INFO][5377] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:29.156626 env[1737]: 2025-11-01 00:41:29.148 [WARNING][5377] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" HandleID="k8s-pod-network.7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:29.156626 env[1737]: 2025-11-01 00:41:29.148 [INFO][5377] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" HandleID="k8s-pod-network.7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--wpz62-eth0" Nov 1 00:41:29.156626 env[1737]: 2025-11-01 00:41:29.151 [INFO][5377] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:29.156626 env[1737]: 2025-11-01 00:41:29.154 [INFO][5369] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224" Nov 1 00:41:29.157590 env[1737]: time="2025-11-01T00:41:29.156681496Z" level=info msg="TearDown network for sandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\" successfully" Nov 1 00:41:29.170374 env[1737]: time="2025-11-01T00:41:29.170181847Z" level=info msg="RemovePodSandbox \"7f716232d744ad35559ae1f7a712046f542b2abb9dfe29e86dc5f80f2991b224\" returns successfully" Nov 1 00:41:29.172043 env[1737]: time="2025-11-01T00:41:29.171996091Z" level=info msg="StopPodSandbox for \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\"" Nov 1 00:41:29.302218 env[1737]: 2025-11-01 00:41:29.239 [WARNING][5394] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"1214d512-7719-4ed4-8eb7-a357f4f0e4bc", ResourceVersion:"1160", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b", Pod:"coredns-674b8bbfcf-4jl9s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4cd743c72ea", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:29.302218 env[1737]: 2025-11-01 00:41:29.239 [INFO][5394] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:29.302218 env[1737]: 2025-11-01 00:41:29.239 [INFO][5394] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" iface="eth0" netns="" Nov 1 00:41:29.302218 env[1737]: 2025-11-01 00:41:29.239 [INFO][5394] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:29.302218 env[1737]: 2025-11-01 00:41:29.240 [INFO][5394] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:29.302218 env[1737]: 2025-11-01 00:41:29.283 [INFO][5403] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" HandleID="k8s-pod-network.195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:29.302218 env[1737]: 2025-11-01 00:41:29.284 [INFO][5403] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:29.302218 env[1737]: 2025-11-01 00:41:29.284 [INFO][5403] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:29.302218 env[1737]: 2025-11-01 00:41:29.293 [WARNING][5403] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" HandleID="k8s-pod-network.195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:29.302218 env[1737]: 2025-11-01 00:41:29.293 [INFO][5403] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" HandleID="k8s-pod-network.195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:29.302218 env[1737]: 2025-11-01 00:41:29.296 [INFO][5403] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:29.302218 env[1737]: 2025-11-01 00:41:29.299 [INFO][5394] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:29.303728 env[1737]: time="2025-11-01T00:41:29.302264565Z" level=info msg="TearDown network for sandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\" successfully" Nov 1 00:41:29.303728 env[1737]: time="2025-11-01T00:41:29.302307485Z" level=info msg="StopPodSandbox for \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\" returns successfully" Nov 1 00:41:29.303960 env[1737]: time="2025-11-01T00:41:29.303931449Z" level=info msg="RemovePodSandbox for \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\"" Nov 1 00:41:29.304093 env[1737]: time="2025-11-01T00:41:29.304029264Z" level=info msg="Forcibly stopping sandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\"" Nov 1 00:41:29.403323 env[1737]: 2025-11-01 00:41:29.352 [WARNING][5417] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"1214d512-7719-4ed4-8eb7-a357f4f0e4bc", ResourceVersion:"1160", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"09b0e8a20e912acb4a78aea6e788c8ff25e858dedda1b079bb1fc9d0bd301d0b", Pod:"coredns-674b8bbfcf-4jl9s", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.41.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4cd743c72ea", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:29.403323 env[1737]: 2025-11-01 00:41:29.353 [INFO][5417] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:29.403323 env[1737]: 2025-11-01 00:41:29.353 [INFO][5417] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" iface="eth0" netns="" Nov 1 00:41:29.403323 env[1737]: 2025-11-01 00:41:29.353 [INFO][5417] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:29.403323 env[1737]: 2025-11-01 00:41:29.353 [INFO][5417] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:29.403323 env[1737]: 2025-11-01 00:41:29.381 [INFO][5424] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" HandleID="k8s-pod-network.195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:29.403323 env[1737]: 2025-11-01 00:41:29.381 [INFO][5424] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:29.403323 env[1737]: 2025-11-01 00:41:29.381 [INFO][5424] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:29.403323 env[1737]: 2025-11-01 00:41:29.395 [WARNING][5424] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" HandleID="k8s-pod-network.195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:29.403323 env[1737]: 2025-11-01 00:41:29.395 [INFO][5424] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" HandleID="k8s-pod-network.195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Workload="ip--172--31--19--190-k8s-coredns--674b8bbfcf--4jl9s-eth0" Nov 1 00:41:29.403323 env[1737]: 2025-11-01 00:41:29.398 [INFO][5424] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:29.403323 env[1737]: 2025-11-01 00:41:29.400 [INFO][5417] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6" Nov 1 00:41:29.404144 env[1737]: time="2025-11-01T00:41:29.403366988Z" level=info msg="TearDown network for sandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\" successfully" Nov 1 00:41:29.412126 env[1737]: time="2025-11-01T00:41:29.411275619Z" level=info msg="RemovePodSandbox \"195943f4b68cbfd08316e411a4590ca72ab942d7e846ee263cdce7a2a3110ee6\" returns successfully" Nov 1 00:41:29.413095 env[1737]: time="2025-11-01T00:41:29.413007463Z" level=info msg="StopPodSandbox for \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\"" Nov 1 00:41:29.512265 env[1737]: 2025-11-01 00:41:29.465 [WARNING][5439] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0", GenerateName:"calico-apiserver-d49b764c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7", ResourceVersion:"1117", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49b764c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5", Pod:"calico-apiserver-d49b764c9-pnm8b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie44bb1af7d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:29.512265 env[1737]: 2025-11-01 00:41:29.465 [INFO][5439] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:29.512265 env[1737]: 2025-11-01 00:41:29.466 [INFO][5439] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" iface="eth0" netns="" Nov 1 00:41:29.512265 env[1737]: 2025-11-01 00:41:29.466 [INFO][5439] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:29.512265 env[1737]: 2025-11-01 00:41:29.466 [INFO][5439] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:29.512265 env[1737]: 2025-11-01 00:41:29.494 [INFO][5446] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" HandleID="k8s-pod-network.891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:29.512265 env[1737]: 2025-11-01 00:41:29.494 [INFO][5446] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:29.512265 env[1737]: 2025-11-01 00:41:29.494 [INFO][5446] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:29.512265 env[1737]: 2025-11-01 00:41:29.503 [WARNING][5446] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" HandleID="k8s-pod-network.891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:29.512265 env[1737]: 2025-11-01 00:41:29.504 [INFO][5446] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" HandleID="k8s-pod-network.891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:29.512265 env[1737]: 2025-11-01 00:41:29.507 [INFO][5446] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:29.512265 env[1737]: 2025-11-01 00:41:29.509 [INFO][5439] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:29.512851 env[1737]: time="2025-11-01T00:41:29.512310137Z" level=info msg="TearDown network for sandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\" successfully" Nov 1 00:41:29.512851 env[1737]: time="2025-11-01T00:41:29.512351097Z" level=info msg="StopPodSandbox for \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\" returns successfully" Nov 1 00:41:29.513643 env[1737]: time="2025-11-01T00:41:29.513595856Z" level=info msg="RemovePodSandbox for \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\"" Nov 1 00:41:29.513858 env[1737]: time="2025-11-01T00:41:29.513809732Z" level=info msg="Forcibly stopping sandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\"" Nov 1 00:41:29.617251 env[1737]: 2025-11-01 00:41:29.563 [WARNING][5460] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0", GenerateName:"calico-apiserver-d49b764c9-", Namespace:"calico-apiserver", SelfLink:"", UID:"a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7", ResourceVersion:"1117", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 0, 40, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d49b764c9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-19-190", ContainerID:"83b0d04c723f55292eab71d2dd66224e7ebb445b0e3551701a70be8039f791e5", Pod:"calico-apiserver-d49b764c9-pnm8b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.41.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie44bb1af7d5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 00:41:29.617251 env[1737]: 2025-11-01 00:41:29.563 [INFO][5460] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:29.617251 env[1737]: 2025-11-01 00:41:29.563 [INFO][5460] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" iface="eth0" netns="" Nov 1 00:41:29.617251 env[1737]: 2025-11-01 00:41:29.563 [INFO][5460] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:29.617251 env[1737]: 2025-11-01 00:41:29.563 [INFO][5460] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:29.617251 env[1737]: 2025-11-01 00:41:29.589 [INFO][5467] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" HandleID="k8s-pod-network.891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:29.617251 env[1737]: 2025-11-01 00:41:29.590 [INFO][5467] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 00:41:29.617251 env[1737]: 2025-11-01 00:41:29.590 [INFO][5467] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 00:41:29.617251 env[1737]: 2025-11-01 00:41:29.609 [WARNING][5467] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" HandleID="k8s-pod-network.891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:29.617251 env[1737]: 2025-11-01 00:41:29.609 [INFO][5467] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" HandleID="k8s-pod-network.891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Workload="ip--172--31--19--190-k8s-calico--apiserver--d49b764c9--pnm8b-eth0" Nov 1 00:41:29.617251 env[1737]: 2025-11-01 00:41:29.611 [INFO][5467] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 00:41:29.617251 env[1737]: 2025-11-01 00:41:29.614 [INFO][5460] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1" Nov 1 00:41:29.618094 env[1737]: time="2025-11-01T00:41:29.617286270Z" level=info msg="TearDown network for sandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\" successfully" Nov 1 00:41:29.624723 env[1737]: time="2025-11-01T00:41:29.624566302Z" level=info msg="RemovePodSandbox \"891dc54b5f87761a0f47b06bfaa6fdf7c4c413b7bed0745b63a1e2c8c74041c1\" returns successfully" Nov 1 00:41:30.497000 audit[5474]: NETFILTER_CFG table=filter:129 family=2 entries=14 op=nft_register_rule pid=5474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:30.497000 audit[5474]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc3477bf20 a2=0 a3=7ffc3477bf0c items=0 ppid=2837 pid=5474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:30.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:30.527000 audit[5474]: NETFILTER_CFG table=nat:130 family=2 entries=56 op=nft_register_chain pid=5474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:41:30.527000 audit[5474]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc3477bf20 a2=0 a3=7ffc3477bf0c items=0 ppid=2837 pid=5474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:30.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:41:30.954540 env[1737]: time="2025-11-01T00:41:30.954502201Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 00:41:31.198720 env[1737]: time="2025-11-01T00:41:31.198641970Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:31.201052 env[1737]: time="2025-11-01T00:41:31.200959828Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 00:41:31.201478 kubelet[2730]: E1101 00:41:31.201422 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:31.201966 kubelet[2730]: E1101 00:41:31.201495 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:31.202691 kubelet[2730]: E1101 00:41:31.202575 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9n5s4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d49b764c9-wpz62_calico-apiserver(8983267d-ef32-4d12-8dac-9ecb10367507): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:31.205133 kubelet[2730]: E1101 00:41:31.205014 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:41:33.951432 env[1737]: time="2025-11-01T00:41:33.949813938Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 00:41:34.106634 systemd[1]: Started sshd@9-172.31.19.190:22-147.75.109.163:59902.service. Nov 1 00:41:34.119034 kernel: kauditd_printk_skb: 7 callbacks suppressed Nov 1 00:41:34.119204 kernel: audit: type=1130 audit(1761957694.106:1399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.19.190:22-147.75.109.163:59902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:34.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.19.190:22-147.75.109.163:59902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:34.185392 env[1737]: time="2025-11-01T00:41:34.185090562Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:34.187811 env[1737]: time="2025-11-01T00:41:34.187310559Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 00:41:34.188078 kubelet[2730]: E1101 00:41:34.188023 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:34.188934 kubelet[2730]: E1101 00:41:34.188099 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:34.188934 kubelet[2730]: E1101 00:41:34.188455 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rtlwv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-bb8db9787-cmqlg_calico-apiserver(ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:34.189827 kubelet[2730]: E1101 00:41:34.189725 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" podUID="ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3" Nov 1 00:41:34.313000 audit[5488]: USER_ACCT pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.325793 sshd[5488]: Accepted publickey for core from 147.75.109.163 port 59902 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:41:34.326545 kernel: audit: type=1101 audit(1761957694.313:1400): pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.324000 audit[5488]: CRED_ACQ pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.326954 sshd[5488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:41:34.353488 kernel: audit: type=1103 audit(1761957694.324:1401): pid=5488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.353656 kernel: audit: type=1006 audit(1761957694.324:1402): pid=5488 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Nov 1 00:41:34.348652 systemd[1]: Started session-10.scope. Nov 1 00:41:34.349934 systemd-logind[1728]: New session 10 of user core. Nov 1 00:41:34.324000 audit[5488]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc87cf3cc0 a2=3 a3=0 items=0 ppid=1 pid=5488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:34.324000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:34.369219 kernel: audit: type=1300 audit(1761957694.324:1402): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc87cf3cc0 a2=3 a3=0 items=0 ppid=1 pid=5488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:34.369365 kernel: audit: type=1327 audit(1761957694.324:1402): proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:34.357000 audit[5488]: USER_START pid=5488 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.380518 kernel: audit: type=1105 audit(1761957694.357:1403): pid=5488 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.388635 kernel: audit: type=1103 audit(1761957694.364:1404): pid=5490 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.364000 audit[5490]: CRED_ACQ pid=5490 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.19.190:22-147.75.109.163:59916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:34.654025 systemd[1]: Started sshd@10-172.31.19.190:22-147.75.109.163:59916.service. Nov 1 00:41:34.664015 kernel: audit: type=1130 audit(1761957694.653:1405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.19.190:22-147.75.109.163:59916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:34.669554 sshd[5488]: pam_unix(sshd:session): session closed for user core Nov 1 00:41:34.673214 systemd[1]: sshd@9-172.31.19.190:22-147.75.109.163:59902.service: Deactivated successfully. Nov 1 00:41:34.670000 audit[5488]: USER_END pid=5488 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.674572 systemd[1]: session-10.scope: Deactivated successfully. Nov 1 00:41:34.677661 systemd-logind[1728]: Session 10 logged out. Waiting for processes to exit. Nov 1 00:41:34.679265 systemd-logind[1728]: Removed session 10. Nov 1 00:41:34.670000 audit[5488]: CRED_DISP pid=5488 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.687609 kernel: audit: type=1106 audit(1761957694.670:1406): pid=5488 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.19.190:22-147.75.109.163:59902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:34.822000 audit[5499]: USER_ACCT pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.823564 sshd[5499]: Accepted publickey for core from 147.75.109.163 port 59916 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:41:34.824000 audit[5499]: CRED_ACQ pid=5499 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.824000 audit[5499]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5cd01820 a2=3 a3=0 items=0 ppid=1 pid=5499 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:34.824000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:34.825593 sshd[5499]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:41:34.833444 systemd[1]: Started session-11.scope. Nov 1 00:41:34.834061 systemd-logind[1728]: New session 11 of user core. Nov 1 00:41:34.840000 audit[5499]: USER_START pid=5499 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:34.842000 audit[5502]: CRED_ACQ pid=5502 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:35.122363 sshd[5499]: pam_unix(sshd:session): session closed for user core Nov 1 00:41:35.124000 audit[5499]: USER_END pid=5499 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:35.124000 audit[5499]: CRED_DISP pid=5499 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:35.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.19.190:22-147.75.109.163:59916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:35.127565 systemd[1]: sshd@10-172.31.19.190:22-147.75.109.163:59916.service: Deactivated successfully. Nov 1 00:41:35.129684 systemd[1]: session-11.scope: Deactivated successfully. Nov 1 00:41:35.132620 systemd-logind[1728]: Session 11 logged out. Waiting for processes to exit. Nov 1 00:41:35.134484 systemd-logind[1728]: Removed session 11. Nov 1 00:41:35.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.19.190:22-147.75.109.163:59926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:35.155100 systemd[1]: Started sshd@11-172.31.19.190:22-147.75.109.163:59926.service. Nov 1 00:41:35.331000 audit[5510]: USER_ACCT pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:35.333058 sshd[5510]: Accepted publickey for core from 147.75.109.163 port 59926 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:41:35.333000 audit[5510]: CRED_ACQ pid=5510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:35.333000 audit[5510]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe91f80e50 a2=3 a3=0 items=0 ppid=1 pid=5510 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:35.333000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:35.335163 sshd[5510]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:41:35.342623 systemd[1]: Started session-12.scope. Nov 1 00:41:35.343536 systemd-logind[1728]: New session 12 of user core. Nov 1 00:41:35.349000 audit[5510]: USER_START pid=5510 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:35.351000 audit[5512]: CRED_ACQ pid=5512 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:35.597119 sshd[5510]: pam_unix(sshd:session): session closed for user core Nov 1 00:41:35.599000 audit[5510]: USER_END pid=5510 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:35.599000 audit[5510]: CRED_DISP pid=5510 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:35.602868 systemd[1]: sshd@11-172.31.19.190:22-147.75.109.163:59926.service: Deactivated successfully. Nov 1 00:41:35.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.19.190:22-147.75.109.163:59926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:35.604188 systemd[1]: session-12.scope: Deactivated successfully. Nov 1 00:41:35.604947 systemd-logind[1728]: Session 12 logged out. Waiting for processes to exit. Nov 1 00:41:35.606084 systemd-logind[1728]: Removed session 12. Nov 1 00:41:35.951488 env[1737]: time="2025-11-01T00:41:35.950987645Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Nov 1 00:41:36.209575 env[1737]: time="2025-11-01T00:41:36.209216537Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:36.211834 env[1737]: time="2025-11-01T00:41:36.211752198Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Nov 1 00:41:36.212119 kubelet[2730]: E1101 00:41:36.212075 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 00:41:36.212582 kubelet[2730]: E1101 00:41:36.212133 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 00:41:36.212582 kubelet[2730]: E1101 00:41:36.212462 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-sk4qc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-5bb8fbd4f8-rkzw4_calico-system(67349f38-7770-459e-9c5a-e728b49cc9e0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:36.213501 env[1737]: time="2025-11-01T00:41:36.213198937Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Nov 1 00:41:36.213728 kubelet[2730]: E1101 00:41:36.213689 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:41:36.460592 env[1737]: time="2025-11-01T00:41:36.460032937Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:36.462568 env[1737]: time="2025-11-01T00:41:36.462492910Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Nov 1 00:41:36.462911 kubelet[2730]: E1101 00:41:36.462807 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 00:41:36.462911 kubelet[2730]: E1101 00:41:36.462878 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 00:41:36.463930 kubelet[2730]: E1101 00:41:36.463649 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:51a637753dc8497c80682bb02487956c,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-wq5rt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c9fc5d7bc-cj29r_calico-system(ad238e2b-fbc2-4a12-80b4-cedf42c6dda0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:36.464874 env[1737]: time="2025-11-01T00:41:36.464835024Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:41:36.809764 env[1737]: time="2025-11-01T00:41:36.809628726Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:36.812208 env[1737]: time="2025-11-01T00:41:36.812125843Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:41:36.812496 kubelet[2730]: E1101 00:41:36.812445 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:41:36.812607 kubelet[2730]: E1101 00:41:36.812501 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:41:36.812852 kubelet[2730]: E1101 00:41:36.812794 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fb5cm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wrg9s_calico-system(666be2c8-6518-4217-90fd-5cf3423de279): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:36.814156 env[1737]: time="2025-11-01T00:41:36.814115935Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Nov 1 00:41:37.288920 env[1737]: time="2025-11-01T00:41:37.288834754Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:37.291252 env[1737]: time="2025-11-01T00:41:37.291156659Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Nov 1 00:41:37.291889 kubelet[2730]: E1101 00:41:37.291751 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 00:41:37.292475 kubelet[2730]: E1101 00:41:37.291887 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 00:41:37.292475 kubelet[2730]: E1101 00:41:37.292271 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-wq5rt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c9fc5d7bc-cj29r_calico-system(ad238e2b-fbc2-4a12-80b4-cedf42c6dda0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:37.293464 env[1737]: time="2025-11-01T00:41:37.293420818Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:41:37.294297 kubelet[2730]: E1101 00:41:37.294064 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-5c9fc5d7bc-cj29r" podUID="ad238e2b-fbc2-4a12-80b4-cedf42c6dda0" Nov 1 00:41:37.531593 env[1737]: time="2025-11-01T00:41:37.531503600Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:37.534780 env[1737]: time="2025-11-01T00:41:37.534337949Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:41:37.536518 kubelet[2730]: E1101 00:41:37.536331 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:41:37.536518 kubelet[2730]: E1101 00:41:37.536423 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:41:37.536955 kubelet[2730]: E1101 00:41:37.536897 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fb5cm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wrg9s_calico-system(666be2c8-6518-4217-90fd-5cf3423de279): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:37.538044 env[1737]: time="2025-11-01T00:41:37.537018755Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 00:41:37.554691 kubelet[2730]: E1101 00:41:37.538753 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:41:37.804628 env[1737]: time="2025-11-01T00:41:37.804318557Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:37.807367 env[1737]: time="2025-11-01T00:41:37.807194912Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 00:41:37.807661 kubelet[2730]: E1101 00:41:37.807510 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:37.807661 kubelet[2730]: E1101 00:41:37.807575 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:37.807837 kubelet[2730]: E1101 00:41:37.807774 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-gsczx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d49b764c9-pnm8b_calico-apiserver(a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:37.810635 kubelet[2730]: E1101 00:41:37.810484 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" podUID="a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7" Nov 1 00:41:38.950935 env[1737]: time="2025-11-01T00:41:38.950589685Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Nov 1 00:41:39.206044 env[1737]: time="2025-11-01T00:41:39.205797410Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:39.211092 env[1737]: time="2025-11-01T00:41:39.210884218Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Nov 1 00:41:39.211788 kubelet[2730]: E1101 00:41:39.211729 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 00:41:39.212336 kubelet[2730]: E1101 00:41:39.212306 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 00:41:39.212695 kubelet[2730]: E1101 00:41:39.212619 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-bm8z9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-4d2cg_calico-system(21d23048-45cc-482a-a891-7ca305e12df5): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:39.214777 kubelet[2730]: E1101 00:41:39.214704 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:41:40.639344 kernel: kauditd_printk_skb: 23 callbacks suppressed Nov 1 00:41:40.639562 kernel: audit: type=1130 audit(1761957700.628:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.19.190:22-147.75.109.163:57906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:40.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.19.190:22-147.75.109.163:57906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:40.627564 systemd[1]: Started sshd@12-172.31.19.190:22-147.75.109.163:57906.service. Nov 1 00:41:40.807000 audit[5526]: USER_ACCT pid=5526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:40.818288 sshd[5526]: Accepted publickey for core from 147.75.109.163 port 57906 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:41:40.829002 kernel: audit: type=1101 audit(1761957700.807:1427): pid=5526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:40.829234 kernel: audit: type=1103 audit(1761957700.817:1428): pid=5526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:40.817000 audit[5526]: CRED_ACQ pid=5526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:40.818792 sshd[5526]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:41:40.836116 kernel: audit: type=1006 audit(1761957700.817:1429): pid=5526 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Nov 1 00:41:40.817000 audit[5526]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe253b3a0 a2=3 a3=0 items=0 ppid=1 pid=5526 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:40.843116 systemd[1]: Started session-13.scope. Nov 1 00:41:40.845093 systemd-logind[1728]: New session 13 of user core. Nov 1 00:41:40.852395 kernel: audit: type=1300 audit(1761957700.817:1429): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe253b3a0 a2=3 a3=0 items=0 ppid=1 pid=5526 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:40.817000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:40.860015 kernel: audit: type=1327 audit(1761957700.817:1429): proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:40.853000 audit[5526]: USER_START pid=5526 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:40.855000 audit[5530]: CRED_ACQ pid=5530 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:40.879234 kernel: audit: type=1105 audit(1761957700.853:1430): pid=5526 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:40.879369 kernel: audit: type=1103 audit(1761957700.855:1431): pid=5530 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:41.098065 sshd[5526]: pam_unix(sshd:session): session closed for user core Nov 1 00:41:41.099000 audit[5526]: USER_END pid=5526 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:41.105405 systemd[1]: sshd@12-172.31.19.190:22-147.75.109.163:57906.service: Deactivated successfully. Nov 1 00:41:41.106696 systemd[1]: session-13.scope: Deactivated successfully. Nov 1 00:41:41.109526 systemd-logind[1728]: Session 13 logged out. Waiting for processes to exit. Nov 1 00:41:41.114181 kernel: audit: type=1106 audit(1761957701.099:1432): pid=5526 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:41.114292 kernel: audit: type=1104 audit(1761957701.099:1433): pid=5526 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:41.099000 audit[5526]: CRED_DISP pid=5526 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:41.110886 systemd-logind[1728]: Removed session 13. Nov 1 00:41:41.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.19.190:22-147.75.109.163:57906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:43.949380 kubelet[2730]: E1101 00:41:43.949313 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:41:44.952838 kubelet[2730]: E1101 00:41:44.952787 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" podUID="ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3" Nov 1 00:41:46.129882 systemd[1]: Started sshd@13-172.31.19.190:22-147.75.109.163:57908.service. Nov 1 00:41:46.142527 kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 1 00:41:46.142673 kernel: audit: type=1130 audit(1761957706.129:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.19.190:22-147.75.109.163:57908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:46.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.19.190:22-147.75.109.163:57908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:46.308000 audit[5546]: USER_ACCT pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:46.309666 sshd[5546]: Accepted publickey for core from 147.75.109.163 port 57908 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:41:46.321000 audit[5546]: CRED_ACQ pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:46.322388 sshd[5546]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:41:46.330727 kernel: audit: type=1101 audit(1761957706.308:1436): pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:46.330864 kernel: audit: type=1103 audit(1761957706.321:1437): pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:46.331572 kernel: audit: type=1006 audit(1761957706.321:1438): pid=5546 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Nov 1 00:41:46.321000 audit[5546]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffab530cd0 a2=3 a3=0 items=0 ppid=1 pid=5546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:46.321000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:46.353847 kernel: audit: type=1300 audit(1761957706.321:1438): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffab530cd0 a2=3 a3=0 items=0 ppid=1 pid=5546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:46.353960 kernel: audit: type=1327 audit(1761957706.321:1438): proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:46.353288 systemd[1]: Started session-14.scope. Nov 1 00:41:46.354319 systemd-logind[1728]: New session 14 of user core. Nov 1 00:41:46.369000 audit[5546]: USER_START pid=5546 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:46.388024 kernel: audit: type=1105 audit(1761957706.369:1439): pid=5546 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:46.380000 audit[5548]: CRED_ACQ pid=5548 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:46.401312 kernel: audit: type=1103 audit(1761957706.380:1440): pid=5548 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:46.426797 systemd[1]: run-containerd-runc-k8s.io-2ede1154112e786a1d1f6f1a5e7725b94e751435f5b7a2d5d08c5add20aacf8b-runc.RvLUy3.mount: Deactivated successfully. Nov 1 00:41:46.709790 sshd[5546]: pam_unix(sshd:session): session closed for user core Nov 1 00:41:46.714000 audit[5546]: USER_END pid=5546 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:46.721827 systemd[1]: sshd@13-172.31.19.190:22-147.75.109.163:57908.service: Deactivated successfully. Nov 1 00:41:46.724191 systemd[1]: session-14.scope: Deactivated successfully. Nov 1 00:41:46.727571 kernel: audit: type=1106 audit(1761957706.714:1441): pid=5546 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:46.727701 kernel: audit: type=1104 audit(1761957706.718:1442): pid=5546 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:46.718000 audit[5546]: CRED_DISP pid=5546 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:46.726767 systemd-logind[1728]: Session 14 logged out. Waiting for processes to exit. Nov 1 00:41:46.728760 systemd-logind[1728]: Removed session 14. Nov 1 00:41:46.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.19.190:22-147.75.109.163:57908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:48.960834 kubelet[2730]: E1101 00:41:48.957847 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:41:49.952473 kubelet[2730]: E1101 00:41:49.952411 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" podUID="a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7" Nov 1 00:41:49.953748 kubelet[2730]: E1101 00:41:49.953549 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:41:51.736911 systemd[1]: Started sshd@14-172.31.19.190:22-147.75.109.163:46592.service. Nov 1 00:41:51.747012 kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 1 00:41:51.747124 kernel: audit: type=1130 audit(1761957711.736:1444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.19.190:22-147.75.109.163:46592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:51.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.19.190:22-147.75.109.163:46592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:51.951619 kubelet[2730]: E1101 00:41:51.951118 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:41:51.953176 kubelet[2730]: E1101 00:41:51.953027 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-5c9fc5d7bc-cj29r" podUID="ad238e2b-fbc2-4a12-80b4-cedf42c6dda0" Nov 1 00:41:51.992000 audit[5580]: USER_ACCT pid=5580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:51.996569 sshd[5580]: Accepted publickey for core from 147.75.109.163 port 46592 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:41:52.005028 kernel: audit: type=1101 audit(1761957711.992:1445): pid=5580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:52.007181 sshd[5580]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:41:52.003000 audit[5580]: CRED_ACQ pid=5580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:52.017449 kernel: audit: type=1103 audit(1761957712.003:1446): pid=5580 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:52.017586 kernel: audit: type=1006 audit(1761957712.003:1447): pid=5580 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Nov 1 00:41:52.003000 audit[5580]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff73110350 a2=3 a3=0 items=0 ppid=1 pid=5580 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:52.037144 kernel: audit: type=1300 audit(1761957712.003:1447): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff73110350 a2=3 a3=0 items=0 ppid=1 pid=5580 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:52.003000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:52.042020 kernel: audit: type=1327 audit(1761957712.003:1447): proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:52.045235 systemd[1]: Started session-15.scope. Nov 1 00:41:52.045653 systemd-logind[1728]: New session 15 of user core. Nov 1 00:41:52.053000 audit[5580]: USER_START pid=5580 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:52.065006 kernel: audit: type=1105 audit(1761957712.053:1448): pid=5580 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:52.057000 audit[5583]: CRED_ACQ pid=5583 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:52.073093 kernel: audit: type=1103 audit(1761957712.057:1449): pid=5583 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:52.518303 sshd[5580]: pam_unix(sshd:session): session closed for user core Nov 1 00:41:52.519000 audit[5580]: USER_END pid=5580 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:52.526794 systemd-logind[1728]: Session 15 logged out. Waiting for processes to exit. Nov 1 00:41:52.529001 systemd[1]: sshd@14-172.31.19.190:22-147.75.109.163:46592.service: Deactivated successfully. Nov 1 00:41:52.530139 systemd[1]: session-15.scope: Deactivated successfully. Nov 1 00:41:52.532257 systemd-logind[1728]: Removed session 15. Nov 1 00:41:52.544014 kernel: audit: type=1106 audit(1761957712.519:1450): pid=5580 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:52.519000 audit[5580]: CRED_DISP pid=5580 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:52.560029 kernel: audit: type=1104 audit(1761957712.519:1451): pid=5580 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:52.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.19.190:22-147.75.109.163:46592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:56.950726 env[1737]: time="2025-11-01T00:41:56.950466553Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 00:41:57.211060 env[1737]: time="2025-11-01T00:41:57.210902615Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:57.213272 env[1737]: time="2025-11-01T00:41:57.213146536Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 00:41:57.214088 kubelet[2730]: E1101 00:41:57.213966 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:57.217553 kubelet[2730]: E1101 00:41:57.217479 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:57.218933 kubelet[2730]: E1101 00:41:57.218880 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9n5s4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d49b764c9-wpz62_calico-apiserver(8983267d-ef32-4d12-8dac-9ecb10367507): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:57.223359 kubelet[2730]: E1101 00:41:57.223296 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:41:57.549086 systemd[1]: Started sshd@15-172.31.19.190:22-147.75.109.163:46604.service. Nov 1 00:41:57.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.19.190:22-147.75.109.163:46604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:57.552133 kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 1 00:41:57.552210 kernel: audit: type=1130 audit(1761957717.548:1453): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.19.190:22-147.75.109.163:46604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:57.737000 audit[5593]: USER_ACCT pid=5593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:57.739085 sshd[5593]: Accepted publickey for core from 147.75.109.163 port 46604 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:41:57.747000 audit[5593]: CRED_ACQ pid=5593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:57.749657 sshd[5593]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:41:57.760548 kernel: audit: type=1101 audit(1761957717.737:1454): pid=5593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:57.760694 kernel: audit: type=1103 audit(1761957717.747:1455): pid=5593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:57.758052 systemd[1]: Started session-16.scope. Nov 1 00:41:57.759865 systemd-logind[1728]: New session 16 of user core. Nov 1 00:41:57.772072 kernel: audit: type=1006 audit(1761957717.748:1456): pid=5593 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Nov 1 00:41:57.772813 kernel: audit: type=1300 audit(1761957717.748:1456): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd28f23a00 a2=3 a3=0 items=0 ppid=1 pid=5593 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:57.748000 audit[5593]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd28f23a00 a2=3 a3=0 items=0 ppid=1 pid=5593 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:57.748000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:57.781429 kernel: audit: type=1327 audit(1761957717.748:1456): proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:57.781596 kernel: audit: type=1105 audit(1761957717.767:1457): pid=5593 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:57.767000 audit[5593]: USER_START pid=5593 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:57.770000 audit[5595]: CRED_ACQ pid=5595 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:57.796477 kernel: audit: type=1103 audit(1761957717.770:1458): pid=5595 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:58.031208 sshd[5593]: pam_unix(sshd:session): session closed for user core Nov 1 00:41:58.033000 audit[5593]: USER_END pid=5593 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:58.033000 audit[5593]: CRED_DISP pid=5593 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:58.052266 systemd-logind[1728]: Session 16 logged out. Waiting for processes to exit. Nov 1 00:41:58.059077 kernel: audit: type=1106 audit(1761957718.033:1459): pid=5593 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:58.059208 kernel: audit: type=1104 audit(1761957718.033:1460): pid=5593 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:58.062447 systemd[1]: Started sshd@16-172.31.19.190:22-147.75.109.163:46616.service. Nov 1 00:41:58.063879 systemd[1]: sshd@15-172.31.19.190:22-147.75.109.163:46604.service: Deactivated successfully. Nov 1 00:41:58.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.19.190:22-147.75.109.163:46616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:58.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.19.190:22-147.75.109.163:46604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:58.067486 systemd[1]: session-16.scope: Deactivated successfully. Nov 1 00:41:58.069059 systemd-logind[1728]: Removed session 16. Nov 1 00:41:58.234498 sshd[5604]: Accepted publickey for core from 147.75.109.163 port 46616 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:41:58.233000 audit[5604]: USER_ACCT pid=5604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:58.235000 audit[5604]: CRED_ACQ pid=5604 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:58.235000 audit[5604]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd761c6e50 a2=3 a3=0 items=0 ppid=1 pid=5604 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:58.235000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:58.236880 sshd[5604]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:41:58.244121 systemd-logind[1728]: New session 17 of user core. Nov 1 00:41:58.245417 systemd[1]: Started session-17.scope. Nov 1 00:41:58.251000 audit[5604]: USER_START pid=5604 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:58.253000 audit[5607]: CRED_ACQ pid=5607 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:58.956142 env[1737]: time="2025-11-01T00:41:58.955829299Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 00:41:59.042391 sshd[5604]: pam_unix(sshd:session): session closed for user core Nov 1 00:41:59.046000 audit[5604]: USER_END pid=5604 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:59.047000 audit[5604]: CRED_DISP pid=5604 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:59.051009 systemd-logind[1728]: Session 17 logged out. Waiting for processes to exit. Nov 1 00:41:59.052316 systemd[1]: sshd@16-172.31.19.190:22-147.75.109.163:46616.service: Deactivated successfully. Nov 1 00:41:59.053479 systemd[1]: session-17.scope: Deactivated successfully. Nov 1 00:41:59.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.19.190:22-147.75.109.163:46616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:59.055714 systemd-logind[1728]: Removed session 17. Nov 1 00:41:59.068444 systemd[1]: Started sshd@17-172.31.19.190:22-147.75.109.163:46624.service. Nov 1 00:41:59.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.19.190:22-147.75.109.163:46624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:41:59.204183 env[1737]: time="2025-11-01T00:41:59.204010960Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:41:59.206229 env[1737]: time="2025-11-01T00:41:59.206090990Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 00:41:59.211597 kubelet[2730]: E1101 00:41:59.211535 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:59.212117 kubelet[2730]: E1101 00:41:59.212069 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:41:59.216726 kubelet[2730]: E1101 00:41:59.216640 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rtlwv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-bb8db9787-cmqlg_calico-apiserver(ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 00:41:59.218866 kubelet[2730]: E1101 00:41:59.218735 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" podUID="ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3" Nov 1 00:41:59.274000 audit[5615]: USER_ACCT pid=5615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:59.276236 sshd[5615]: Accepted publickey for core from 147.75.109.163 port 46624 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:41:59.277000 audit[5615]: CRED_ACQ pid=5615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:59.277000 audit[5615]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5f7c0d00 a2=3 a3=0 items=0 ppid=1 pid=5615 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:41:59.277000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:41:59.280211 sshd[5615]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:41:59.288635 systemd[1]: Started session-18.scope. Nov 1 00:41:59.289445 systemd-logind[1728]: New session 18 of user core. Nov 1 00:41:59.295000 audit[5615]: USER_START pid=5615 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:41:59.297000 audit[5617]: CRED_ACQ pid=5617 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:00.279000 audit[5630]: NETFILTER_CFG table=filter:131 family=2 entries=26 op=nft_register_rule pid=5630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:42:00.281000 audit[5615]: USER_END pid=5615 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:00.282000 audit[5615]: CRED_DISP pid=5615 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:00.281571 sshd[5615]: pam_unix(sshd:session): session closed for user core Nov 1 00:42:00.279000 audit[5630]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffc68905580 a2=0 a3=7ffc6890556c items=0 ppid=2837 pid=5630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:00.279000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:42:00.286000 audit[5630]: NETFILTER_CFG table=nat:132 family=2 entries=20 op=nft_register_rule pid=5630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:42:00.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.19.190:22-147.75.109.163:46624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:00.286000 audit[5630]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc68905580 a2=0 a3=0 items=0 ppid=2837 pid=5630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:00.286000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:42:00.287644 systemd[1]: sshd@17-172.31.19.190:22-147.75.109.163:46624.service: Deactivated successfully. Nov 1 00:42:00.290142 systemd[1]: session-18.scope: Deactivated successfully. Nov 1 00:42:00.292263 systemd-logind[1728]: Session 18 logged out. Waiting for processes to exit. Nov 1 00:42:00.294804 systemd-logind[1728]: Removed session 18. Nov 1 00:42:00.310410 systemd[1]: Started sshd@18-172.31.19.190:22-147.75.109.163:33118.service. Nov 1 00:42:00.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.19.190:22-147.75.109.163:33118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:00.323000 audit[5635]: NETFILTER_CFG table=filter:133 family=2 entries=38 op=nft_register_rule pid=5635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:42:00.323000 audit[5635]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffd9f51ea40 a2=0 a3=7ffd9f51ea2c items=0 ppid=2837 pid=5635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:00.323000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:42:00.329000 audit[5635]: NETFILTER_CFG table=nat:134 family=2 entries=20 op=nft_register_rule pid=5635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:42:00.329000 audit[5635]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd9f51ea40 a2=0 a3=0 items=0 ppid=2837 pid=5635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:00.329000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:42:00.483590 sshd[5634]: Accepted publickey for core from 147.75.109.163 port 33118 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:42:00.482000 audit[5634]: USER_ACCT pid=5634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:00.484000 audit[5634]: CRED_ACQ pid=5634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:00.484000 audit[5634]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7a0c0c00 a2=3 a3=0 items=0 ppid=1 pid=5634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:00.484000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:42:00.485750 sshd[5634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:42:00.491957 systemd[1]: Started session-19.scope. Nov 1 00:42:00.492500 systemd-logind[1728]: New session 19 of user core. Nov 1 00:42:00.497000 audit[5634]: USER_START pid=5634 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:00.500000 audit[5637]: CRED_ACQ pid=5637 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:00.971225 env[1737]: time="2025-11-01T00:42:00.971165359Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Nov 1 00:42:01.222229 env[1737]: time="2025-11-01T00:42:01.221888081Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:01.224525 env[1737]: time="2025-11-01T00:42:01.224338211Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Nov 1 00:42:01.231731 kubelet[2730]: E1101 00:42:01.230636 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 00:42:01.232418 kubelet[2730]: E1101 00:42:01.232381 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 00:42:01.232780 kubelet[2730]: E1101 00:42:01.232713 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-sk4qc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-5bb8fbd4f8-rkzw4_calico-system(67349f38-7770-459e-9c5a-e728b49cc9e0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:01.256983 kubelet[2730]: E1101 00:42:01.256893 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:42:01.418429 sshd[5634]: pam_unix(sshd:session): session closed for user core Nov 1 00:42:01.424000 audit[5634]: USER_END pid=5634 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:01.424000 audit[5634]: CRED_DISP pid=5634 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:01.459225 systemd[1]: sshd@18-172.31.19.190:22-147.75.109.163:33118.service: Deactivated successfully. Nov 1 00:42:01.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.19.190:22-147.75.109.163:33118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:01.465196 systemd[1]: session-19.scope: Deactivated successfully. Nov 1 00:42:01.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.19.190:22-147.75.109.163:33132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:01.481571 systemd[1]: Started sshd@19-172.31.19.190:22-147.75.109.163:33132.service. Nov 1 00:42:01.483415 systemd-logind[1728]: Session 19 logged out. Waiting for processes to exit. Nov 1 00:42:01.487916 systemd-logind[1728]: Removed session 19. Nov 1 00:42:01.747000 audit[5653]: USER_ACCT pid=5653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:01.757080 sshd[5653]: Accepted publickey for core from 147.75.109.163 port 33132 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:42:01.766000 audit[5653]: CRED_ACQ pid=5653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:01.766000 audit[5653]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0ae86f30 a2=3 a3=0 items=0 ppid=1 pid=5653 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:01.766000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:42:01.768107 sshd[5653]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:42:01.793853 systemd[1]: Started session-20.scope. Nov 1 00:42:01.795136 systemd-logind[1728]: New session 20 of user core. Nov 1 00:42:01.807000 audit[5653]: USER_START pid=5653 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:01.809000 audit[5655]: CRED_ACQ pid=5655 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:02.130323 sshd[5653]: pam_unix(sshd:session): session closed for user core Nov 1 00:42:02.143000 audit[5653]: USER_END pid=5653 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:02.147000 audit[5653]: CRED_DISP pid=5653 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:02.165878 systemd-logind[1728]: Session 20 logged out. Waiting for processes to exit. Nov 1 00:42:02.166932 systemd[1]: sshd@19-172.31.19.190:22-147.75.109.163:33132.service: Deactivated successfully. Nov 1 00:42:02.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.19.190:22-147.75.109.163:33132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:02.170149 systemd[1]: session-20.scope: Deactivated successfully. Nov 1 00:42:02.178128 systemd-logind[1728]: Removed session 20. Nov 1 00:42:02.968157 env[1737]: time="2025-11-01T00:42:02.968103146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 00:42:03.240132 env[1737]: time="2025-11-01T00:42:03.239780717Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:03.241995 env[1737]: time="2025-11-01T00:42:03.241794032Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 00:42:03.242247 kubelet[2730]: E1101 00:42:03.242193 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:42:03.242664 kubelet[2730]: E1101 00:42:03.242273 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:42:03.242664 kubelet[2730]: E1101 00:42:03.242529 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-gsczx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d49b764c9-pnm8b_calico-apiserver(a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:03.245845 kubelet[2730]: E1101 00:42:03.245771 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" podUID="a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7" Nov 1 00:42:03.949567 env[1737]: time="2025-11-01T00:42:03.949524351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Nov 1 00:42:04.196104 env[1737]: time="2025-11-01T00:42:04.196049504Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:04.198099 env[1737]: time="2025-11-01T00:42:04.198030181Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Nov 1 00:42:04.198483 kubelet[2730]: E1101 00:42:04.198423 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 00:42:04.198483 kubelet[2730]: E1101 00:42:04.198485 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 00:42:04.198845 env[1737]: time="2025-11-01T00:42:04.198817154Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:42:04.199077 kubelet[2730]: E1101 00:42:04.199004 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-bm8z9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-4d2cg_calico-system(21d23048-45cc-482a-a891-7ca305e12df5): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:04.201356 kubelet[2730]: E1101 00:42:04.200956 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:42:04.452583 env[1737]: time="2025-11-01T00:42:04.452165419Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:04.455765 env[1737]: time="2025-11-01T00:42:04.455615772Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:42:04.456011 kubelet[2730]: E1101 00:42:04.455929 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:42:04.456449 kubelet[2730]: E1101 00:42:04.456028 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:42:04.456449 kubelet[2730]: E1101 00:42:04.456211 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fb5cm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wrg9s_calico-system(666be2c8-6518-4217-90fd-5cf3423de279): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:04.459842 env[1737]: time="2025-11-01T00:42:04.459467418Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:42:04.710163 env[1737]: time="2025-11-01T00:42:04.709958470Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:04.712885 env[1737]: time="2025-11-01T00:42:04.712728412Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:42:04.713190 kubelet[2730]: E1101 00:42:04.713113 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:42:04.713190 kubelet[2730]: E1101 00:42:04.713176 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:42:04.713488 kubelet[2730]: E1101 00:42:04.713434 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fb5cm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wrg9s_calico-system(666be2c8-6518-4217-90fd-5cf3423de279): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:04.716075 kubelet[2730]: E1101 00:42:04.716003 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:42:04.953950 env[1737]: time="2025-11-01T00:42:04.953900919Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Nov 1 00:42:05.194227 env[1737]: time="2025-11-01T00:42:05.194148202Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:05.196586 env[1737]: time="2025-11-01T00:42:05.196488279Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Nov 1 00:42:05.197592 kubelet[2730]: E1101 00:42:05.196833 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 00:42:05.197592 kubelet[2730]: E1101 00:42:05.196920 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 00:42:05.197592 kubelet[2730]: E1101 00:42:05.197235 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:51a637753dc8497c80682bb02487956c,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-wq5rt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c9fc5d7bc-cj29r_calico-system(ad238e2b-fbc2-4a12-80b4-cedf42c6dda0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:05.199656 env[1737]: time="2025-11-01T00:42:05.199607257Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Nov 1 00:42:05.465031 env[1737]: time="2025-11-01T00:42:05.464869598Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:05.467701 env[1737]: time="2025-11-01T00:42:05.467616952Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Nov 1 00:42:05.468752 kubelet[2730]: E1101 00:42:05.468688 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 00:42:05.469218 kubelet[2730]: E1101 00:42:05.468769 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 00:42:05.469218 kubelet[2730]: E1101 00:42:05.468988 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-wq5rt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c9fc5d7bc-cj29r_calico-system(ad238e2b-fbc2-4a12-80b4-cedf42c6dda0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:05.470777 kubelet[2730]: E1101 00:42:05.470696 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-5c9fc5d7bc-cj29r" podUID="ad238e2b-fbc2-4a12-80b4-cedf42c6dda0" Nov 1 00:42:07.176556 kernel: kauditd_printk_skb: 57 callbacks suppressed Nov 1 00:42:07.176726 kernel: audit: type=1130 audit(1761957727.160:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.19.190:22-147.75.109.163:33148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:07.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.19.190:22-147.75.109.163:33148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:07.160504 systemd[1]: Started sshd@20-172.31.19.190:22-147.75.109.163:33148.service. Nov 1 00:42:07.331000 audit[5666]: USER_ACCT pid=5666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:07.342674 sshd[5666]: Accepted publickey for core from 147.75.109.163 port 33148 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:42:07.343093 kernel: audit: type=1101 audit(1761957727.331:1503): pid=5666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:07.352033 kernel: audit: type=1103 audit(1761957727.341:1504): pid=5666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:07.341000 audit[5666]: CRED_ACQ pid=5666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:07.343356 sshd[5666]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:42:07.358004 kernel: audit: type=1006 audit(1761957727.341:1505): pid=5666 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Nov 1 00:42:07.341000 audit[5666]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3b8490d0 a2=3 a3=0 items=0 ppid=1 pid=5666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:07.371036 kernel: audit: type=1300 audit(1761957727.341:1505): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3b8490d0 a2=3 a3=0 items=0 ppid=1 pid=5666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:07.371192 kernel: audit: type=1327 audit(1761957727.341:1505): proctitle=737368643A20636F7265205B707269765D Nov 1 00:42:07.341000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:42:07.371200 systemd[1]: Started session-21.scope. Nov 1 00:42:07.372052 systemd-logind[1728]: New session 21 of user core. Nov 1 00:42:07.379000 audit[5666]: USER_START pid=5666 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:07.393101 kernel: audit: type=1105 audit(1761957727.379:1506): pid=5666 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:07.392000 audit[5668]: CRED_ACQ pid=5668 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:07.401085 kernel: audit: type=1103 audit(1761957727.392:1507): pid=5668 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:07.714547 sshd[5666]: pam_unix(sshd:session): session closed for user core Nov 1 00:42:07.716000 audit[5666]: USER_END pid=5666 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:07.721673 systemd[1]: sshd@20-172.31.19.190:22-147.75.109.163:33148.service: Deactivated successfully. Nov 1 00:42:07.723364 systemd[1]: session-21.scope: Deactivated successfully. Nov 1 00:42:07.727003 systemd-logind[1728]: Session 21 logged out. Waiting for processes to exit. Nov 1 00:42:07.729020 systemd-logind[1728]: Removed session 21. Nov 1 00:42:07.716000 audit[5666]: CRED_DISP pid=5666 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:07.739429 kernel: audit: type=1106 audit(1761957727.716:1508): pid=5666 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:07.739588 kernel: audit: type=1104 audit(1761957727.716:1509): pid=5666 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:07.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.19.190:22-147.75.109.163:33148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:09.370000 audit[5677]: NETFILTER_CFG table=filter:135 family=2 entries=26 op=nft_register_rule pid=5677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:42:09.370000 audit[5677]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff02d89500 a2=0 a3=7fff02d894ec items=0 ppid=2837 pid=5677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:09.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:42:09.391000 audit[5677]: NETFILTER_CFG table=nat:136 family=2 entries=104 op=nft_register_chain pid=5677 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 00:42:09.391000 audit[5677]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7fff02d89500 a2=0 a3=7fff02d894ec items=0 ppid=2837 pid=5677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:09.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 00:42:09.949734 kubelet[2730]: E1101 00:42:09.949686 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:42:11.950185 kubelet[2730]: E1101 00:42:11.950132 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" podUID="ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3" Nov 1 00:42:12.747799 systemd[1]: Started sshd@21-172.31.19.190:22-147.75.109.163:56536.service. Nov 1 00:42:12.760031 kernel: kauditd_printk_skb: 7 callbacks suppressed Nov 1 00:42:12.760188 kernel: audit: type=1130 audit(1761957732.747:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.19.190:22-147.75.109.163:56536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:12.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.19.190:22-147.75.109.163:56536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:12.916285 sshd[5679]: Accepted publickey for core from 147.75.109.163 port 56536 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:42:12.928018 kernel: audit: type=1101 audit(1761957732.915:1514): pid=5679 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:12.915000 audit[5679]: USER_ACCT pid=5679 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:12.916000 audit[5679]: CRED_ACQ pid=5679 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:12.928467 sshd[5679]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:42:12.937199 kernel: audit: type=1103 audit(1761957732.916:1515): pid=5679 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:12.943188 kernel: audit: type=1006 audit(1761957732.916:1516): pid=5679 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Nov 1 00:42:12.916000 audit[5679]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1fbc13e0 a2=3 a3=0 items=0 ppid=1 pid=5679 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:12.955726 kernel: audit: type=1300 audit(1761957732.916:1516): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1fbc13e0 a2=3 a3=0 items=0 ppid=1 pid=5679 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:12.957772 systemd[1]: Started session-22.scope. Nov 1 00:42:12.958449 systemd-logind[1728]: New session 22 of user core. Nov 1 00:42:12.960482 kubelet[2730]: E1101 00:42:12.959988 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:42:12.916000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:42:12.966097 kernel: audit: type=1327 audit(1761957732.916:1516): proctitle=737368643A20636F7265205B707269765D Nov 1 00:42:12.972000 audit[5679]: USER_START pid=5679 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:12.984016 kernel: audit: type=1105 audit(1761957732.972:1517): pid=5679 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:12.984000 audit[5681]: CRED_ACQ pid=5681 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:12.996010 kernel: audit: type=1103 audit(1761957732.984:1518): pid=5681 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:13.228290 sshd[5679]: pam_unix(sshd:session): session closed for user core Nov 1 00:42:13.229000 audit[5679]: USER_END pid=5679 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:13.233652 systemd[1]: sshd@21-172.31.19.190:22-147.75.109.163:56536.service: Deactivated successfully. Nov 1 00:42:13.234901 systemd[1]: session-22.scope: Deactivated successfully. Nov 1 00:42:13.238171 systemd-logind[1728]: Session 22 logged out. Waiting for processes to exit. Nov 1 00:42:13.239810 systemd-logind[1728]: Removed session 22. Nov 1 00:42:13.242012 kernel: audit: type=1106 audit(1761957733.229:1519): pid=5679 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:13.242158 kernel: audit: type=1104 audit(1761957733.229:1520): pid=5679 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:13.229000 audit[5679]: CRED_DISP pid=5679 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:13.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.19.190:22-147.75.109.163:56536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:15.949389 kubelet[2730]: E1101 00:42:15.949341 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" podUID="a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7" Nov 1 00:42:15.951252 kubelet[2730]: E1101 00:42:15.951197 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:42:16.418856 systemd[1]: run-containerd-runc-k8s.io-2ede1154112e786a1d1f6f1a5e7725b94e751435f5b7a2d5d08c5add20aacf8b-runc.6rGuwg.mount: Deactivated successfully. Nov 1 00:42:17.950287 kubelet[2730]: E1101 00:42:17.950234 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:42:17.951585 kubelet[2730]: E1101 00:42:17.951523 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-5c9fc5d7bc-cj29r" podUID="ad238e2b-fbc2-4a12-80b4-cedf42c6dda0" Nov 1 00:42:17.969000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:17.975203 kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 1 00:42:17.975358 kernel: audit: type=1400 audit(1761957737.969:1522): avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:17.969000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00043fc00 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:17.969000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:18.008638 kernel: audit: type=1300 audit(1761957737.969:1522): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00043fc00 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:18.008819 kernel: audit: type=1327 audit(1761957737.969:1522): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:17.981000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:18.019279 kernel: audit: type=1400 audit(1761957737.981:1523): avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:17.981000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ce7d10 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:18.031559 kernel: audit: type=1300 audit(1761957737.981:1523): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ce7d10 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:17.981000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:18.042498 kernel: audit: type=1327 audit(1761957737.981:1523): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:18.258548 systemd[1]: Started sshd@22-172.31.19.190:22-147.75.109.163:56540.service. Nov 1 00:42:18.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.19.190:22-147.75.109.163:56540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:18.270017 kernel: audit: type=1130 audit(1761957738.260:1524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.19.190:22-147.75.109.163:56540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:18.505220 sshd[5712]: Accepted publickey for core from 147.75.109.163 port 56540 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:42:18.502000 audit[5712]: USER_ACCT pid=5712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:18.504000 audit[5712]: CRED_ACQ pid=5712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:18.528383 kernel: audit: type=1101 audit(1761957738.502:1525): pid=5712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:18.528560 kernel: audit: type=1103 audit(1761957738.504:1526): pid=5712 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:18.528988 kernel: audit: type=1006 audit(1761957738.504:1527): pid=5712 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Nov 1 00:42:18.536249 sshd[5712]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:42:18.504000 audit[5712]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc04efb930 a2=3 a3=0 items=0 ppid=1 pid=5712 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:18.504000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:42:18.545010 systemd-logind[1728]: New session 23 of user core. Nov 1 00:42:18.545964 systemd[1]: Started session-23.scope. Nov 1 00:42:18.564000 audit[5712]: USER_START pid=5712 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:18.567000 audit[5714]: CRED_ACQ pid=5714 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:19.070765 sshd[5712]: pam_unix(sshd:session): session closed for user core Nov 1 00:42:19.071000 audit[5712]: USER_END pid=5712 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:19.073000 audit[5712]: CRED_DISP pid=5712 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:19.077491 systemd-logind[1728]: Session 23 logged out. Waiting for processes to exit. Nov 1 00:42:19.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.19.190:22-147.75.109.163:56540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:19.079608 systemd[1]: sshd@22-172.31.19.190:22-147.75.109.163:56540.service: Deactivated successfully. Nov 1 00:42:19.080817 systemd[1]: session-23.scope: Deactivated successfully. Nov 1 00:42:19.083049 systemd-logind[1728]: Removed session 23. Nov 1 00:42:20.427000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:20.427000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:20.427000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c0147e0960 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:42:20.427000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:42:20.428000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=524014 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:20.428000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c00fe1e5a0 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:42:20.428000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:42:20.427000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c00ff246f0 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:42:20.427000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:42:20.428000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=524008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:20.428000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c00ff24750 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:42:20.428000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:42:20.437000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:20.437000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c00fe1e660 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:42:20.437000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:42:20.438000 audit[2465]: AVC avc: denied { watch } for pid=2465 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:20.438000 audit[2465]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0147e0ae0 a2=fc6 a3=0 items=0 ppid=2321 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c748 key=(null) Nov 1 00:42:20.438000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31392E313930002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 00:42:22.954718 kubelet[2730]: E1101 00:42:22.954669 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:42:23.268638 kernel: kauditd_printk_skb: 25 callbacks suppressed Nov 1 00:42:23.268934 kernel: audit: type=1400 audit(1761957743.255:1539): avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:23.255000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:23.256000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:23.286011 kernel: audit: type=1400 audit(1761957743.256:1540): avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:23.256000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000077fa0 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:23.303005 kernel: audit: type=1300 audit(1761957743.256:1540): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000077fa0 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:23.256000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:23.321008 kernel: audit: type=1327 audit(1761957743.256:1540): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:23.255000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000374060 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:23.337012 kernel: audit: type=1300 audit(1761957743.255:1539): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000374060 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:23.255000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:23.352008 kernel: audit: type=1327 audit(1761957743.255:1539): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:23.302000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:23.365004 kernel: audit: type=1400 audit(1761957743.302:1541): avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:23.302000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007e21c0 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:23.381005 kernel: audit: type=1300 audit(1761957743.302:1541): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007e21c0 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:23.302000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:23.302000 audit[2497]: AVC avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:23.405447 kernel: audit: type=1327 audit(1761957743.302:1541): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:23.405629 kernel: audit: type=1400 audit(1761957743.302:1542): avc: denied { watch } for pid=2497 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:23.302000 audit[2497]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007e2200 a2=fc6 a3=0 items=0 ppid=2356 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:23.302000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:24.099636 systemd[1]: Started sshd@23-172.31.19.190:22-147.75.109.163:32796.service. Nov 1 00:42:24.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.19.190:22-147.75.109.163:32796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:24.294000 audit[5724]: USER_ACCT pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:24.297642 sshd[5724]: Accepted publickey for core from 147.75.109.163 port 32796 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:42:24.297000 audit[5724]: CRED_ACQ pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:24.297000 audit[5724]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6d047820 a2=3 a3=0 items=0 ppid=1 pid=5724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:24.297000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:42:24.332188 sshd[5724]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:42:24.340869 systemd[1]: Started session-24.scope. Nov 1 00:42:24.342856 systemd-logind[1728]: New session 24 of user core. Nov 1 00:42:24.351000 audit[5724]: USER_START pid=5724 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:24.353000 audit[5726]: CRED_ACQ pid=5726 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:24.760157 sshd[5724]: pam_unix(sshd:session): session closed for user core Nov 1 00:42:24.760000 audit[5724]: USER_END pid=5724 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:24.761000 audit[5724]: CRED_DISP pid=5724 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:24.765051 systemd-logind[1728]: Session 24 logged out. Waiting for processes to exit. Nov 1 00:42:24.766445 systemd[1]: sshd@23-172.31.19.190:22-147.75.109.163:32796.service: Deactivated successfully. Nov 1 00:42:24.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.19.190:22-147.75.109.163:32796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:24.767621 systemd[1]: session-24.scope: Deactivated successfully. Nov 1 00:42:24.769545 systemd-logind[1728]: Removed session 24. Nov 1 00:42:25.952236 kubelet[2730]: E1101 00:42:25.952173 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:42:25.952766 kubelet[2730]: E1101 00:42:25.952297 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" podUID="ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3" Nov 1 00:42:28.954917 kubelet[2730]: E1101 00:42:28.954801 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-5c9fc5d7bc-cj29r" podUID="ad238e2b-fbc2-4a12-80b4-cedf42c6dda0" Nov 1 00:42:29.791034 systemd[1]: Started sshd@24-172.31.19.190:22-147.75.109.163:32798.service. Nov 1 00:42:29.805532 kernel: kauditd_printk_skb: 13 callbacks suppressed Nov 1 00:42:29.806129 kernel: audit: type=1130 audit(1761957749.792:1552): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.19.190:22-147.75.109.163:32798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:29.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.19.190:22-147.75.109.163:32798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:29.951800 kubelet[2730]: E1101 00:42:29.951749 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:42:29.952948 kubelet[2730]: E1101 00:42:29.952886 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:42:29.953345 kubelet[2730]: E1101 00:42:29.953294 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" podUID="a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7" Nov 1 00:42:29.998000 audit[5737]: USER_ACCT pid=5737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:30.009499 sshd[5737]: Accepted publickey for core from 147.75.109.163 port 32798 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:42:30.010430 kernel: audit: type=1101 audit(1761957749.998:1553): pid=5737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:30.010476 sshd[5737]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:42:30.008000 audit[5737]: CRED_ACQ pid=5737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:30.024082 kernel: audit: type=1103 audit(1761957750.008:1554): pid=5737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:30.035321 kernel: audit: type=1006 audit(1761957750.008:1555): pid=5737 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Nov 1 00:42:30.029599 systemd[1]: Started session-25.scope. Nov 1 00:42:30.034650 systemd-logind[1728]: New session 25 of user core. Nov 1 00:42:30.049351 kernel: audit: type=1300 audit(1761957750.008:1555): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc62ed5fb0 a2=3 a3=0 items=0 ppid=1 pid=5737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:30.008000 audit[5737]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc62ed5fb0 a2=3 a3=0 items=0 ppid=1 pid=5737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:30.008000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:42:30.062002 kernel: audit: type=1327 audit(1761957750.008:1555): proctitle=737368643A20636F7265205B707269765D Nov 1 00:42:30.043000 audit[5737]: USER_START pid=5737 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:30.074004 kernel: audit: type=1105 audit(1761957750.043:1556): pid=5737 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:30.047000 audit[5739]: CRED_ACQ pid=5739 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:30.083004 kernel: audit: type=1103 audit(1761957750.047:1557): pid=5739 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:30.397305 sshd[5737]: pam_unix(sshd:session): session closed for user core Nov 1 00:42:30.397000 audit[5737]: USER_END pid=5737 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:30.402422 systemd[1]: sshd@24-172.31.19.190:22-147.75.109.163:32798.service: Deactivated successfully. Nov 1 00:42:30.403770 systemd[1]: session-25.scope: Deactivated successfully. Nov 1 00:42:30.412886 systemd-logind[1728]: Session 25 logged out. Waiting for processes to exit. Nov 1 00:42:30.413135 kernel: audit: type=1106 audit(1761957750.397:1558): pid=5737 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:30.398000 audit[5737]: CRED_DISP pid=5737 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:30.420733 systemd-logind[1728]: Removed session 25. Nov 1 00:42:30.422011 kernel: audit: type=1104 audit(1761957750.398:1559): pid=5737 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:30.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.19.190:22-147.75.109.163:32798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:35.426478 systemd[1]: Started sshd@25-172.31.19.190:22-147.75.109.163:43330.service. Nov 1 00:42:35.431488 kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 1 00:42:35.431803 kernel: audit: type=1130 audit(1761957755.426:1561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.19.190:22-147.75.109.163:43330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:35.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.19.190:22-147.75.109.163:43330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:35.666000 audit[5752]: USER_ACCT pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:35.668345 sshd[5752]: Accepted publickey for core from 147.75.109.163 port 43330 ssh2: RSA SHA256:pqbS4gO8wU1hfumMiqbicBJuOTPdWzHbSvYVadSA6Zw Nov 1 00:42:35.679007 kernel: audit: type=1101 audit(1761957755.666:1562): pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:35.681399 sshd[5752]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 00:42:35.693000 kernel: audit: type=1103 audit(1761957755.678:1563): pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:35.678000 audit[5752]: CRED_ACQ pid=5752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:35.701234 systemd-logind[1728]: New session 26 of user core. Nov 1 00:42:35.702021 systemd[1]: Started session-26.scope. Nov 1 00:42:35.709168 kernel: audit: type=1006 audit(1761957755.678:1564): pid=5752 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Nov 1 00:42:35.678000 audit[5752]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6bb13a30 a2=3 a3=0 items=0 ppid=1 pid=5752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:35.723999 kernel: audit: type=1300 audit(1761957755.678:1564): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6bb13a30 a2=3 a3=0 items=0 ppid=1 pid=5752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:35.678000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 00:42:35.734001 kernel: audit: type=1327 audit(1761957755.678:1564): proctitle=737368643A20636F7265205B707269765D Nov 1 00:42:35.709000 audit[5752]: USER_START pid=5752 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:35.748001 kernel: audit: type=1105 audit(1761957755.709:1565): pid=5752 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:35.712000 audit[5754]: CRED_ACQ pid=5754 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:35.762008 kernel: audit: type=1103 audit(1761957755.712:1566): pid=5754 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:36.176898 sshd[5752]: pam_unix(sshd:session): session closed for user core Nov 1 00:42:36.177000 audit[5752]: USER_END pid=5752 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:36.190007 kernel: audit: type=1106 audit(1761957756.177:1567): pid=5752 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:36.191498 systemd-logind[1728]: Session 26 logged out. Waiting for processes to exit. Nov 1 00:42:36.185000 audit[5752]: CRED_DISP pid=5752 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:36.193871 systemd[1]: sshd@25-172.31.19.190:22-147.75.109.163:43330.service: Deactivated successfully. Nov 1 00:42:36.195089 systemd[1]: session-26.scope: Deactivated successfully. Nov 1 00:42:36.197136 systemd-logind[1728]: Removed session 26. Nov 1 00:42:36.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.19.190:22-147.75.109.163:43330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 00:42:36.202164 kernel: audit: type=1104 audit(1761957756.185:1568): pid=5752 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Nov 1 00:42:36.950748 kubelet[2730]: E1101 00:42:36.950697 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:42:37.954945 env[1737]: time="2025-11-01T00:42:37.954539444Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 00:42:38.191325 env[1737]: time="2025-11-01T00:42:38.191257402Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:38.193704 env[1737]: time="2025-11-01T00:42:38.193588804Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 00:42:38.194250 kubelet[2730]: E1101 00:42:38.194197 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:42:38.194903 kubelet[2730]: E1101 00:42:38.194872 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:42:38.195338 kubelet[2730]: E1101 00:42:38.195281 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9n5s4,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d49b764c9-wpz62_calico-apiserver(8983267d-ef32-4d12-8dac-9ecb10367507): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:38.197089 kubelet[2730]: E1101 00:42:38.197049 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:42:40.950780 env[1737]: time="2025-11-01T00:42:40.950455441Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 00:42:40.952389 kubelet[2730]: E1101 00:42:40.952338 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-5c9fc5d7bc-cj29r" podUID="ad238e2b-fbc2-4a12-80b4-cedf42c6dda0" Nov 1 00:42:41.215845 env[1737]: time="2025-11-01T00:42:41.215668763Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:41.218100 env[1737]: time="2025-11-01T00:42:41.218010760Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 00:42:41.218405 kubelet[2730]: E1101 00:42:41.218361 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:42:41.218561 kubelet[2730]: E1101 00:42:41.218425 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:42:41.218663 kubelet[2730]: E1101 00:42:41.218606 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rtlwv,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-bb8db9787-cmqlg_calico-apiserver(ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:41.220253 kubelet[2730]: E1101 00:42:41.220204 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" podUID="ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3" Nov 1 00:42:41.948994 kubelet[2730]: E1101 00:42:41.948937 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" podUID="a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7" Nov 1 00:42:44.949714 env[1737]: time="2025-11-01T00:42:44.949674916Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 00:42:45.190484 env[1737]: time="2025-11-01T00:42:45.190409258Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:45.192910 env[1737]: time="2025-11-01T00:42:45.192814600Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 00:42:45.193255 kubelet[2730]: E1101 00:42:45.193147 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:42:45.193255 kubelet[2730]: E1101 00:42:45.193199 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 00:42:45.194423 kubelet[2730]: E1101 00:42:45.193471 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fb5cm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wrg9s_calico-system(666be2c8-6518-4217-90fd-5cf3423de279): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:45.194555 env[1737]: time="2025-11-01T00:42:45.194070009Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Nov 1 00:42:45.430197 env[1737]: time="2025-11-01T00:42:45.430135529Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:45.432386 env[1737]: time="2025-11-01T00:42:45.432304093Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Nov 1 00:42:45.432737 kubelet[2730]: E1101 00:42:45.432686 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 00:42:45.432853 kubelet[2730]: E1101 00:42:45.432766 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 00:42:45.433277 kubelet[2730]: E1101 00:42:45.433214 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-bm8z9,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-4d2cg_calico-system(21d23048-45cc-482a-a891-7ca305e12df5): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:45.434004 env[1737]: time="2025-11-01T00:42:45.433644899Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 00:42:45.435460 kubelet[2730]: E1101 00:42:45.435411 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:42:45.697038 env[1737]: time="2025-11-01T00:42:45.696875275Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:45.699092 env[1737]: time="2025-11-01T00:42:45.699014872Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 00:42:45.699651 kubelet[2730]: E1101 00:42:45.699593 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:42:45.699780 kubelet[2730]: E1101 00:42:45.699681 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 00:42:45.699918 kubelet[2730]: E1101 00:42:45.699866 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fb5cm,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-wrg9s_calico-system(666be2c8-6518-4217-90fd-5cf3423de279): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:45.701170 kubelet[2730]: E1101 00:42:45.701107 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:42:47.949320 env[1737]: time="2025-11-01T00:42:47.949265253Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Nov 1 00:42:48.191990 env[1737]: time="2025-11-01T00:42:48.191913044Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:48.194159 env[1737]: time="2025-11-01T00:42:48.194087204Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Nov 1 00:42:48.194519 kubelet[2730]: E1101 00:42:48.194470 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 00:42:48.194844 kubelet[2730]: E1101 00:42:48.194537 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 00:42:48.194844 kubelet[2730]: E1101 00:42:48.194689 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-sk4qc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-5bb8fbd4f8-rkzw4_calico-system(67349f38-7770-459e-9c5a-e728b49cc9e0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:48.195958 kubelet[2730]: E1101 00:42:48.195906 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:42:51.195537 systemd[1]: cri-containerd-f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e.scope: Deactivated successfully. Nov 1 00:42:51.195912 systemd[1]: cri-containerd-f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e.scope: Consumed 13.442s CPU time. Nov 1 00:42:51.201508 kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 1 00:42:51.201691 kernel: audit: type=1334 audit(1761957771.194:1570): prog-id=117 op=UNLOAD Nov 1 00:42:51.194000 audit: BPF prog-id=117 op=UNLOAD Nov 1 00:42:51.203000 audit: BPF prog-id=120 op=UNLOAD Nov 1 00:42:51.217223 kernel: audit: type=1334 audit(1761957771.203:1571): prog-id=120 op=UNLOAD Nov 1 00:42:51.253891 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e-rootfs.mount: Deactivated successfully. Nov 1 00:42:51.291625 env[1737]: time="2025-11-01T00:42:51.290732373Z" level=info msg="shim disconnected" id=f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e Nov 1 00:42:51.291625 env[1737]: time="2025-11-01T00:42:51.291614815Z" level=warning msg="cleaning up after shim disconnected" id=f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e namespace=k8s.io Nov 1 00:42:51.291625 env[1737]: time="2025-11-01T00:42:51.291631063Z" level=info msg="cleaning up dead shim" Nov 1 00:42:51.302673 env[1737]: time="2025-11-01T00:42:51.302618513Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:42:51Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5804 runtime=io.containerd.runc.v2\n" Nov 1 00:42:51.920023 kubelet[2730]: I1101 00:42:51.919954 2730 scope.go:117] "RemoveContainer" containerID="f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e" Nov 1 00:42:51.949860 kubelet[2730]: E1101 00:42:51.949813 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" podUID="ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3" Nov 1 00:42:51.951838 env[1737]: time="2025-11-01T00:42:51.951558551Z" level=info msg="CreateContainer within sandbox \"57edb93b9f61e49d71e80ad7994c75d7368bdb519dc8d23f26d584dc1824ae1f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Nov 1 00:42:51.990272 env[1737]: time="2025-11-01T00:42:51.990199260Z" level=info msg="CreateContainer within sandbox \"57edb93b9f61e49d71e80ad7994c75d7368bdb519dc8d23f26d584dc1824ae1f\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"50de3e82191686fcac3a732b99e0f748bcd2fb81f4c8fb5c48fce96f5c61a67d\"" Nov 1 00:42:51.990922 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1937564810.mount: Deactivated successfully. Nov 1 00:42:51.993854 env[1737]: time="2025-11-01T00:42:51.993814726Z" level=info msg="StartContainer for \"50de3e82191686fcac3a732b99e0f748bcd2fb81f4c8fb5c48fce96f5c61a67d\"" Nov 1 00:42:52.024241 systemd[1]: Started cri-containerd-50de3e82191686fcac3a732b99e0f748bcd2fb81f4c8fb5c48fce96f5c61a67d.scope. Nov 1 00:42:52.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.069067 kernel: audit: type=1400 audit(1761957772.050:1572): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.069209 kernel: audit: type=1400 audit(1761957772.050:1573): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.079006 kernel: audit: type=1400 audit(1761957772.050:1574): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.095597 kernel: audit: type=1400 audit(1761957772.050:1575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.100912 kernel: audit: type=1400 audit(1761957772.050:1576): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.100962 kernel: audit: type=1400 audit(1761957772.050:1577): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.104261 systemd[1]: cri-containerd-106dbbb844b10835571ed25ae2185a23b21cf031fd14a7360fcf7a2801080c0b.scope: Deactivated successfully. Nov 1 00:42:52.104633 systemd[1]: cri-containerd-106dbbb844b10835571ed25ae2185a23b21cf031fd14a7360fcf7a2801080c0b.scope: Consumed 5.040s CPU time. Nov 1 00:42:52.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.114013 kernel: audit: type=1400 audit(1761957772.050:1578): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.115967 env[1737]: time="2025-11-01T00:42:52.115911933Z" level=info msg="StartContainer for \"50de3e82191686fcac3a732b99e0f748bcd2fb81f4c8fb5c48fce96f5c61a67d\" returns successfully" Nov 1 00:42:52.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.064000 audit: BPF prog-id=208 op=LOAD Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2858 pid=5824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:52.123848 kernel: audit: type=1400 audit(1761957772.050:1579): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646533653832313931363836666361633361373332623939653066 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2858 pid=5824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:52.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646533653832313931363836666361633361373332623939653066 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit: BPF prog-id=209 op=LOAD Nov 1 00:42:52.066000 audit[5824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032cd20 items=0 ppid=2858 pid=5824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:52.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646533653832313931363836666361633361373332623939653066 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit: BPF prog-id=210 op=LOAD Nov 1 00:42:52.066000 audit[5824]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032cd68 items=0 ppid=2858 pid=5824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:52.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646533653832313931363836666361633361373332623939653066 Nov 1 00:42:52.066000 audit: BPF prog-id=210 op=UNLOAD Nov 1 00:42:52.066000 audit: BPF prog-id=209 op=UNLOAD Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { perfmon } for pid=5824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit[5824]: AVC avc: denied { bpf } for pid=5824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:52.066000 audit: BPF prog-id=211 op=LOAD Nov 1 00:42:52.066000 audit[5824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032d178 items=0 ppid=2858 pid=5824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:52.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530646533653832313931363836666361633361373332623939653066 Nov 1 00:42:52.113000 audit: BPF prog-id=80 op=UNLOAD Nov 1 00:42:52.113000 audit: BPF prog-id=101 op=UNLOAD Nov 1 00:42:52.182434 env[1737]: time="2025-11-01T00:42:52.179831978Z" level=info msg="shim disconnected" id=106dbbb844b10835571ed25ae2185a23b21cf031fd14a7360fcf7a2801080c0b Nov 1 00:42:52.182434 env[1737]: time="2025-11-01T00:42:52.179897319Z" level=warning msg="cleaning up after shim disconnected" id=106dbbb844b10835571ed25ae2185a23b21cf031fd14a7360fcf7a2801080c0b namespace=k8s.io Nov 1 00:42:52.182434 env[1737]: time="2025-11-01T00:42:52.179911592Z" level=info msg="cleaning up dead shim" Nov 1 00:42:52.192406 env[1737]: time="2025-11-01T00:42:52.192349299Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:42:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5864 runtime=io.containerd.runc.v2\n" Nov 1 00:42:52.254027 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-106dbbb844b10835571ed25ae2185a23b21cf031fd14a7360fcf7a2801080c0b-rootfs.mount: Deactivated successfully. Nov 1 00:42:52.913293 kubelet[2730]: I1101 00:42:52.913152 2730 scope.go:117] "RemoveContainer" containerID="106dbbb844b10835571ed25ae2185a23b21cf031fd14a7360fcf7a2801080c0b" Nov 1 00:42:52.916243 env[1737]: time="2025-11-01T00:42:52.916192561Z" level=info msg="CreateContainer within sandbox \"f0ba5dd5dbbd1837229dc1064abd869bf9de51fe9484a946f4986175144ac664\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Nov 1 00:42:52.947431 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount656127035.mount: Deactivated successfully. Nov 1 00:42:52.951772 kubelet[2730]: E1101 00:42:52.950632 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:42:52.961617 env[1737]: time="2025-11-01T00:42:52.961547019Z" level=info msg="CreateContainer within sandbox \"f0ba5dd5dbbd1837229dc1064abd869bf9de51fe9484a946f4986175144ac664\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"e565480aac51d4265b15676c6afb2f12163f18778eb9d0e903349723337d4780\"" Nov 1 00:42:52.962206 env[1737]: time="2025-11-01T00:42:52.962154283Z" level=info msg="StartContainer for \"e565480aac51d4265b15676c6afb2f12163f18778eb9d0e903349723337d4780\"" Nov 1 00:42:52.999392 systemd[1]: Started cri-containerd-e565480aac51d4265b15676c6afb2f12163f18778eb9d0e903349723337d4780.scope. Nov 1 00:42:53.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit: BPF prog-id=212 op=LOAD Nov 1 00:42:53.020000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit[5893]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2356 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:53.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535363534383061616335316434323635623135363736633661666232 Nov 1 00:42:53.020000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit[5893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2356 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:53.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535363534383061616335316434323635623135363736633661666232 Nov 1 00:42:53.020000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.020000 audit: BPF prog-id=213 op=LOAD Nov 1 00:42:53.020000 audit[5893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a22d0 items=0 ppid=2356 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:53.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535363534383061616335316434323635623135363736633661666232 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit: BPF prog-id=214 op=LOAD Nov 1 00:42:53.021000 audit[5893]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a2318 items=0 ppid=2356 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:53.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535363534383061616335316434323635623135363736633661666232 Nov 1 00:42:53.021000 audit: BPF prog-id=214 op=UNLOAD Nov 1 00:42:53.021000 audit: BPF prog-id=213 op=UNLOAD Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { perfmon } for pid=5893 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit[5893]: AVC avc: denied { bpf } for pid=5893 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:53.021000 audit: BPF prog-id=215 op=LOAD Nov 1 00:42:53.021000 audit[5893]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a2728 items=0 ppid=2356 pid=5893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:53.021000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535363534383061616335316434323635623135363736633661666232 Nov 1 00:42:53.059598 env[1737]: time="2025-11-01T00:42:53.059535553Z" level=info msg="StartContainer for \"e565480aac51d4265b15676c6afb2f12163f18778eb9d0e903349723337d4780\" returns successfully" Nov 1 00:42:55.234000 audit[5904]: AVC avc: denied { watch } for pid=5904 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=524012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:55.234000 audit[5904]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000cc6000 a2=fc6 a3=0 items=0 ppid=2356 pid=5904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:55.234000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:55.234000 audit[5904]: AVC avc: denied { watch } for pid=5904 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=524006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 00:42:55.234000 audit[5904]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000ce8040 a2=fc6 a3=0 items=0 ppid=2356 pid=5904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c57,c776 key=(null) Nov 1 00:42:55.234000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 00:42:55.949765 env[1737]: time="2025-11-01T00:42:55.949704312Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Nov 1 00:42:56.204272 env[1737]: time="2025-11-01T00:42:56.204132795Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:56.205761 env[1737]: time="2025-11-01T00:42:56.205698112Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Nov 1 00:42:56.206012 kubelet[2730]: E1101 00:42:56.205955 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 00:42:56.206326 kubelet[2730]: E1101 00:42:56.206027 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 00:42:56.206326 kubelet[2730]: E1101 00:42:56.206157 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:51a637753dc8497c80682bb02487956c,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-wq5rt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c9fc5d7bc-cj29r_calico-system(ad238e2b-fbc2-4a12-80b4-cedf42c6dda0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:56.209671 env[1737]: time="2025-11-01T00:42:56.209389556Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Nov 1 00:42:56.457329 env[1737]: time="2025-11-01T00:42:56.457174017Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:56.459544 env[1737]: time="2025-11-01T00:42:56.459009238Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Nov 1 00:42:56.459700 kubelet[2730]: E1101 00:42:56.459472 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 00:42:56.459700 kubelet[2730]: E1101 00:42:56.459524 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 00:42:56.459785 kubelet[2730]: E1101 00:42:56.459686 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-wq5rt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-5c9fc5d7bc-cj29r_calico-system(ad238e2b-fbc2-4a12-80b4-cedf42c6dda0): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:56.461095 kubelet[2730]: E1101 00:42:56.460887 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-5c9fc5d7bc-cj29r" podUID="ad238e2b-fbc2-4a12-80b4-cedf42c6dda0" Nov 1 00:42:56.950034 env[1737]: time="2025-11-01T00:42:56.949966046Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 00:42:57.168272 systemd[1]: cri-containerd-d57b7db80f3c10aa8825789ffb0f2d7d2a3341737935cddbbc5ee6fe40ef20b3.scope: Deactivated successfully. Nov 1 00:42:57.168625 systemd[1]: cri-containerd-d57b7db80f3c10aa8825789ffb0f2d7d2a3341737935cddbbc5ee6fe40ef20b3.scope: Consumed 4.054s CPU time. Nov 1 00:42:57.177623 kernel: kauditd_printk_skb: 114 callbacks suppressed Nov 1 00:42:57.178248 kernel: audit: type=1334 audit(1761957777.171:1612): prog-id=84 op=UNLOAD Nov 1 00:42:57.171000 audit: BPF prog-id=84 op=UNLOAD Nov 1 00:42:57.171000 audit: BPF prog-id=105 op=UNLOAD Nov 1 00:42:57.181955 env[1737]: time="2025-11-01T00:42:57.181891992Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 00:42:57.182085 kernel: audit: type=1334 audit(1761957777.171:1613): prog-id=105 op=UNLOAD Nov 1 00:42:57.184240 env[1737]: time="2025-11-01T00:42:57.184172670Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 00:42:57.184479 kubelet[2730]: E1101 00:42:57.184438 2730 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:42:57.185179 kubelet[2730]: E1101 00:42:57.184500 2730 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 00:42:57.185179 kubelet[2730]: E1101 00:42:57.184698 2730 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-gsczx,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d49b764c9-pnm8b_calico-apiserver(a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 00:42:57.185944 kubelet[2730]: E1101 00:42:57.185902 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" podUID="a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7" Nov 1 00:42:57.203248 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d57b7db80f3c10aa8825789ffb0f2d7d2a3341737935cddbbc5ee6fe40ef20b3-rootfs.mount: Deactivated successfully. Nov 1 00:42:57.243161 env[1737]: time="2025-11-01T00:42:57.243082552Z" level=info msg="shim disconnected" id=d57b7db80f3c10aa8825789ffb0f2d7d2a3341737935cddbbc5ee6fe40ef20b3 Nov 1 00:42:57.243161 env[1737]: time="2025-11-01T00:42:57.243160644Z" level=warning msg="cleaning up after shim disconnected" id=d57b7db80f3c10aa8825789ffb0f2d7d2a3341737935cddbbc5ee6fe40ef20b3 namespace=k8s.io Nov 1 00:42:57.243161 env[1737]: time="2025-11-01T00:42:57.243174026Z" level=info msg="cleaning up dead shim" Nov 1 00:42:57.257921 env[1737]: time="2025-11-01T00:42:57.257863087Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:42:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5950 runtime=io.containerd.runc.v2\n" Nov 1 00:42:57.930783 kubelet[2730]: I1101 00:42:57.930748 2730 scope.go:117] "RemoveContainer" containerID="d57b7db80f3c10aa8825789ffb0f2d7d2a3341737935cddbbc5ee6fe40ef20b3" Nov 1 00:42:57.933474 env[1737]: time="2025-11-01T00:42:57.933424273Z" level=info msg="CreateContainer within sandbox \"bcfd8100abc1c014c765ae7d8303a2bcbd33ccc3a5a15188b1ff33f4d2f72577\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Nov 1 00:42:57.959889 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4099215706.mount: Deactivated successfully. Nov 1 00:42:57.961470 kubelet[2730]: E1101 00:42:57.961306 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:42:57.967007 env[1737]: time="2025-11-01T00:42:57.966908593Z" level=info msg="CreateContainer within sandbox \"bcfd8100abc1c014c765ae7d8303a2bcbd33ccc3a5a15188b1ff33f4d2f72577\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"57921d7a56f96390355e2c304cf223ab32fef9ff61c0e7079ea4e0a16e0d100f\"" Nov 1 00:42:57.968202 env[1737]: time="2025-11-01T00:42:57.968162153Z" level=info msg="StartContainer for \"57921d7a56f96390355e2c304cf223ab32fef9ff61c0e7079ea4e0a16e0d100f\"" Nov 1 00:42:57.997941 systemd[1]: Started cri-containerd-57921d7a56f96390355e2c304cf223ab32fef9ff61c0e7079ea4e0a16e0d100f.scope. Nov 1 00:42:58.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.023999 kernel: audit: type=1400 audit(1761957778.015:1614): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.035410 kernel: audit: type=1400 audit(1761957778.015:1615): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.035582 kernel: audit: type=1400 audit(1761957778.015:1616): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.035627 kernel: audit: type=1400 audit(1761957778.015:1617): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.048353 kernel: audit: type=1400 audit(1761957778.015:1618): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.048522 kernel: audit: type=1400 audit(1761957778.015:1619): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.069167 kernel: audit: type=1400 audit(1761957778.015:1620): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.069370 kernel: audit: type=1400 audit(1761957778.015:1621): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.015000 audit: BPF prog-id=216 op=LOAD Nov 1 00:42:58.016000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.016000 audit[5971]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2339 pid=5971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:58.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537393231643761353666393633393033353565326333303463663232 Nov 1 00:42:58.016000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.016000 audit[5971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2339 pid=5971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:58.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537393231643761353666393633393033353565326333303463663232 Nov 1 00:42:58.016000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.016000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.016000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.016000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.016000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.016000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.016000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.016000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.016000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.016000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.016000 audit: BPF prog-id=217 op=LOAD Nov 1 00:42:58.016000 audit[5971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001c3020 items=0 ppid=2339 pid=5971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:58.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537393231643761353666393633393033353565326333303463663232 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit: BPF prog-id=218 op=LOAD Nov 1 00:42:58.022000 audit[5971]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001c3068 items=0 ppid=2339 pid=5971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:58.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537393231643761353666393633393033353565326333303463663232 Nov 1 00:42:58.022000 audit: BPF prog-id=218 op=UNLOAD Nov 1 00:42:58.022000 audit: BPF prog-id=217 op=UNLOAD Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { perfmon } for pid=5971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit[5971]: AVC avc: denied { bpf } for pid=5971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 00:42:58.022000 audit: BPF prog-id=219 op=LOAD Nov 1 00:42:58.022000 audit[5971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001c3478 items=0 ppid=2339 pid=5971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 00:42:58.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537393231643761353666393633393033353565326333303463663232 Nov 1 00:42:58.097868 env[1737]: time="2025-11-01T00:42:58.097806571Z" level=info msg="StartContainer for \"57921d7a56f96390355e2c304cf223ab32fef9ff61c0e7079ea4e0a16e0d100f\" returns successfully" Nov 1 00:42:59.722594 kubelet[2730]: E1101 00:42:59.722525 2730 controller.go:195] "Failed to update lease" err="Put \"https://172.31.19.190:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-190?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Nov 1 00:43:00.951308 kubelet[2730]: E1101 00:43:00.951224 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:43:00.952071 kubelet[2730]: E1101 00:43:00.951626 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:43:03.713133 systemd[1]: cri-containerd-50de3e82191686fcac3a732b99e0f748bcd2fb81f4c8fb5c48fce96f5c61a67d.scope: Deactivated successfully. Nov 1 00:43:03.712000 audit: BPF prog-id=208 op=UNLOAD Nov 1 00:43:03.716643 kernel: kauditd_printk_skb: 49 callbacks suppressed Nov 1 00:43:03.716765 kernel: audit: type=1334 audit(1761957783.712:1632): prog-id=208 op=UNLOAD Nov 1 00:43:03.719000 audit: BPF prog-id=211 op=UNLOAD Nov 1 00:43:03.725095 kernel: audit: type=1334 audit(1761957783.719:1633): prog-id=211 op=UNLOAD Nov 1 00:43:03.743982 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-50de3e82191686fcac3a732b99e0f748bcd2fb81f4c8fb5c48fce96f5c61a67d-rootfs.mount: Deactivated successfully. Nov 1 00:43:03.772804 env[1737]: time="2025-11-01T00:43:03.772727394Z" level=info msg="shim disconnected" id=50de3e82191686fcac3a732b99e0f748bcd2fb81f4c8fb5c48fce96f5c61a67d Nov 1 00:43:03.772804 env[1737]: time="2025-11-01T00:43:03.772800352Z" level=warning msg="cleaning up after shim disconnected" id=50de3e82191686fcac3a732b99e0f748bcd2fb81f4c8fb5c48fce96f5c61a67d namespace=k8s.io Nov 1 00:43:03.772804 env[1737]: time="2025-11-01T00:43:03.772811329Z" level=info msg="cleaning up dead shim" Nov 1 00:43:03.782815 env[1737]: time="2025-11-01T00:43:03.782754956Z" level=warning msg="cleanup warnings time=\"2025-11-01T00:43:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6016 runtime=io.containerd.runc.v2\n" Nov 1 00:43:03.956906 kubelet[2730]: I1101 00:43:03.955929 2730 scope.go:117] "RemoveContainer" containerID="f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e" Nov 1 00:43:03.956906 kubelet[2730]: I1101 00:43:03.956552 2730 scope.go:117] "RemoveContainer" containerID="50de3e82191686fcac3a732b99e0f748bcd2fb81f4c8fb5c48fce96f5c61a67d" Nov 1 00:43:03.956906 kubelet[2730]: E1101 00:43:03.956811 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-7dcd859c48-gswks_tigera-operator(4d92c07c-42d9-4530-ac3b-ba7070d0c338)\"" pod="tigera-operator/tigera-operator-7dcd859c48-gswks" podUID="4d92c07c-42d9-4530-ac3b-ba7070d0c338" Nov 1 00:43:03.971870 env[1737]: time="2025-11-01T00:43:03.970304624Z" level=info msg="RemoveContainer for \"f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e\"" Nov 1 00:43:03.978723 env[1737]: time="2025-11-01T00:43:03.978662807Z" level=info msg="RemoveContainer for \"f96fdd83324604691f63e0d48218fdb11da40c7d918a8e9b584c5071ff6cba8e\" returns successfully" Nov 1 00:43:04.948949 kubelet[2730]: E1101 00:43:04.948910 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-wpz62" podUID="8983267d-ef32-4d12-8dac-9ecb10367507" Nov 1 00:43:06.948588 kubelet[2730]: E1101 00:43:06.948545 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-bb8db9787-cmqlg" podUID="ba2e5d0e-e96a-42ab-9fa3-0da53dcc24f3" Nov 1 00:43:08.950432 kubelet[2730]: E1101 00:43:08.950347 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-wrg9s" podUID="666be2c8-6518-4217-90fd-5cf3423de279" Nov 1 00:43:08.951903 kubelet[2730]: E1101 00:43:08.951856 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-5c9fc5d7bc-cj29r" podUID="ad238e2b-fbc2-4a12-80b4-cedf42c6dda0" Nov 1 00:43:09.724606 kubelet[2730]: E1101 00:43:09.722931 2730 controller.go:195] "Failed to update lease" err="Put \"https://172.31.19.190:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-19-190?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Nov 1 00:43:11.948995 kubelet[2730]: E1101 00:43:11.948929 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d49b764c9-pnm8b" podUID="a2a22a4f-ddc0-4f49-94c7-8be12ac0f5e7" Nov 1 00:43:11.949517 kubelet[2730]: E1101 00:43:11.949033 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-5bb8fbd4f8-rkzw4" podUID="67349f38-7770-459e-9c5a-e728b49cc9e0" Nov 1 00:43:12.949134 kubelet[2730]: E1101 00:43:12.949062 2730 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-4d2cg" podUID="21d23048-45cc-482a-a891-7ca305e12df5" Nov 1 00:43:13.235799 systemd-logind[1728]: Power key pressed short. Nov 1 00:43:13.235818 systemd-logind[1728]: Powering off...