Nov 1 04:34:24.980425 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Oct 31 23:02:53 -00 2025 Nov 1 04:34:24.980469 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 04:34:24.980488 kernel: BIOS-provided physical RAM map: Nov 1 04:34:24.980498 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Nov 1 04:34:24.980508 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Nov 1 04:34:24.980518 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Nov 1 04:34:24.980529 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Nov 1 04:34:24.980552 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Nov 1 04:34:24.980563 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Nov 1 04:34:24.980573 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Nov 1 04:34:24.980588 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Nov 1 04:34:24.980598 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Nov 1 04:34:24.980608 kernel: NX (Execute Disable) protection: active Nov 1 04:34:24.980618 kernel: SMBIOS 2.8 present. Nov 1 04:34:24.980631 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Nov 1 04:34:24.980642 kernel: Hypervisor detected: KVM Nov 1 04:34:24.980657 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Nov 1 04:34:24.980668 kernel: kvm-clock: cpu 0, msr 341a0001, primary cpu clock Nov 1 04:34:24.980679 kernel: kvm-clock: using sched offset of 5226253549 cycles Nov 1 04:34:24.980690 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Nov 1 04:34:24.980702 kernel: tsc: Detected 2499.998 MHz processor Nov 1 04:34:24.980712 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Nov 1 04:34:24.980724 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Nov 1 04:34:24.980735 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Nov 1 04:34:24.980746 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Nov 1 04:34:24.980761 kernel: Using GB pages for direct mapping Nov 1 04:34:24.980771 kernel: ACPI: Early table checksum verification disabled Nov 1 04:34:24.980782 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Nov 1 04:34:24.980793 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 04:34:24.980804 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 04:34:24.980815 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 04:34:24.980827 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Nov 1 04:34:24.980838 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 04:34:24.980849 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 04:34:24.980864 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 04:34:24.980875 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Nov 1 04:34:24.980886 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Nov 1 04:34:24.980896 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Nov 1 04:34:24.980907 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Nov 1 04:34:24.980919 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Nov 1 04:34:24.980935 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Nov 1 04:34:24.980951 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Nov 1 04:34:24.980962 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Nov 1 04:34:24.980974 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Nov 1 04:34:24.980986 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Nov 1 04:34:24.980997 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Nov 1 04:34:24.981009 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Nov 1 04:34:24.981020 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Nov 1 04:34:24.981036 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Nov 1 04:34:24.981047 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Nov 1 04:34:24.981059 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Nov 1 04:34:24.981070 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Nov 1 04:34:24.981082 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Nov 1 04:34:24.981093 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Nov 1 04:34:24.981105 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Nov 1 04:34:24.984158 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Nov 1 04:34:24.984176 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Nov 1 04:34:24.984189 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Nov 1 04:34:24.984208 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Nov 1 04:34:24.984220 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Nov 1 04:34:24.984231 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Nov 1 04:34:24.984243 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Nov 1 04:34:24.984255 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Nov 1 04:34:24.984267 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Nov 1 04:34:24.984279 kernel: Zone ranges: Nov 1 04:34:24.984291 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Nov 1 04:34:24.984303 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Nov 1 04:34:24.984319 kernel: Normal empty Nov 1 04:34:24.984331 kernel: Movable zone start for each node Nov 1 04:34:24.984343 kernel: Early memory node ranges Nov 1 04:34:24.984354 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Nov 1 04:34:24.984366 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Nov 1 04:34:24.984378 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Nov 1 04:34:24.984390 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Nov 1 04:34:24.984401 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Nov 1 04:34:24.984413 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Nov 1 04:34:24.984429 kernel: ACPI: PM-Timer IO Port: 0x608 Nov 1 04:34:24.984440 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Nov 1 04:34:24.984452 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Nov 1 04:34:24.984464 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Nov 1 04:34:24.984476 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Nov 1 04:34:24.984488 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Nov 1 04:34:24.984499 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Nov 1 04:34:24.984511 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Nov 1 04:34:24.984523 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Nov 1 04:34:24.984550 kernel: TSC deadline timer available Nov 1 04:34:24.984562 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Nov 1 04:34:24.984574 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Nov 1 04:34:24.984586 kernel: Booting paravirtualized kernel on KVM Nov 1 04:34:24.984598 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Nov 1 04:34:24.984610 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Nov 1 04:34:24.984622 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Nov 1 04:34:24.984633 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Nov 1 04:34:24.984645 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Nov 1 04:34:24.984661 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Nov 1 04:34:24.984673 kernel: kvm-guest: PV spinlocks enabled Nov 1 04:34:24.984685 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Nov 1 04:34:24.984697 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Nov 1 04:34:24.984708 kernel: Policy zone: DMA32 Nov 1 04:34:24.984721 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 04:34:24.984734 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Nov 1 04:34:24.984747 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Nov 1 04:34:24.984763 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Nov 1 04:34:24.984774 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Nov 1 04:34:24.984787 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 192524K reserved, 0K cma-reserved) Nov 1 04:34:24.984799 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Nov 1 04:34:24.984810 kernel: Kernel/User page tables isolation: enabled Nov 1 04:34:24.984822 kernel: ftrace: allocating 34614 entries in 136 pages Nov 1 04:34:24.984834 kernel: ftrace: allocated 136 pages with 2 groups Nov 1 04:34:24.984845 kernel: rcu: Hierarchical RCU implementation. Nov 1 04:34:24.984858 kernel: rcu: RCU event tracing is enabled. Nov 1 04:34:24.984874 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Nov 1 04:34:24.984886 kernel: Rude variant of Tasks RCU enabled. Nov 1 04:34:24.984898 kernel: Tracing variant of Tasks RCU enabled. Nov 1 04:34:24.984910 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Nov 1 04:34:24.984922 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Nov 1 04:34:24.984933 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Nov 1 04:34:24.984945 kernel: random: crng init done Nov 1 04:34:24.984971 kernel: Console: colour VGA+ 80x25 Nov 1 04:34:24.984983 kernel: printk: console [tty0] enabled Nov 1 04:34:24.984995 kernel: printk: console [ttyS0] enabled Nov 1 04:34:24.985007 kernel: ACPI: Core revision 20210730 Nov 1 04:34:24.985019 kernel: APIC: Switch to symmetric I/O mode setup Nov 1 04:34:24.985035 kernel: x2apic enabled Nov 1 04:34:24.985047 kernel: Switched APIC routing to physical x2apic. Nov 1 04:34:24.985060 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Nov 1 04:34:24.985072 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Nov 1 04:34:24.985085 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Nov 1 04:34:24.985101 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Nov 1 04:34:24.985128 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Nov 1 04:34:24.985142 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Nov 1 04:34:24.985154 kernel: Spectre V2 : Mitigation: Retpolines Nov 1 04:34:24.985167 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Nov 1 04:34:24.985179 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Nov 1 04:34:24.985191 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Nov 1 04:34:24.985204 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Nov 1 04:34:24.985216 kernel: MDS: Mitigation: Clear CPU buffers Nov 1 04:34:24.985228 kernel: MMIO Stale Data: Unknown: No mitigations Nov 1 04:34:24.985240 kernel: SRBDS: Unknown: Dependent on hypervisor status Nov 1 04:34:24.985257 kernel: active return thunk: its_return_thunk Nov 1 04:34:24.985269 kernel: ITS: Mitigation: Aligned branch/return thunks Nov 1 04:34:24.985282 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Nov 1 04:34:24.985294 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Nov 1 04:34:24.985306 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Nov 1 04:34:24.985318 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Nov 1 04:34:24.985330 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Nov 1 04:34:24.985343 kernel: Freeing SMP alternatives memory: 32K Nov 1 04:34:24.985355 kernel: pid_max: default: 32768 minimum: 301 Nov 1 04:34:24.985379 kernel: LSM: Security Framework initializing Nov 1 04:34:24.985390 kernel: SELinux: Initializing. Nov 1 04:34:24.985406 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Nov 1 04:34:24.985431 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Nov 1 04:34:24.985443 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Nov 1 04:34:24.985455 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Nov 1 04:34:24.985468 kernel: signal: max sigframe size: 1776 Nov 1 04:34:24.985480 kernel: rcu: Hierarchical SRCU implementation. Nov 1 04:34:24.985492 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Nov 1 04:34:24.985504 kernel: smp: Bringing up secondary CPUs ... Nov 1 04:34:24.985517 kernel: x86: Booting SMP configuration: Nov 1 04:34:24.985529 kernel: .... node #0, CPUs: #1 Nov 1 04:34:24.985556 kernel: kvm-clock: cpu 1, msr 341a0041, secondary cpu clock Nov 1 04:34:24.985569 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Nov 1 04:34:24.985581 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Nov 1 04:34:24.985593 kernel: smp: Brought up 1 node, 2 CPUs Nov 1 04:34:24.985605 kernel: smpboot: Max logical packages: 16 Nov 1 04:34:24.985617 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Nov 1 04:34:24.985629 kernel: devtmpfs: initialized Nov 1 04:34:24.985641 kernel: x86/mm: Memory block size: 128MB Nov 1 04:34:24.985654 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Nov 1 04:34:24.985671 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Nov 1 04:34:24.985683 kernel: pinctrl core: initialized pinctrl subsystem Nov 1 04:34:24.985695 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Nov 1 04:34:24.985707 kernel: audit: initializing netlink subsys (disabled) Nov 1 04:34:24.985720 kernel: audit: type=2000 audit(1761971662.945:1): state=initialized audit_enabled=0 res=1 Nov 1 04:34:24.985732 kernel: thermal_sys: Registered thermal governor 'step_wise' Nov 1 04:34:24.985744 kernel: thermal_sys: Registered thermal governor 'user_space' Nov 1 04:34:24.985756 kernel: cpuidle: using governor menu Nov 1 04:34:24.985769 kernel: ACPI: bus type PCI registered Nov 1 04:34:24.985785 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Nov 1 04:34:24.985797 kernel: dca service started, version 1.12.1 Nov 1 04:34:24.985810 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Nov 1 04:34:24.985822 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Nov 1 04:34:24.985834 kernel: PCI: Using configuration type 1 for base access Nov 1 04:34:24.985846 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Nov 1 04:34:24.985859 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Nov 1 04:34:24.985871 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Nov 1 04:34:24.985883 kernel: ACPI: Added _OSI(Module Device) Nov 1 04:34:24.985899 kernel: ACPI: Added _OSI(Processor Device) Nov 1 04:34:24.985911 kernel: ACPI: Added _OSI(Processor Aggregator Device) Nov 1 04:34:24.985923 kernel: ACPI: Added _OSI(Linux-Dell-Video) Nov 1 04:34:24.985936 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Nov 1 04:34:24.985948 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Nov 1 04:34:24.985960 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Nov 1 04:34:24.985972 kernel: ACPI: Interpreter enabled Nov 1 04:34:24.985984 kernel: ACPI: PM: (supports S0 S5) Nov 1 04:34:24.985996 kernel: ACPI: Using IOAPIC for interrupt routing Nov 1 04:34:24.986013 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Nov 1 04:34:24.986025 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Nov 1 04:34:24.986038 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Nov 1 04:34:24.989613 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Nov 1 04:34:24.989788 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Nov 1 04:34:24.989950 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Nov 1 04:34:24.989969 kernel: PCI host bridge to bus 0000:00 Nov 1 04:34:24.990204 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Nov 1 04:34:24.990355 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Nov 1 04:34:24.990499 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Nov 1 04:34:24.990667 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Nov 1 04:34:24.990814 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Nov 1 04:34:24.990959 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Nov 1 04:34:24.991106 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Nov 1 04:34:24.991305 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Nov 1 04:34:24.991481 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Nov 1 04:34:24.991654 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Nov 1 04:34:24.991812 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Nov 1 04:34:24.991969 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Nov 1 04:34:24.992141 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Nov 1 04:34:24.992323 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Nov 1 04:34:24.992485 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Nov 1 04:34:24.992677 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Nov 1 04:34:24.992839 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Nov 1 04:34:24.993008 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Nov 1 04:34:24.993183 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Nov 1 04:34:24.993353 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Nov 1 04:34:24.993520 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Nov 1 04:34:24.993737 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Nov 1 04:34:24.993902 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Nov 1 04:34:24.994105 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Nov 1 04:34:24.994293 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Nov 1 04:34:24.994465 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Nov 1 04:34:24.994648 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Nov 1 04:34:24.994822 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Nov 1 04:34:24.994986 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Nov 1 04:34:25.004214 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Nov 1 04:34:25.004401 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Nov 1 04:34:25.004580 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Nov 1 04:34:25.004751 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Nov 1 04:34:25.004910 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Nov 1 04:34:25.005081 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Nov 1 04:34:25.005283 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Nov 1 04:34:25.005467 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Nov 1 04:34:25.005668 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Nov 1 04:34:25.005878 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Nov 1 04:34:25.006065 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Nov 1 04:34:25.006285 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Nov 1 04:34:25.006479 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Nov 1 04:34:25.006662 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Nov 1 04:34:25.006865 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Nov 1 04:34:25.007027 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Nov 1 04:34:25.007244 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Nov 1 04:34:25.007429 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Nov 1 04:34:25.007607 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Nov 1 04:34:25.007767 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Nov 1 04:34:25.007925 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Nov 1 04:34:25.008104 kernel: pci_bus 0000:02: extended config space not accessible Nov 1 04:34:25.008320 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Nov 1 04:34:25.008497 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Nov 1 04:34:25.008676 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Nov 1 04:34:25.008840 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Nov 1 04:34:25.009013 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Nov 1 04:34:25.009196 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Nov 1 04:34:25.009358 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Nov 1 04:34:25.009526 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Nov 1 04:34:25.009701 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Nov 1 04:34:25.009885 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Nov 1 04:34:25.010053 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Nov 1 04:34:25.010231 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Nov 1 04:34:25.010391 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Nov 1 04:34:25.010561 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Nov 1 04:34:25.010726 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Nov 1 04:34:25.010894 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Nov 1 04:34:25.011055 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Nov 1 04:34:25.013325 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Nov 1 04:34:25.013497 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Nov 1 04:34:25.013676 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Nov 1 04:34:25.013844 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Nov 1 04:34:25.014007 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Nov 1 04:34:25.014190 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Nov 1 04:34:25.014363 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Nov 1 04:34:25.014521 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Nov 1 04:34:25.014693 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Nov 1 04:34:25.014855 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Nov 1 04:34:25.015012 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Nov 1 04:34:25.015186 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Nov 1 04:34:25.015205 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Nov 1 04:34:25.015219 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Nov 1 04:34:25.015239 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Nov 1 04:34:25.015252 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Nov 1 04:34:25.015265 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Nov 1 04:34:25.015278 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Nov 1 04:34:25.015291 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Nov 1 04:34:25.015303 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Nov 1 04:34:25.015316 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Nov 1 04:34:25.015329 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Nov 1 04:34:25.015341 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Nov 1 04:34:25.015358 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Nov 1 04:34:25.015371 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Nov 1 04:34:25.015384 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Nov 1 04:34:25.015396 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Nov 1 04:34:25.015409 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Nov 1 04:34:25.015421 kernel: iommu: Default domain type: Translated Nov 1 04:34:25.015434 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Nov 1 04:34:25.015607 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Nov 1 04:34:25.015767 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Nov 1 04:34:25.015932 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Nov 1 04:34:25.015960 kernel: vgaarb: loaded Nov 1 04:34:25.015973 kernel: pps_core: LinuxPPS API ver. 1 registered Nov 1 04:34:25.015986 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Nov 1 04:34:25.015999 kernel: PTP clock support registered Nov 1 04:34:25.016018 kernel: PCI: Using ACPI for IRQ routing Nov 1 04:34:25.016031 kernel: PCI: pci_cache_line_size set to 64 bytes Nov 1 04:34:25.016044 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Nov 1 04:34:25.016062 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Nov 1 04:34:25.016075 kernel: clocksource: Switched to clocksource kvm-clock Nov 1 04:34:25.016088 kernel: VFS: Disk quotas dquot_6.6.0 Nov 1 04:34:25.016100 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Nov 1 04:34:25.016124 kernel: pnp: PnP ACPI init Nov 1 04:34:25.016334 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Nov 1 04:34:25.016356 kernel: pnp: PnP ACPI: found 5 devices Nov 1 04:34:25.016369 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Nov 1 04:34:25.016382 kernel: NET: Registered PF_INET protocol family Nov 1 04:34:25.016401 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Nov 1 04:34:25.016414 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Nov 1 04:34:25.016427 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Nov 1 04:34:25.016440 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Nov 1 04:34:25.016452 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Nov 1 04:34:25.016465 kernel: TCP: Hash tables configured (established 16384 bind 16384) Nov 1 04:34:25.016478 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Nov 1 04:34:25.016490 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Nov 1 04:34:25.016507 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Nov 1 04:34:25.016520 kernel: NET: Registered PF_XDP protocol family Nov 1 04:34:25.016690 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Nov 1 04:34:25.016849 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Nov 1 04:34:25.017008 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Nov 1 04:34:25.017180 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Nov 1 04:34:25.017341 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Nov 1 04:34:25.017505 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Nov 1 04:34:25.017676 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Nov 1 04:34:25.017834 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Nov 1 04:34:25.017993 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Nov 1 04:34:25.018163 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Nov 1 04:34:25.018322 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Nov 1 04:34:25.018479 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Nov 1 04:34:25.018657 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Nov 1 04:34:25.018814 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Nov 1 04:34:25.018972 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Nov 1 04:34:25.019148 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Nov 1 04:34:25.019318 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Nov 1 04:34:25.019497 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Nov 1 04:34:25.019675 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Nov 1 04:34:25.019838 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Nov 1 04:34:25.020014 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Nov 1 04:34:25.028273 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Nov 1 04:34:25.028486 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Nov 1 04:34:25.028668 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Nov 1 04:34:25.028832 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Nov 1 04:34:25.028994 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Nov 1 04:34:25.029181 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Nov 1 04:34:25.029344 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Nov 1 04:34:25.029506 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Nov 1 04:34:25.029688 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Nov 1 04:34:25.029855 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Nov 1 04:34:25.030016 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Nov 1 04:34:25.030195 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Nov 1 04:34:25.030355 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Nov 1 04:34:25.030516 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Nov 1 04:34:25.030700 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Nov 1 04:34:25.030862 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Nov 1 04:34:25.031022 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Nov 1 04:34:25.031200 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Nov 1 04:34:25.031383 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Nov 1 04:34:25.031556 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Nov 1 04:34:25.031718 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Nov 1 04:34:25.031881 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Nov 1 04:34:25.032058 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Nov 1 04:34:25.032233 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Nov 1 04:34:25.032412 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Nov 1 04:34:25.032599 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Nov 1 04:34:25.032771 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Nov 1 04:34:25.032940 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Nov 1 04:34:25.033105 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Nov 1 04:34:25.033297 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Nov 1 04:34:25.033450 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Nov 1 04:34:25.033616 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Nov 1 04:34:25.033773 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Nov 1 04:34:25.033922 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Nov 1 04:34:25.034072 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Nov 1 04:34:25.034286 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Nov 1 04:34:25.034448 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Nov 1 04:34:25.034623 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Nov 1 04:34:25.034791 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Nov 1 04:34:25.034984 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Nov 1 04:34:25.048201 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Nov 1 04:34:25.048465 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Nov 1 04:34:25.048676 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Nov 1 04:34:25.048838 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Nov 1 04:34:25.048994 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Nov 1 04:34:25.049194 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Nov 1 04:34:25.049352 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Nov 1 04:34:25.049506 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Nov 1 04:34:25.049692 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Nov 1 04:34:25.049857 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Nov 1 04:34:25.050012 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Nov 1 04:34:25.050200 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Nov 1 04:34:25.050358 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Nov 1 04:34:25.050512 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Nov 1 04:34:25.050737 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Nov 1 04:34:25.050905 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Nov 1 04:34:25.051060 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Nov 1 04:34:25.051251 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Nov 1 04:34:25.051422 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Nov 1 04:34:25.051608 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Nov 1 04:34:25.051630 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Nov 1 04:34:25.051645 kernel: PCI: CLS 0 bytes, default 64 Nov 1 04:34:25.051659 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Nov 1 04:34:25.051679 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Nov 1 04:34:25.051693 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Nov 1 04:34:25.051707 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Nov 1 04:34:25.051722 kernel: Initialise system trusted keyrings Nov 1 04:34:25.051736 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Nov 1 04:34:25.051750 kernel: Key type asymmetric registered Nov 1 04:34:25.051763 kernel: Asymmetric key parser 'x509' registered Nov 1 04:34:25.051776 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Nov 1 04:34:25.051789 kernel: io scheduler mq-deadline registered Nov 1 04:34:25.051807 kernel: io scheduler kyber registered Nov 1 04:34:25.051821 kernel: io scheduler bfq registered Nov 1 04:34:25.051992 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Nov 1 04:34:25.052182 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Nov 1 04:34:25.052343 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Nov 1 04:34:25.052506 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Nov 1 04:34:25.052679 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Nov 1 04:34:25.052846 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Nov 1 04:34:25.053010 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Nov 1 04:34:25.053189 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Nov 1 04:34:25.053360 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Nov 1 04:34:25.053528 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Nov 1 04:34:25.053709 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Nov 1 04:34:25.053877 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Nov 1 04:34:25.054046 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Nov 1 04:34:25.054231 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Nov 1 04:34:25.054396 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Nov 1 04:34:25.054576 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Nov 1 04:34:25.054740 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Nov 1 04:34:25.054911 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Nov 1 04:34:25.055077 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Nov 1 04:34:25.059846 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Nov 1 04:34:25.060022 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Nov 1 04:34:25.060216 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Nov 1 04:34:25.060382 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Nov 1 04:34:25.060565 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Nov 1 04:34:25.060588 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Nov 1 04:34:25.060603 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Nov 1 04:34:25.060618 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Nov 1 04:34:25.060632 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Nov 1 04:34:25.060646 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Nov 1 04:34:25.060660 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Nov 1 04:34:25.060679 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Nov 1 04:34:25.060697 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Nov 1 04:34:25.060711 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Nov 1 04:34:25.060891 kernel: rtc_cmos 00:03: RTC can wake from S4 Nov 1 04:34:25.061047 kernel: rtc_cmos 00:03: registered as rtc0 Nov 1 04:34:25.061214 kernel: rtc_cmos 00:03: setting system clock to 2025-11-01T04:34:24 UTC (1761971664) Nov 1 04:34:25.061385 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Nov 1 04:34:25.061405 kernel: intel_pstate: CPU model not supported Nov 1 04:34:25.061419 kernel: NET: Registered PF_INET6 protocol family Nov 1 04:34:25.061440 kernel: Segment Routing with IPv6 Nov 1 04:34:25.061454 kernel: In-situ OAM (IOAM) with IPv6 Nov 1 04:34:25.061467 kernel: NET: Registered PF_PACKET protocol family Nov 1 04:34:25.061480 kernel: Key type dns_resolver registered Nov 1 04:34:25.061494 kernel: IPI shorthand broadcast: enabled Nov 1 04:34:25.061507 kernel: sched_clock: Marking stable (989563358, 221176680)->(1498892864, -288152826) Nov 1 04:34:25.061521 kernel: registered taskstats version 1 Nov 1 04:34:25.061546 kernel: Loading compiled-in X.509 certificates Nov 1 04:34:25.061561 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: f2055682e6899ad8548fd369019e7b47939b46a0' Nov 1 04:34:25.061580 kernel: Key type .fscrypt registered Nov 1 04:34:25.061593 kernel: Key type fscrypt-provisioning registered Nov 1 04:34:25.061606 kernel: ima: No TPM chip found, activating TPM-bypass! Nov 1 04:34:25.061620 kernel: ima: Allocated hash algorithm: sha1 Nov 1 04:34:25.061633 kernel: ima: No architecture policies found Nov 1 04:34:25.061646 kernel: clk: Disabling unused clocks Nov 1 04:34:25.061659 kernel: Freeing unused kernel image (initmem) memory: 47496K Nov 1 04:34:25.061673 kernel: Write protecting the kernel read-only data: 28672k Nov 1 04:34:25.061690 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Nov 1 04:34:25.061703 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Nov 1 04:34:25.061717 kernel: Run /init as init process Nov 1 04:34:25.061730 kernel: with arguments: Nov 1 04:34:25.061744 kernel: /init Nov 1 04:34:25.061756 kernel: with environment: Nov 1 04:34:25.061770 kernel: HOME=/ Nov 1 04:34:25.061782 kernel: TERM=linux Nov 1 04:34:25.061795 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Nov 1 04:34:25.061820 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 04:34:25.061844 systemd[1]: Detected virtualization kvm. Nov 1 04:34:25.061859 systemd[1]: Detected architecture x86-64. Nov 1 04:34:25.061872 systemd[1]: Running in initrd. Nov 1 04:34:25.061886 systemd[1]: No hostname configured, using default hostname. Nov 1 04:34:25.061900 systemd[1]: Hostname set to . Nov 1 04:34:25.061914 systemd[1]: Initializing machine ID from VM UUID. Nov 1 04:34:25.061928 systemd[1]: Queued start job for default target initrd.target. Nov 1 04:34:25.061947 systemd[1]: Started systemd-ask-password-console.path. Nov 1 04:34:25.061960 systemd[1]: Reached target cryptsetup.target. Nov 1 04:34:25.061975 systemd[1]: Reached target paths.target. Nov 1 04:34:25.061989 systemd[1]: Reached target slices.target. Nov 1 04:34:25.062002 systemd[1]: Reached target swap.target. Nov 1 04:34:25.062016 systemd[1]: Reached target timers.target. Nov 1 04:34:25.062031 systemd[1]: Listening on iscsid.socket. Nov 1 04:34:25.062049 systemd[1]: Listening on iscsiuio.socket. Nov 1 04:34:25.062064 systemd[1]: Listening on systemd-journald-audit.socket. Nov 1 04:34:25.062078 systemd[1]: Listening on systemd-journald-dev-log.socket. Nov 1 04:34:25.062092 systemd[1]: Listening on systemd-journald.socket. Nov 1 04:34:25.062106 systemd[1]: Listening on systemd-networkd.socket. Nov 1 04:34:25.062138 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 04:34:25.062154 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 04:34:25.062168 systemd[1]: Reached target sockets.target. Nov 1 04:34:25.062182 systemd[1]: Starting kmod-static-nodes.service... Nov 1 04:34:25.062202 systemd[1]: Finished network-cleanup.service. Nov 1 04:34:25.062216 systemd[1]: Starting systemd-fsck-usr.service... Nov 1 04:34:25.062231 systemd[1]: Starting systemd-journald.service... Nov 1 04:34:25.062249 systemd[1]: Starting systemd-modules-load.service... Nov 1 04:34:25.062264 systemd[1]: Starting systemd-resolved.service... Nov 1 04:34:25.062278 systemd[1]: Starting systemd-vconsole-setup.service... Nov 1 04:34:25.062292 systemd[1]: Finished kmod-static-nodes.service. Nov 1 04:34:25.062306 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Nov 1 04:34:25.062336 systemd-journald[201]: Journal started Nov 1 04:34:25.062421 systemd-journald[201]: Runtime Journal (/run/log/journal/e3aa9a0c552f4eed8b431b939c4e4d3b) is 4.7M, max 38.1M, 33.3M free. Nov 1 04:34:24.981170 systemd-modules-load[202]: Inserted module 'overlay' Nov 1 04:34:25.076303 kernel: Bridge firewalling registered Nov 1 04:34:25.031640 systemd-resolved[203]: Positive Trust Anchors: Nov 1 04:34:25.090038 systemd[1]: Started systemd-resolved.service. Nov 1 04:34:25.090073 kernel: audit: type=1130 audit(1761971665.076:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.090106 kernel: audit: type=1130 audit(1761971665.083:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.090145 systemd[1]: Started systemd-journald.service. Nov 1 04:34:25.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.031665 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 04:34:25.031711 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 04:34:25.104251 kernel: SCSI subsystem initialized Nov 1 04:34:25.104283 kernel: audit: type=1130 audit(1761971665.095:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.040791 systemd-resolved[203]: Defaulting to hostname 'linux'. Nov 1 04:34:25.064349 systemd-modules-load[202]: Inserted module 'br_netfilter' Nov 1 04:34:25.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.096503 systemd[1]: Finished systemd-fsck-usr.service. Nov 1 04:34:25.119158 kernel: audit: type=1130 audit(1761971665.104:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.119200 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Nov 1 04:34:25.119220 kernel: device-mapper: uevent: version 1.0.3 Nov 1 04:34:25.119238 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Nov 1 04:34:25.106566 systemd[1]: Finished systemd-vconsole-setup.service. Nov 1 04:34:25.120512 systemd[1]: Reached target nss-lookup.target. Nov 1 04:34:25.122040 systemd-modules-load[202]: Inserted module 'dm_multipath' Nov 1 04:34:25.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.123654 systemd[1]: Starting dracut-cmdline-ask.service... Nov 1 04:34:25.129072 kernel: audit: type=1130 audit(1761971665.119:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.129527 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Nov 1 04:34:25.134183 systemd[1]: Finished systemd-modules-load.service. Nov 1 04:34:25.137714 systemd[1]: Starting systemd-sysctl.service... Nov 1 04:34:25.144663 kernel: audit: type=1130 audit(1761971665.134:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.147975 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Nov 1 04:34:25.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.158967 systemd[1]: Finished dracut-cmdline-ask.service. Nov 1 04:34:25.160438 kernel: audit: type=1130 audit(1761971665.148:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.160085 systemd[1]: Finished systemd-sysctl.service. Nov 1 04:34:25.166519 kernel: audit: type=1130 audit(1761971665.159:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.186752 systemd[1]: Starting dracut-cmdline.service... Nov 1 04:34:25.187621 kernel: audit: type=1130 audit(1761971665.166:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.200367 dracut-cmdline[225]: dracut-dracut-053 Nov 1 04:34:25.203464 dracut-cmdline[225]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=c4c72a4f851a6da01cbc7150799371516ef8311ea786098908d8eb164df01ee2 Nov 1 04:34:25.288157 kernel: Loading iSCSI transport class v2.0-870. Nov 1 04:34:25.311172 kernel: iscsi: registered transport (tcp) Nov 1 04:34:25.340743 kernel: iscsi: registered transport (qla4xxx) Nov 1 04:34:25.340863 kernel: QLogic iSCSI HBA Driver Nov 1 04:34:25.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.391190 systemd[1]: Finished dracut-cmdline.service. Nov 1 04:34:25.394261 systemd[1]: Starting dracut-pre-udev.service... Nov 1 04:34:25.453212 kernel: raid6: sse2x4 gen() 7835 MB/s Nov 1 04:34:25.471176 kernel: raid6: sse2x4 xor() 5050 MB/s Nov 1 04:34:25.489188 kernel: raid6: sse2x2 gen() 5311 MB/s Nov 1 04:34:25.507175 kernel: raid6: sse2x2 xor() 7969 MB/s Nov 1 04:34:25.525227 kernel: raid6: sse2x1 gen() 5103 MB/s Nov 1 04:34:25.543872 kernel: raid6: sse2x1 xor() 7140 MB/s Nov 1 04:34:25.543970 kernel: raid6: using algorithm sse2x4 gen() 7835 MB/s Nov 1 04:34:25.543989 kernel: raid6: .... xor() 5050 MB/s, rmw enabled Nov 1 04:34:25.545166 kernel: raid6: using ssse3x2 recovery algorithm Nov 1 04:34:25.563161 kernel: xor: automatically using best checksumming function avx Nov 1 04:34:25.683156 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Nov 1 04:34:25.696509 systemd[1]: Finished dracut-pre-udev.service. Nov 1 04:34:25.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.697000 audit: BPF prog-id=7 op=LOAD Nov 1 04:34:25.697000 audit: BPF prog-id=8 op=LOAD Nov 1 04:34:25.698517 systemd[1]: Starting systemd-udevd.service... Nov 1 04:34:25.715958 systemd-udevd[402]: Using default interface naming scheme 'v252'. Nov 1 04:34:25.724545 systemd[1]: Started systemd-udevd.service. Nov 1 04:34:25.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.730592 systemd[1]: Starting dracut-pre-trigger.service... Nov 1 04:34:25.749673 dracut-pre-trigger[414]: rd.md=0: removing MD RAID activation Nov 1 04:34:25.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.793053 systemd[1]: Finished dracut-pre-trigger.service. Nov 1 04:34:25.795036 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 04:34:25.892110 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 04:34:25.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:25.976298 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Nov 1 04:34:26.046902 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Nov 1 04:34:26.046933 kernel: GPT:17805311 != 125829119 Nov 1 04:34:26.046951 kernel: GPT:Alternate GPT header not at the end of the disk. Nov 1 04:34:26.046983 kernel: GPT:17805311 != 125829119 Nov 1 04:34:26.047002 kernel: GPT: Use GNU Parted to correct GPT errors. Nov 1 04:34:26.047018 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Nov 1 04:34:26.047035 kernel: cryptd: max_cpu_qlen set to 1000 Nov 1 04:34:26.047051 kernel: AVX version of gcm_enc/dec engaged. Nov 1 04:34:26.050142 kernel: AES CTR mode by8 optimization enabled Nov 1 04:34:26.061152 kernel: ACPI: bus type USB registered Nov 1 04:34:26.061226 kernel: usbcore: registered new interface driver usbfs Nov 1 04:34:26.064139 kernel: usbcore: registered new interface driver hub Nov 1 04:34:26.064182 kernel: usbcore: registered new device driver usb Nov 1 04:34:26.071157 kernel: libata version 3.00 loaded. Nov 1 04:34:26.079142 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (459) Nov 1 04:34:26.101972 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Nov 1 04:34:26.216626 kernel: ahci 0000:00:1f.2: version 3.0 Nov 1 04:34:26.216931 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Nov 1 04:34:26.216957 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Nov 1 04:34:26.217203 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Nov 1 04:34:26.217389 kernel: scsi host0: ahci Nov 1 04:34:26.217620 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Nov 1 04:34:26.217816 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Nov 1 04:34:26.217999 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Nov 1 04:34:26.218197 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Nov 1 04:34:26.218376 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Nov 1 04:34:26.218581 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Nov 1 04:34:26.218763 kernel: hub 1-0:1.0: USB hub found Nov 1 04:34:26.218974 kernel: hub 1-0:1.0: 4 ports detected Nov 1 04:34:26.219190 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Nov 1 04:34:26.219491 kernel: hub 2-0:1.0: USB hub found Nov 1 04:34:26.219731 kernel: hub 2-0:1.0: 4 ports detected Nov 1 04:34:26.219944 kernel: scsi host1: ahci Nov 1 04:34:26.220172 kernel: scsi host2: ahci Nov 1 04:34:26.220366 kernel: scsi host3: ahci Nov 1 04:34:26.220567 kernel: scsi host4: ahci Nov 1 04:34:26.220755 kernel: scsi host5: ahci Nov 1 04:34:26.220943 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Nov 1 04:34:26.220964 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Nov 1 04:34:26.220988 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Nov 1 04:34:26.221005 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Nov 1 04:34:26.221022 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Nov 1 04:34:26.221039 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Nov 1 04:34:26.215639 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Nov 1 04:34:26.221958 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Nov 1 04:34:26.228342 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Nov 1 04:34:26.234709 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 04:34:26.236721 systemd[1]: Starting disk-uuid.service... Nov 1 04:34:26.248143 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Nov 1 04:34:26.251568 disk-uuid[529]: Primary Header is updated. Nov 1 04:34:26.251568 disk-uuid[529]: Secondary Entries is updated. Nov 1 04:34:26.251568 disk-uuid[529]: Secondary Header is updated. Nov 1 04:34:26.389242 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Nov 1 04:34:26.474153 kernel: ata5: SATA link down (SStatus 0 SControl 300) Nov 1 04:34:26.474284 kernel: ata6: SATA link down (SStatus 0 SControl 300) Nov 1 04:34:26.477370 kernel: ata1: SATA link down (SStatus 0 SControl 300) Nov 1 04:34:26.478145 kernel: ata4: SATA link down (SStatus 0 SControl 300) Nov 1 04:34:26.482489 kernel: ata2: SATA link down (SStatus 0 SControl 300) Nov 1 04:34:26.482588 kernel: ata3: SATA link down (SStatus 0 SControl 300) Nov 1 04:34:26.530151 kernel: hid: raw HID events driver (C) Jiri Kosina Nov 1 04:34:26.536627 kernel: usbcore: registered new interface driver usbhid Nov 1 04:34:26.536723 kernel: usbhid: USB HID core driver Nov 1 04:34:26.546154 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Nov 1 04:34:26.546196 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Nov 1 04:34:27.267194 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Nov 1 04:34:27.268085 disk-uuid[530]: The operation has completed successfully. Nov 1 04:34:27.274141 kernel: block device autoloading is deprecated and will be removed. Nov 1 04:34:27.330623 systemd[1]: disk-uuid.service: Deactivated successfully. Nov 1 04:34:27.331959 systemd[1]: Finished disk-uuid.service. Nov 1 04:34:27.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.339357 systemd[1]: Starting verity-setup.service... Nov 1 04:34:27.359151 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Nov 1 04:34:27.406725 systemd[1]: Found device dev-mapper-usr.device. Nov 1 04:34:27.408737 systemd[1]: Mounting sysusr-usr.mount... Nov 1 04:34:27.410731 systemd[1]: Finished verity-setup.service. Nov 1 04:34:27.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.509147 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Nov 1 04:34:27.510039 systemd[1]: Mounted sysusr-usr.mount. Nov 1 04:34:27.510923 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Nov 1 04:34:27.512096 systemd[1]: Starting ignition-setup.service... Nov 1 04:34:27.513899 systemd[1]: Starting parse-ip-for-networkd.service... Nov 1 04:34:27.535052 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Nov 1 04:34:27.535174 kernel: BTRFS info (device vda6): using free space tree Nov 1 04:34:27.535197 kernel: BTRFS info (device vda6): has skinny extents Nov 1 04:34:27.551209 systemd[1]: mnt-oem.mount: Deactivated successfully. Nov 1 04:34:27.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.559358 systemd[1]: Finished ignition-setup.service. Nov 1 04:34:27.562135 systemd[1]: Starting ignition-fetch-offline.service... Nov 1 04:34:27.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.661716 systemd[1]: Finished parse-ip-for-networkd.service. Nov 1 04:34:27.663000 audit: BPF prog-id=9 op=LOAD Nov 1 04:34:27.664903 systemd[1]: Starting systemd-networkd.service... Nov 1 04:34:27.703970 systemd-networkd[713]: lo: Link UP Nov 1 04:34:27.703989 systemd-networkd[713]: lo: Gained carrier Nov 1 04:34:27.705783 systemd-networkd[713]: Enumeration completed Nov 1 04:34:27.706219 systemd-networkd[713]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 04:34:27.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.708503 systemd-networkd[713]: eth0: Link UP Nov 1 04:34:27.708512 systemd-networkd[713]: eth0: Gained carrier Nov 1 04:34:27.708870 systemd[1]: Started systemd-networkd.service. Nov 1 04:34:27.710359 systemd[1]: Reached target network.target. Nov 1 04:34:27.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.712442 systemd[1]: Starting iscsiuio.service... Nov 1 04:34:27.724339 systemd[1]: Started iscsiuio.service. Nov 1 04:34:27.737043 systemd[1]: Starting iscsid.service... Nov 1 04:34:27.742939 iscsid[718]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Nov 1 04:34:27.742939 iscsid[718]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Nov 1 04:34:27.742939 iscsid[718]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Nov 1 04:34:27.742939 iscsid[718]: If using hardware iscsi like qla4xxx this message can be ignored. Nov 1 04:34:27.742939 iscsid[718]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Nov 1 04:34:27.742939 iscsid[718]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Nov 1 04:34:27.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.747793 systemd[1]: Started iscsid.service. Nov 1 04:34:27.753432 systemd[1]: Starting dracut-initqueue.service... Nov 1 04:34:27.765653 ignition[641]: Ignition 2.14.0 Nov 1 04:34:27.765680 ignition[641]: Stage: fetch-offline Nov 1 04:34:27.765851 ignition[641]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 04:34:27.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.765900 ignition[641]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Nov 1 04:34:27.769422 systemd[1]: Finished ignition-fetch-offline.service. Nov 1 04:34:27.767681 ignition[641]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Nov 1 04:34:27.771544 systemd-networkd[713]: eth0: DHCPv4 address 10.244.11.230/30, gateway 10.244.11.229 acquired from 10.244.11.229 Nov 1 04:34:27.767860 ignition[641]: parsed url from cmdline: "" Nov 1 04:34:27.772927 systemd[1]: Starting ignition-fetch.service... Nov 1 04:34:27.767869 ignition[641]: no config URL provided Nov 1 04:34:27.767880 ignition[641]: reading system config file "/usr/lib/ignition/user.ign" Nov 1 04:34:27.767897 ignition[641]: no config at "/usr/lib/ignition/user.ign" Nov 1 04:34:27.767925 ignition[641]: failed to fetch config: resource requires networking Nov 1 04:34:27.768333 ignition[641]: Ignition finished successfully Nov 1 04:34:27.784926 ignition[724]: Ignition 2.14.0 Nov 1 04:34:27.784944 ignition[724]: Stage: fetch Nov 1 04:34:27.785098 ignition[724]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 04:34:27.785149 ignition[724]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Nov 1 04:34:27.788256 systemd[1]: Finished dracut-initqueue.service. Nov 1 04:34:27.786541 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Nov 1 04:34:27.786731 ignition[724]: parsed url from cmdline: "" Nov 1 04:34:27.786740 ignition[724]: no config URL provided Nov 1 04:34:27.786751 ignition[724]: reading system config file "/usr/lib/ignition/user.ign" Nov 1 04:34:27.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.792703 systemd[1]: Reached target remote-fs-pre.target. Nov 1 04:34:27.786768 ignition[724]: no config at "/usr/lib/ignition/user.ign" Nov 1 04:34:27.793335 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 04:34:27.792176 ignition[724]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Nov 1 04:34:27.793944 systemd[1]: Reached target remote-fs.target. Nov 1 04:34:27.792244 ignition[724]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Nov 1 04:34:27.797311 systemd[1]: Starting dracut-pre-mount.service... Nov 1 04:34:27.794370 ignition[724]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Nov 1 04:34:27.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.811165 systemd[1]: Finished dracut-pre-mount.service. Nov 1 04:34:27.819283 ignition[724]: GET result: OK Nov 1 04:34:27.819926 ignition[724]: parsing config with SHA512: 484cbef8195ac1e875e8872eb17f98a5466e44af6e27adf82a724afaaa056884f8b08bb4dc712869b2cf0d0aeea1ccdb75a80991b04ee15206d584130a964b3e Nov 1 04:34:27.829161 unknown[724]: fetched base config from "system" Nov 1 04:34:27.829180 unknown[724]: fetched base config from "system" Nov 1 04:34:27.829733 ignition[724]: fetch: fetch complete Nov 1 04:34:27.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.829191 unknown[724]: fetched user config from "openstack" Nov 1 04:34:27.829742 ignition[724]: fetch: fetch passed Nov 1 04:34:27.831610 systemd[1]: Finished ignition-fetch.service. Nov 1 04:34:27.829811 ignition[724]: Ignition finished successfully Nov 1 04:34:27.833845 systemd[1]: Starting ignition-kargs.service... Nov 1 04:34:27.848518 ignition[738]: Ignition 2.14.0 Nov 1 04:34:27.848540 ignition[738]: Stage: kargs Nov 1 04:34:27.848728 ignition[738]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 04:34:27.848764 ignition[738]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Nov 1 04:34:27.850231 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Nov 1 04:34:27.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.852939 systemd[1]: Finished ignition-kargs.service. Nov 1 04:34:27.851731 ignition[738]: kargs: kargs passed Nov 1 04:34:27.851807 ignition[738]: Ignition finished successfully Nov 1 04:34:27.855277 systemd[1]: Starting ignition-disks.service... Nov 1 04:34:27.866425 ignition[743]: Ignition 2.14.0 Nov 1 04:34:27.867498 ignition[743]: Stage: disks Nov 1 04:34:27.868322 ignition[743]: reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 04:34:27.869290 ignition[743]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Nov 1 04:34:27.870681 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Nov 1 04:34:27.873139 ignition[743]: disks: disks passed Nov 1 04:34:27.873879 ignition[743]: Ignition finished successfully Nov 1 04:34:27.875693 systemd[1]: Finished ignition-disks.service. Nov 1 04:34:27.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.876626 systemd[1]: Reached target initrd-root-device.target. Nov 1 04:34:27.877657 systemd[1]: Reached target local-fs-pre.target. Nov 1 04:34:27.878868 systemd[1]: Reached target local-fs.target. Nov 1 04:34:27.880110 systemd[1]: Reached target sysinit.target. Nov 1 04:34:27.881332 systemd[1]: Reached target basic.target. Nov 1 04:34:27.883947 systemd[1]: Starting systemd-fsck-root.service... Nov 1 04:34:27.903826 systemd-fsck[750]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Nov 1 04:34:27.909053 systemd[1]: Finished systemd-fsck-root.service. Nov 1 04:34:27.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:27.910943 systemd[1]: Mounting sysroot.mount... Nov 1 04:34:27.924621 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Nov 1 04:34:27.924013 systemd[1]: Mounted sysroot.mount. Nov 1 04:34:27.925352 systemd[1]: Reached target initrd-root-fs.target. Nov 1 04:34:27.927658 systemd[1]: Mounting sysroot-usr.mount... Nov 1 04:34:27.928941 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Nov 1 04:34:27.929958 systemd[1]: Starting flatcar-openstack-hostname.service... Nov 1 04:34:27.933244 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Nov 1 04:34:27.933287 systemd[1]: Reached target ignition-diskful.target. Nov 1 04:34:27.936566 systemd[1]: Mounted sysroot-usr.mount. Nov 1 04:34:27.940995 systemd[1]: Starting initrd-setup-root.service... Nov 1 04:34:27.950734 initrd-setup-root[761]: cut: /sysroot/etc/passwd: No such file or directory Nov 1 04:34:27.962989 initrd-setup-root[769]: cut: /sysroot/etc/group: No such file or directory Nov 1 04:34:27.972193 initrd-setup-root[777]: cut: /sysroot/etc/shadow: No such file or directory Nov 1 04:34:27.983658 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory Nov 1 04:34:28.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:28.048731 systemd[1]: Finished initrd-setup-root.service. Nov 1 04:34:28.051054 systemd[1]: Starting ignition-mount.service... Nov 1 04:34:28.059625 systemd[1]: Starting sysroot-boot.service... Nov 1 04:34:28.069528 bash[804]: umount: /sysroot/usr/share/oem: not mounted. Nov 1 04:34:28.084040 ignition[806]: INFO : Ignition 2.14.0 Nov 1 04:34:28.085730 ignition[806]: INFO : Stage: mount Nov 1 04:34:28.086993 coreos-metadata[756]: Nov 01 04:34:28.086 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Nov 1 04:34:28.089762 ignition[806]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 04:34:28.091240 ignition[806]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Nov 1 04:34:28.094316 ignition[806]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Nov 1 04:34:28.097271 ignition[806]: INFO : mount: mount passed Nov 1 04:34:28.098033 ignition[806]: INFO : Ignition finished successfully Nov 1 04:34:28.100218 systemd[1]: Finished ignition-mount.service. Nov 1 04:34:28.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:28.105103 systemd[1]: Finished sysroot-boot.service. Nov 1 04:34:28.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:28.109153 coreos-metadata[756]: Nov 01 04:34:28.107 INFO Fetch successful Nov 1 04:34:28.109153 coreos-metadata[756]: Nov 01 04:34:28.108 INFO wrote hostname srv-cigeh.gb1.brightbox.com to /sysroot/etc/hostname Nov 1 04:34:28.112009 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Nov 1 04:34:28.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:28.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:28.112159 systemd[1]: Finished flatcar-openstack-hostname.service. Nov 1 04:34:28.431635 systemd[1]: Mounting sysroot-usr-share-oem.mount... Nov 1 04:34:28.453276 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (813) Nov 1 04:34:28.453318 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Nov 1 04:34:28.453338 kernel: BTRFS info (device vda6): using free space tree Nov 1 04:34:28.453363 kernel: BTRFS info (device vda6): has skinny extents Nov 1 04:34:28.459887 systemd[1]: Mounted sysroot-usr-share-oem.mount. Nov 1 04:34:28.461847 systemd[1]: Starting ignition-files.service... Nov 1 04:34:28.483692 ignition[833]: INFO : Ignition 2.14.0 Nov 1 04:34:28.483692 ignition[833]: INFO : Stage: files Nov 1 04:34:28.485576 ignition[833]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 04:34:28.485576 ignition[833]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Nov 1 04:34:28.485576 ignition[833]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Nov 1 04:34:28.488795 ignition[833]: DEBUG : files: compiled without relabeling support, skipping Nov 1 04:34:28.488795 ignition[833]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Nov 1 04:34:28.488795 ignition[833]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Nov 1 04:34:28.492651 ignition[833]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Nov 1 04:34:28.494192 ignition[833]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Nov 1 04:34:28.497009 ignition[833]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Nov 1 04:34:28.497009 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Nov 1 04:34:28.497009 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 Nov 1 04:34:28.495091 unknown[833]: wrote ssh authorized keys file for user: core Nov 1 04:34:28.690283 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Nov 1 04:34:28.885086 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" Nov 1 04:34:28.886566 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Nov 1 04:34:28.886566 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Nov 1 04:34:28.886566 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Nov 1 04:34:28.886566 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Nov 1 04:34:28.886566 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Nov 1 04:34:28.891862 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Nov 1 04:34:28.891862 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Nov 1 04:34:28.891862 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Nov 1 04:34:28.891862 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 04:34:28.891862 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Nov 1 04:34:28.891862 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Nov 1 04:34:28.891862 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Nov 1 04:34:28.891862 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Nov 1 04:34:28.891862 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 Nov 1 04:34:29.385560 systemd-networkd[713]: eth0: Gained IPv6LL Nov 1 04:34:29.387423 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Nov 1 04:34:30.902943 systemd-networkd[713]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:2f9:24:19ff:fef4:be6/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:2f9:24:19ff:fef4:be6/64 assigned by NDisc. Nov 1 04:34:30.902966 systemd-networkd[713]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Nov 1 04:34:31.957820 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" Nov 1 04:34:31.961387 ignition[833]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Nov 1 04:34:31.962583 ignition[833]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Nov 1 04:34:31.962583 ignition[833]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Nov 1 04:34:31.964581 ignition[833]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Nov 1 04:34:31.966484 ignition[833]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Nov 1 04:34:31.966484 ignition[833]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Nov 1 04:34:31.966484 ignition[833]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 04:34:31.966484 ignition[833]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Nov 1 04:34:31.966484 ignition[833]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Nov 1 04:34:31.966484 ignition[833]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Nov 1 04:34:31.976188 ignition[833]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Nov 1 04:34:31.976188 ignition[833]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Nov 1 04:34:31.976188 ignition[833]: INFO : files: files passed Nov 1 04:34:31.976188 ignition[833]: INFO : Ignition finished successfully Nov 1 04:34:31.993889 kernel: kauditd_printk_skb: 28 callbacks suppressed Nov 1 04:34:31.993932 kernel: audit: type=1130 audit(1761971671.980:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:31.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:31.977888 systemd[1]: Finished ignition-files.service. Nov 1 04:34:31.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:31.984338 systemd[1]: Starting initrd-setup-root-after-ignition.service... Nov 1 04:34:32.006479 kernel: audit: type=1130 audit(1761971671.995:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.006523 kernel: audit: type=1131 audit(1761971672.000:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:31.989214 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Nov 1 04:34:31.990463 systemd[1]: Starting ignition-quench.service... Nov 1 04:34:31.994916 systemd[1]: ignition-quench.service: Deactivated successfully. Nov 1 04:34:31.995070 systemd[1]: Finished ignition-quench.service. Nov 1 04:34:32.011178 initrd-setup-root-after-ignition[858]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Nov 1 04:34:32.012679 systemd[1]: Finished initrd-setup-root-after-ignition.service. Nov 1 04:34:32.013561 systemd[1]: Reached target ignition-complete.target. Nov 1 04:34:32.015390 systemd[1]: Starting initrd-parse-etc.service... Nov 1 04:34:32.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.023149 kernel: audit: type=1130 audit(1761971672.013:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.042654 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Nov 1 04:34:32.043421 systemd[1]: Finished initrd-parse-etc.service. Nov 1 04:34:32.055758 kernel: audit: type=1130 audit(1761971672.045:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.055800 kernel: audit: type=1131 audit(1761971672.045:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.045804 systemd[1]: Reached target initrd-fs.target. Nov 1 04:34:32.056385 systemd[1]: Reached target initrd.target. Nov 1 04:34:32.057690 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Nov 1 04:34:32.059049 systemd[1]: Starting dracut-pre-pivot.service... Nov 1 04:34:32.082257 kernel: audit: type=1130 audit(1761971672.076:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.075937 systemd[1]: Finished dracut-pre-pivot.service. Nov 1 04:34:32.077888 systemd[1]: Starting initrd-cleanup.service... Nov 1 04:34:32.091266 systemd[1]: Stopped target nss-lookup.target. Nov 1 04:34:32.092143 systemd[1]: Stopped target remote-cryptsetup.target. Nov 1 04:34:32.093483 systemd[1]: Stopped target timers.target. Nov 1 04:34:32.094691 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Nov 1 04:34:32.114726 kernel: audit: type=1131 audit(1761971672.109:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.094860 systemd[1]: Stopped dracut-pre-pivot.service. Nov 1 04:34:32.109635 systemd[1]: Stopped target initrd.target. Nov 1 04:34:32.115439 systemd[1]: Stopped target basic.target. Nov 1 04:34:32.139151 kernel: audit: type=1131 audit(1761971672.122:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.139230 kernel: audit: type=1131 audit(1761971672.127:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.139450 iscsid[718]: iscsid shutting down. Nov 1 04:34:32.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.118201 systemd[1]: Stopped target ignition-complete.target. Nov 1 04:34:32.119046 systemd[1]: Stopped target ignition-diskful.target. Nov 1 04:34:32.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.119880 systemd[1]: Stopped target initrd-root-device.target. Nov 1 04:34:32.120717 systemd[1]: Stopped target remote-fs.target. Nov 1 04:34:32.121517 systemd[1]: Stopped target remote-fs-pre.target. Nov 1 04:34:32.122391 systemd[1]: Stopped target sysinit.target. Nov 1 04:34:32.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.123231 systemd[1]: Stopped target local-fs.target. Nov 1 04:34:32.124015 systemd[1]: Stopped target local-fs-pre.target. Nov 1 04:34:32.124926 systemd[1]: Stopped target swap.target. Nov 1 04:34:32.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.125635 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Nov 1 04:34:32.166790 ignition[871]: INFO : Ignition 2.14.0 Nov 1 04:34:32.166790 ignition[871]: INFO : Stage: umount Nov 1 04:34:32.166790 ignition[871]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Nov 1 04:34:32.166790 ignition[871]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Nov 1 04:34:32.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.125882 systemd[1]: Stopped dracut-pre-mount.service. Nov 1 04:34:32.178670 ignition[871]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Nov 1 04:34:32.178670 ignition[871]: INFO : umount: umount passed Nov 1 04:34:32.178670 ignition[871]: INFO : Ignition finished successfully Nov 1 04:34:32.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.126827 systemd[1]: Stopped target cryptsetup.target. Nov 1 04:34:32.127562 systemd[1]: dracut-initqueue.service: Deactivated successfully. Nov 1 04:34:32.127771 systemd[1]: Stopped dracut-initqueue.service. Nov 1 04:34:32.128721 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Nov 1 04:34:32.128939 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Nov 1 04:34:32.129842 systemd[1]: ignition-files.service: Deactivated successfully. Nov 1 04:34:32.130065 systemd[1]: Stopped ignition-files.service. Nov 1 04:34:32.132378 systemd[1]: Stopping ignition-mount.service... Nov 1 04:34:32.133419 systemd[1]: Stopping iscsid.service... Nov 1 04:34:32.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.133993 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Nov 1 04:34:32.134240 systemd[1]: Stopped kmod-static-nodes.service. Nov 1 04:34:32.147357 systemd[1]: Stopping sysroot-boot.service... Nov 1 04:34:32.148926 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Nov 1 04:34:32.149339 systemd[1]: Stopped systemd-udev-trigger.service. Nov 1 04:34:32.154575 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Nov 1 04:34:32.154816 systemd[1]: Stopped dracut-pre-trigger.service. Nov 1 04:34:32.160099 systemd[1]: iscsid.service: Deactivated successfully. Nov 1 04:34:32.161286 systemd[1]: Stopped iscsid.service. Nov 1 04:34:32.163824 systemd[1]: Stopping iscsiuio.service... Nov 1 04:34:32.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.166246 systemd[1]: initrd-cleanup.service: Deactivated successfully. Nov 1 04:34:32.166378 systemd[1]: Finished initrd-cleanup.service. Nov 1 04:34:32.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.209000 audit: BPF prog-id=6 op=UNLOAD Nov 1 04:34:32.169186 systemd[1]: iscsiuio.service: Deactivated successfully. Nov 1 04:34:32.169321 systemd[1]: Stopped iscsiuio.service. Nov 1 04:34:32.171893 systemd[1]: ignition-mount.service: Deactivated successfully. Nov 1 04:34:32.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.172016 systemd[1]: Stopped ignition-mount.service. Nov 1 04:34:32.172741 systemd[1]: ignition-disks.service: Deactivated successfully. Nov 1 04:34:32.172806 systemd[1]: Stopped ignition-disks.service. Nov 1 04:34:32.173472 systemd[1]: ignition-kargs.service: Deactivated successfully. Nov 1 04:34:32.173531 systemd[1]: Stopped ignition-kargs.service. Nov 1 04:34:32.174184 systemd[1]: ignition-fetch.service: Deactivated successfully. Nov 1 04:34:32.174243 systemd[1]: Stopped ignition-fetch.service. Nov 1 04:34:32.176265 systemd[1]: Stopped target network.target. Nov 1 04:34:32.177849 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Nov 1 04:34:32.177920 systemd[1]: Stopped ignition-fetch-offline.service. Nov 1 04:34:32.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.179309 systemd[1]: Stopped target paths.target. Nov 1 04:34:32.184201 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Nov 1 04:34:32.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.188425 systemd[1]: Stopped systemd-ask-password-console.path. Nov 1 04:34:32.189369 systemd[1]: Stopped target slices.target. Nov 1 04:34:32.189920 systemd[1]: Stopped target sockets.target. Nov 1 04:34:32.190551 systemd[1]: iscsid.socket: Deactivated successfully. Nov 1 04:34:32.190613 systemd[1]: Closed iscsid.socket. Nov 1 04:34:32.191202 systemd[1]: iscsiuio.socket: Deactivated successfully. Nov 1 04:34:32.191260 systemd[1]: Closed iscsiuio.socket. Nov 1 04:34:32.191840 systemd[1]: ignition-setup.service: Deactivated successfully. Nov 1 04:34:32.191930 systemd[1]: Stopped ignition-setup.service. Nov 1 04:34:32.193415 systemd[1]: Stopping systemd-networkd.service... Nov 1 04:34:32.195015 systemd[1]: Stopping systemd-resolved.service... Nov 1 04:34:32.198184 systemd-networkd[713]: eth0: DHCPv6 lease lost Nov 1 04:34:32.248000 audit: BPF prog-id=9 op=UNLOAD Nov 1 04:34:32.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.204006 systemd[1]: sysroot-boot.mount: Deactivated successfully. Nov 1 04:34:32.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.204875 systemd[1]: systemd-resolved.service: Deactivated successfully. Nov 1 04:34:32.205052 systemd[1]: Stopped systemd-resolved.service. Nov 1 04:34:32.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.207019 systemd[1]: systemd-networkd.service: Deactivated successfully. Nov 1 04:34:32.207240 systemd[1]: Stopped systemd-networkd.service. Nov 1 04:34:32.209484 systemd[1]: systemd-networkd.socket: Deactivated successfully. Nov 1 04:34:32.209542 systemd[1]: Closed systemd-networkd.socket. Nov 1 04:34:32.211890 systemd[1]: Stopping network-cleanup.service... Nov 1 04:34:32.214192 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Nov 1 04:34:32.214277 systemd[1]: Stopped parse-ip-for-networkd.service. Nov 1 04:34:32.215148 systemd[1]: systemd-sysctl.service: Deactivated successfully. Nov 1 04:34:32.215260 systemd[1]: Stopped systemd-sysctl.service. Nov 1 04:34:32.215997 systemd[1]: systemd-modules-load.service: Deactivated successfully. Nov 1 04:34:32.216059 systemd[1]: Stopped systemd-modules-load.service. Nov 1 04:34:32.220929 systemd[1]: Stopping systemd-udevd.service... Nov 1 04:34:32.223926 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Nov 1 04:34:32.228014 systemd[1]: network-cleanup.service: Deactivated successfully. Nov 1 04:34:32.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.228174 systemd[1]: Stopped network-cleanup.service. Nov 1 04:34:32.232472 systemd[1]: systemd-udevd.service: Deactivated successfully. Nov 1 04:34:32.233282 systemd[1]: Stopped systemd-udevd.service. Nov 1 04:34:32.238353 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Nov 1 04:34:32.238433 systemd[1]: Closed systemd-udevd-control.socket. Nov 1 04:34:32.239645 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Nov 1 04:34:32.239722 systemd[1]: Closed systemd-udevd-kernel.socket. Nov 1 04:34:32.240371 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Nov 1 04:34:32.246554 systemd[1]: Stopped dracut-pre-udev.service. Nov 1 04:34:32.249881 systemd[1]: dracut-cmdline.service: Deactivated successfully. Nov 1 04:34:32.249960 systemd[1]: Stopped dracut-cmdline.service. Nov 1 04:34:32.250778 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Nov 1 04:34:32.250839 systemd[1]: Stopped dracut-cmdline-ask.service. Nov 1 04:34:32.253536 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Nov 1 04:34:32.255196 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Nov 1 04:34:32.255279 systemd[1]: Stopped systemd-vconsole-setup.service. Nov 1 04:34:32.267963 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Nov 1 04:34:32.268168 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Nov 1 04:34:32.363132 systemd[1]: sysroot-boot.service: Deactivated successfully. Nov 1 04:34:32.363328 systemd[1]: Stopped sysroot-boot.service. Nov 1 04:34:32.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.364943 systemd[1]: Reached target initrd-switch-root.target. Nov 1 04:34:32.366907 systemd[1]: initrd-setup-root.service: Deactivated successfully. Nov 1 04:34:32.366998 systemd[1]: Stopped initrd-setup-root.service. Nov 1 04:34:32.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.369548 systemd[1]: Starting initrd-switch-root.service... Nov 1 04:34:32.385856 systemd[1]: Switching root. Nov 1 04:34:32.410663 systemd-journald[201]: Journal stopped Nov 1 04:34:36.547711 systemd-journald[201]: Received SIGTERM from PID 1 (systemd). Nov 1 04:34:36.547895 kernel: SELinux: Class mctp_socket not defined in policy. Nov 1 04:34:36.547934 kernel: SELinux: Class anon_inode not defined in policy. Nov 1 04:34:36.547971 kernel: SELinux: the above unknown classes and permissions will be allowed Nov 1 04:34:36.548000 kernel: SELinux: policy capability network_peer_controls=1 Nov 1 04:34:36.548025 kernel: SELinux: policy capability open_perms=1 Nov 1 04:34:36.548051 kernel: SELinux: policy capability extended_socket_class=1 Nov 1 04:34:36.548078 kernel: SELinux: policy capability always_check_network=0 Nov 1 04:34:36.548103 kernel: SELinux: policy capability cgroup_seclabel=1 Nov 1 04:34:36.548142 kernel: SELinux: policy capability nnp_nosuid_transition=1 Nov 1 04:34:36.548172 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Nov 1 04:34:36.548205 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Nov 1 04:34:36.548234 systemd[1]: Successfully loaded SELinux policy in 62.232ms. Nov 1 04:34:36.548320 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.914ms. Nov 1 04:34:36.548371 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Nov 1 04:34:36.548394 systemd[1]: Detected virtualization kvm. Nov 1 04:34:36.548429 systemd[1]: Detected architecture x86-64. Nov 1 04:34:36.548458 systemd[1]: Detected first boot. Nov 1 04:34:36.548487 systemd[1]: Hostname set to . Nov 1 04:34:36.548522 systemd[1]: Initializing machine ID from VM UUID. Nov 1 04:34:36.548544 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Nov 1 04:34:36.548586 systemd[1]: Populated /etc with preset unit settings. Nov 1 04:34:36.548618 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 04:34:36.548662 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 04:34:36.548702 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 04:34:36.548741 systemd[1]: initrd-switch-root.service: Deactivated successfully. Nov 1 04:34:36.548764 systemd[1]: Stopped initrd-switch-root.service. Nov 1 04:34:36.548793 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Nov 1 04:34:36.548818 systemd[1]: Created slice system-addon\x2dconfig.slice. Nov 1 04:34:36.548844 systemd[1]: Created slice system-addon\x2drun.slice. Nov 1 04:34:36.548886 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Nov 1 04:34:36.548916 systemd[1]: Created slice system-getty.slice. Nov 1 04:34:36.548940 systemd[1]: Created slice system-modprobe.slice. Nov 1 04:34:36.548960 systemd[1]: Created slice system-serial\x2dgetty.slice. Nov 1 04:34:36.548980 systemd[1]: Created slice system-system\x2dcloudinit.slice. Nov 1 04:34:36.549006 systemd[1]: Created slice system-systemd\x2dfsck.slice. Nov 1 04:34:36.549028 systemd[1]: Created slice user.slice. Nov 1 04:34:36.549048 systemd[1]: Started systemd-ask-password-console.path. Nov 1 04:34:36.549079 systemd[1]: Started systemd-ask-password-wall.path. Nov 1 04:34:36.553775 systemd[1]: Set up automount boot.automount. Nov 1 04:34:36.553851 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Nov 1 04:34:36.553877 systemd[1]: Stopped target initrd-switch-root.target. Nov 1 04:34:36.553898 systemd[1]: Stopped target initrd-fs.target. Nov 1 04:34:36.553918 systemd[1]: Stopped target initrd-root-fs.target. Nov 1 04:34:36.553938 systemd[1]: Reached target integritysetup.target. Nov 1 04:34:36.553979 systemd[1]: Reached target remote-cryptsetup.target. Nov 1 04:34:36.554003 systemd[1]: Reached target remote-fs.target. Nov 1 04:34:36.554032 systemd[1]: Reached target slices.target. Nov 1 04:34:36.554054 systemd[1]: Reached target swap.target. Nov 1 04:34:36.554085 systemd[1]: Reached target torcx.target. Nov 1 04:34:36.554126 systemd[1]: Reached target veritysetup.target. Nov 1 04:34:36.554151 systemd[1]: Listening on systemd-coredump.socket. Nov 1 04:34:36.554180 systemd[1]: Listening on systemd-initctl.socket. Nov 1 04:34:36.554201 systemd[1]: Listening on systemd-networkd.socket. Nov 1 04:34:36.554243 systemd[1]: Listening on systemd-udevd-control.socket. Nov 1 04:34:36.554275 systemd[1]: Listening on systemd-udevd-kernel.socket. Nov 1 04:34:36.554305 systemd[1]: Listening on systemd-userdbd.socket. Nov 1 04:34:36.554356 systemd[1]: Mounting dev-hugepages.mount... Nov 1 04:34:36.554379 systemd[1]: Mounting dev-mqueue.mount... Nov 1 04:34:36.554400 systemd[1]: Mounting media.mount... Nov 1 04:34:36.554421 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 04:34:36.554441 systemd[1]: Mounting sys-kernel-debug.mount... Nov 1 04:34:36.554462 systemd[1]: Mounting sys-kernel-tracing.mount... Nov 1 04:34:36.554482 systemd[1]: Mounting tmp.mount... Nov 1 04:34:36.554513 systemd[1]: Starting flatcar-tmpfiles.service... Nov 1 04:34:36.554542 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 04:34:36.554573 systemd[1]: Starting kmod-static-nodes.service... Nov 1 04:34:36.554594 systemd[1]: Starting modprobe@configfs.service... Nov 1 04:34:36.554614 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 04:34:36.554640 systemd[1]: Starting modprobe@drm.service... Nov 1 04:34:36.554667 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 04:34:36.554693 systemd[1]: Starting modprobe@fuse.service... Nov 1 04:34:36.554714 systemd[1]: Starting modprobe@loop.service... Nov 1 04:34:36.554746 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Nov 1 04:34:36.554769 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Nov 1 04:34:36.554796 systemd[1]: Stopped systemd-fsck-root.service. Nov 1 04:34:36.554818 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Nov 1 04:34:36.554838 systemd[1]: Stopped systemd-fsck-usr.service. Nov 1 04:34:36.554858 systemd[1]: Stopped systemd-journald.service. Nov 1 04:34:36.554878 systemd[1]: Starting systemd-journald.service... Nov 1 04:34:36.554905 systemd[1]: Starting systemd-modules-load.service... Nov 1 04:34:36.554927 systemd[1]: Starting systemd-network-generator.service... Nov 1 04:34:36.554964 systemd[1]: Starting systemd-remount-fs.service... Nov 1 04:34:36.554992 kernel: fuse: init (API version 7.34) Nov 1 04:34:36.555026 systemd[1]: Starting systemd-udev-trigger.service... Nov 1 04:34:36.555053 kernel: loop: module loaded Nov 1 04:34:36.555074 systemd[1]: verity-setup.service: Deactivated successfully. Nov 1 04:34:36.555102 systemd[1]: Stopped verity-setup.service. Nov 1 04:34:36.556286 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 04:34:36.556316 systemd[1]: Mounted dev-hugepages.mount. Nov 1 04:34:36.556354 systemd[1]: Mounted dev-mqueue.mount. Nov 1 04:34:36.556392 systemd[1]: Mounted media.mount. Nov 1 04:34:36.556425 systemd-journald[977]: Journal started Nov 1 04:34:36.556537 systemd-journald[977]: Runtime Journal (/run/log/journal/e3aa9a0c552f4eed8b431b939c4e4d3b) is 4.7M, max 38.1M, 33.3M free. Nov 1 04:34:32.583000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Nov 1 04:34:32.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 04:34:32.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Nov 1 04:34:32.665000 audit: BPF prog-id=10 op=LOAD Nov 1 04:34:32.665000 audit: BPF prog-id=10 op=UNLOAD Nov 1 04:34:32.665000 audit: BPF prog-id=11 op=LOAD Nov 1 04:34:32.665000 audit: BPF prog-id=11 op=UNLOAD Nov 1 04:34:32.794000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Nov 1 04:34:32.794000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178c2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:34:36.559334 systemd[1]: Started systemd-journald.service. Nov 1 04:34:32.794000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 04:34:32.796000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Nov 1 04:34:32.796000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000117999 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:34:32.796000 audit: CWD cwd="/" Nov 1 04:34:32.796000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:32.796000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:32.796000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Nov 1 04:34:36.295000 audit: BPF prog-id=12 op=LOAD Nov 1 04:34:36.295000 audit: BPF prog-id=3 op=UNLOAD Nov 1 04:34:36.295000 audit: BPF prog-id=13 op=LOAD Nov 1 04:34:36.295000 audit: BPF prog-id=14 op=LOAD Nov 1 04:34:36.295000 audit: BPF prog-id=4 op=UNLOAD Nov 1 04:34:36.296000 audit: BPF prog-id=5 op=UNLOAD Nov 1 04:34:36.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.312000 audit: BPF prog-id=12 op=UNLOAD Nov 1 04:34:36.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.479000 audit: BPF prog-id=15 op=LOAD Nov 1 04:34:36.480000 audit: BPF prog-id=16 op=LOAD Nov 1 04:34:36.480000 audit: BPF prog-id=17 op=LOAD Nov 1 04:34:36.480000 audit: BPF prog-id=13 op=UNLOAD Nov 1 04:34:36.480000 audit: BPF prog-id=14 op=UNLOAD Nov 1 04:34:36.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.544000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Nov 1 04:34:36.544000 audit[977]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe2c5f3550 a2=4000 a3=7ffe2c5f35ec items=0 ppid=1 pid=977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:34:36.544000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Nov 1 04:34:36.290204 systemd[1]: Queued start job for default target multi-user.target. Nov 1 04:34:36.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.789725 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 04:34:36.290236 systemd[1]: Unnecessary job was removed for dev-vda6.device. Nov 1 04:34:32.790339 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 04:34:36.297157 systemd[1]: systemd-journald.service: Deactivated successfully. Nov 1 04:34:32.790380 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 04:34:36.561368 systemd[1]: Mounted sys-kernel-debug.mount. Nov 1 04:34:32.790477 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Nov 1 04:34:36.562252 systemd[1]: Mounted sys-kernel-tracing.mount. Nov 1 04:34:32.790497 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=debug msg="skipped missing lower profile" missing profile=oem Nov 1 04:34:32.790551 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Nov 1 04:34:32.790574 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Nov 1 04:34:36.563966 systemd[1]: Mounted tmp.mount. Nov 1 04:34:32.790931 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Nov 1 04:34:32.790998 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Nov 1 04:34:32.791024 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Nov 1 04:34:36.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.792921 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Nov 1 04:34:36.567206 systemd[1]: Finished kmod-static-nodes.service. Nov 1 04:34:32.793056 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Nov 1 04:34:36.568222 systemd[1]: modprobe@configfs.service: Deactivated successfully. Nov 1 04:34:32.793093 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Nov 1 04:34:36.568441 systemd[1]: Finished modprobe@configfs.service. Nov 1 04:34:36.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:32.793148 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Nov 1 04:34:32.793186 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Nov 1 04:34:32.793213 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Nov 1 04:34:35.661602 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 04:34:36.569819 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 04:34:35.662275 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 04:34:36.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.570021 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 04:34:35.662559 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 04:34:36.571467 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 04:34:35.662982 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Nov 1 04:34:36.571666 systemd[1]: Finished modprobe@drm.service. Nov 1 04:34:35.663124 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Nov 1 04:34:36.572696 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 04:34:35.663285 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-11-01T04:34:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Nov 1 04:34:36.572900 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 04:34:36.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.576142 systemd[1]: modprobe@fuse.service: Deactivated successfully. Nov 1 04:34:36.576378 systemd[1]: Finished modprobe@fuse.service. Nov 1 04:34:36.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.577525 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 04:34:36.577738 systemd[1]: Finished modprobe@loop.service. Nov 1 04:34:36.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.578746 systemd[1]: Finished systemd-modules-load.service. Nov 1 04:34:36.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.579808 systemd[1]: Finished systemd-network-generator.service. Nov 1 04:34:36.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.581068 systemd[1]: Finished systemd-remount-fs.service. Nov 1 04:34:36.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.582634 systemd[1]: Reached target network-pre.target. Nov 1 04:34:36.586550 systemd[1]: Mounting sys-fs-fuse-connections.mount... Nov 1 04:34:36.590352 systemd[1]: Mounting sys-kernel-config.mount... Nov 1 04:34:36.591440 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Nov 1 04:34:36.596392 systemd[1]: Starting systemd-hwdb-update.service... Nov 1 04:34:36.598822 systemd[1]: Starting systemd-journal-flush.service... Nov 1 04:34:36.600149 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 04:34:36.605374 systemd[1]: Starting systemd-random-seed.service... Nov 1 04:34:36.606305 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 04:34:36.608215 systemd[1]: Starting systemd-sysctl.service... Nov 1 04:34:36.612019 systemd[1]: Mounted sys-fs-fuse-connections.mount. Nov 1 04:34:36.612889 systemd[1]: Mounted sys-kernel-config.mount. Nov 1 04:34:36.619581 systemd-journald[977]: Time spent on flushing to /var/log/journal/e3aa9a0c552f4eed8b431b939c4e4d3b is 54.263ms for 1281 entries. Nov 1 04:34:36.619581 systemd-journald[977]: System Journal (/var/log/journal/e3aa9a0c552f4eed8b431b939c4e4d3b) is 8.0M, max 584.8M, 576.8M free. Nov 1 04:34:36.693069 systemd-journald[977]: Received client request to flush runtime journal. Nov 1 04:34:36.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.623034 systemd[1]: Finished flatcar-tmpfiles.service. Nov 1 04:34:36.625531 systemd[1]: Starting systemd-sysusers.service... Nov 1 04:34:36.628423 systemd[1]: Finished systemd-random-seed.service. Nov 1 04:34:36.629456 systemd[1]: Reached target first-boot-complete.target. Nov 1 04:34:36.657298 systemd[1]: Finished systemd-sysctl.service. Nov 1 04:34:36.695313 systemd[1]: Finished systemd-journal-flush.service. Nov 1 04:34:36.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.698461 systemd[1]: Finished systemd-sysusers.service. Nov 1 04:34:36.780088 systemd[1]: Finished systemd-udev-trigger.service. Nov 1 04:34:36.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:36.782752 systemd[1]: Starting systemd-udev-settle.service... Nov 1 04:34:36.794795 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Nov 1 04:34:37.269053 systemd[1]: Finished systemd-hwdb-update.service. Nov 1 04:34:37.276921 kernel: kauditd_printk_skb: 94 callbacks suppressed Nov 1 04:34:37.277038 kernel: audit: type=1130 audit(1761971677.269:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:37.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:37.271000 audit: BPF prog-id=18 op=LOAD Nov 1 04:34:37.278049 systemd[1]: Starting systemd-udevd.service... Nov 1 04:34:37.276000 audit: BPF prog-id=19 op=LOAD Nov 1 04:34:37.276000 audit: BPF prog-id=7 op=UNLOAD Nov 1 04:34:37.276000 audit: BPF prog-id=8 op=UNLOAD Nov 1 04:34:37.282443 kernel: audit: type=1334 audit(1761971677.271:135): prog-id=18 op=LOAD Nov 1 04:34:37.282515 kernel: audit: type=1334 audit(1761971677.276:136): prog-id=19 op=LOAD Nov 1 04:34:37.282552 kernel: audit: type=1334 audit(1761971677.276:137): prog-id=7 op=UNLOAD Nov 1 04:34:37.282585 kernel: audit: type=1334 audit(1761971677.276:138): prog-id=8 op=UNLOAD Nov 1 04:34:37.309008 systemd-udevd[1014]: Using default interface naming scheme 'v252'. Nov 1 04:34:37.345034 systemd[1]: Started systemd-udevd.service. Nov 1 04:34:37.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:37.352137 kernel: audit: type=1130 audit(1761971677.345:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:37.357146 systemd[1]: Starting systemd-networkd.service... Nov 1 04:34:37.356000 audit: BPF prog-id=20 op=LOAD Nov 1 04:34:37.361193 kernel: audit: type=1334 audit(1761971677.356:140): prog-id=20 op=LOAD Nov 1 04:34:37.371000 audit: BPF prog-id=21 op=LOAD Nov 1 04:34:37.371000 audit: BPF prog-id=22 op=LOAD Nov 1 04:34:37.376081 kernel: audit: type=1334 audit(1761971677.371:141): prog-id=21 op=LOAD Nov 1 04:34:37.376188 kernel: audit: type=1334 audit(1761971677.371:142): prog-id=22 op=LOAD Nov 1 04:34:37.376226 kernel: audit: type=1334 audit(1761971677.371:143): prog-id=23 op=LOAD Nov 1 04:34:37.371000 audit: BPF prog-id=23 op=LOAD Nov 1 04:34:37.378101 systemd[1]: Starting systemd-userdbd.service... Nov 1 04:34:37.437047 systemd[1]: Started systemd-userdbd.service. Nov 1 04:34:37.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:37.443715 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Nov 1 04:34:37.550588 systemd-networkd[1027]: lo: Link UP Nov 1 04:34:37.550607 systemd-networkd[1027]: lo: Gained carrier Nov 1 04:34:37.551530 systemd-networkd[1027]: Enumeration completed Nov 1 04:34:37.551677 systemd[1]: Started systemd-networkd.service. Nov 1 04:34:37.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:37.555727 systemd-networkd[1027]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Nov 1 04:34:37.559359 systemd-networkd[1027]: eth0: Link UP Nov 1 04:34:37.559373 systemd-networkd[1027]: eth0: Gained carrier Nov 1 04:34:37.580686 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Nov 1 04:34:37.581856 systemd-networkd[1027]: eth0: DHCPv4 address 10.244.11.230/30, gateway 10.244.11.229 acquired from 10.244.11.229 Nov 1 04:34:37.591153 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Nov 1 04:34:37.600152 kernel: ACPI: button: Power Button [PWRF] Nov 1 04:34:37.606157 kernel: mousedev: PS/2 mouse device common for all mice Nov 1 04:34:37.646000 audit[1015]: AVC avc: denied { confidentiality } for pid=1015 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Nov 1 04:34:37.646000 audit[1015]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55fb507304b0 a1=338ec a2=7f7fbb790bc5 a3=5 items=110 ppid=1014 pid=1015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:34:37.646000 audit: CWD cwd="/" Nov 1 04:34:37.646000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=1 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=2 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=3 name=(null) inode=15243 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=4 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=5 name=(null) inode=15244 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=6 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=7 name=(null) inode=15245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=8 name=(null) inode=15245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=9 name=(null) inode=15246 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=10 name=(null) inode=15245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=11 name=(null) inode=15247 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=12 name=(null) inode=15245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=13 name=(null) inode=15248 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=14 name=(null) inode=15245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=15 name=(null) inode=15249 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=16 name=(null) inode=15245 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=17 name=(null) inode=15250 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=18 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=19 name=(null) inode=15251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=20 name=(null) inode=15251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=21 name=(null) inode=15252 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=22 name=(null) inode=15251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=23 name=(null) inode=15253 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=24 name=(null) inode=15251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=25 name=(null) inode=15254 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=26 name=(null) inode=15251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=27 name=(null) inode=15255 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=28 name=(null) inode=15251 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=29 name=(null) inode=15256 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=30 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=31 name=(null) inode=15257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=32 name=(null) inode=15257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=33 name=(null) inode=15258 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=34 name=(null) inode=15257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=35 name=(null) inode=15259 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=36 name=(null) inode=15257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=37 name=(null) inode=15260 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=38 name=(null) inode=15257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=39 name=(null) inode=15261 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=40 name=(null) inode=15257 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=41 name=(null) inode=15262 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=42 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=43 name=(null) inode=15263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=44 name=(null) inode=15263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=45 name=(null) inode=15264 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=46 name=(null) inode=15263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=47 name=(null) inode=15265 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=48 name=(null) inode=15263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=49 name=(null) inode=15266 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=50 name=(null) inode=15263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=51 name=(null) inode=15267 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=52 name=(null) inode=15263 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=53 name=(null) inode=15268 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=55 name=(null) inode=15269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=56 name=(null) inode=15269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=57 name=(null) inode=15270 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=58 name=(null) inode=15269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=59 name=(null) inode=15271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=60 name=(null) inode=15269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=61 name=(null) inode=15272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=62 name=(null) inode=15272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=63 name=(null) inode=15273 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=64 name=(null) inode=15272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=65 name=(null) inode=15274 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=66 name=(null) inode=15272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=67 name=(null) inode=15275 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=68 name=(null) inode=15272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=69 name=(null) inode=15276 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=70 name=(null) inode=15272 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=71 name=(null) inode=15277 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=72 name=(null) inode=15269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=73 name=(null) inode=15278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=74 name=(null) inode=15278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=75 name=(null) inode=15279 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=76 name=(null) inode=15278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=77 name=(null) inode=15280 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=78 name=(null) inode=15278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=79 name=(null) inode=15281 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=80 name=(null) inode=15278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=81 name=(null) inode=15282 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=82 name=(null) inode=15278 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=83 name=(null) inode=15283 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=84 name=(null) inode=15269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=85 name=(null) inode=15284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=86 name=(null) inode=15284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=87 name=(null) inode=15285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=88 name=(null) inode=15284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=89 name=(null) inode=15286 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=90 name=(null) inode=15284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=91 name=(null) inode=15287 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=92 name=(null) inode=15284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=93 name=(null) inode=15288 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=94 name=(null) inode=15284 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=95 name=(null) inode=15289 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=96 name=(null) inode=15269 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=97 name=(null) inode=15290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=98 name=(null) inode=15290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=99 name=(null) inode=15291 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=100 name=(null) inode=15290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=101 name=(null) inode=15292 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=102 name=(null) inode=15290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=103 name=(null) inode=15293 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=104 name=(null) inode=15290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=105 name=(null) inode=15294 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=106 name=(null) inode=15290 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=107 name=(null) inode=15295 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PATH item=109 name=(null) inode=15296 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:34:37.646000 audit: PROCTITLE proctitle="(udev-worker)" Nov 1 04:34:37.682739 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Nov 1 04:34:37.742427 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Nov 1 04:34:37.742493 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Nov 1 04:34:37.742808 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Nov 1 04:34:37.905979 systemd[1]: Finished systemd-udev-settle.service. Nov 1 04:34:37.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:37.909328 systemd[1]: Starting lvm2-activation-early.service... Nov 1 04:34:37.933781 lvm[1043]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 04:34:37.965779 systemd[1]: Finished lvm2-activation-early.service. Nov 1 04:34:37.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:37.966744 systemd[1]: Reached target cryptsetup.target. Nov 1 04:34:37.969137 systemd[1]: Starting lvm2-activation.service... Nov 1 04:34:37.975271 lvm[1044]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Nov 1 04:34:38.004762 systemd[1]: Finished lvm2-activation.service. Nov 1 04:34:38.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.005734 systemd[1]: Reached target local-fs-pre.target. Nov 1 04:34:38.006447 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Nov 1 04:34:38.006487 systemd[1]: Reached target local-fs.target. Nov 1 04:34:38.007132 systemd[1]: Reached target machines.target. Nov 1 04:34:38.009635 systemd[1]: Starting ldconfig.service... Nov 1 04:34:38.011338 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 04:34:38.011500 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 04:34:38.014971 systemd[1]: Starting systemd-boot-update.service... Nov 1 04:34:38.021199 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Nov 1 04:34:38.028405 systemd[1]: Starting systemd-machine-id-commit.service... Nov 1 04:34:38.031255 systemd[1]: Starting systemd-sysext.service... Nov 1 04:34:38.043934 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1046 (bootctl) Nov 1 04:34:38.047032 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Nov 1 04:34:38.054521 systemd[1]: Unmounting usr-share-oem.mount... Nov 1 04:34:38.080165 systemd[1]: usr-share-oem.mount: Deactivated successfully. Nov 1 04:34:38.080479 systemd[1]: Unmounted usr-share-oem.mount. Nov 1 04:34:38.118260 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Nov 1 04:34:38.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.120287 kernel: loop0: detected capacity change from 0 to 229808 Nov 1 04:34:38.211022 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Nov 1 04:34:38.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.212960 systemd[1]: Finished systemd-machine-id-commit.service. Nov 1 04:34:38.230444 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Nov 1 04:34:38.251200 kernel: loop1: detected capacity change from 0 to 229808 Nov 1 04:34:38.265515 (sd-sysext)[1059]: Using extensions 'kubernetes'. Nov 1 04:34:38.267183 (sd-sysext)[1059]: Merged extensions into '/usr'. Nov 1 04:34:38.307419 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 04:34:38.310362 systemd[1]: Mounting usr-share-oem.mount... Nov 1 04:34:38.315091 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 04:34:38.316598 systemd-fsck[1056]: fsck.fat 4.2 (2021-01-31) Nov 1 04:34:38.316598 systemd-fsck[1056]: /dev/vda1: 790 files, 120773/258078 clusters Nov 1 04:34:38.320181 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 04:34:38.324226 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 04:34:38.329290 systemd[1]: Starting modprobe@loop.service... Nov 1 04:34:38.330151 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 04:34:38.330491 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 04:34:38.331068 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 04:34:38.335061 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Nov 1 04:34:38.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.340849 systemd[1]: Mounted usr-share-oem.mount. Nov 1 04:34:38.342589 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 04:34:38.342808 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 04:34:38.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.344847 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 04:34:38.345229 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 04:34:38.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.348906 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 04:34:38.349211 systemd[1]: Finished modprobe@loop.service. Nov 1 04:34:38.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.353600 systemd[1]: Mounting boot.mount... Nov 1 04:34:38.354238 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 04:34:38.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.354487 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 04:34:38.359070 systemd[1]: Finished systemd-sysext.service. Nov 1 04:34:38.363265 systemd[1]: Starting ensure-sysext.service... Nov 1 04:34:38.365554 systemd[1]: Starting systemd-tmpfiles-setup.service... Nov 1 04:34:38.375085 systemd[1]: Reloading. Nov 1 04:34:38.428507 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Nov 1 04:34:38.447577 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Nov 1 04:34:38.459107 systemd-tmpfiles[1067]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Nov 1 04:34:38.493359 /usr/lib/systemd/system-generators/torcx-generator[1086]: time="2025-11-01T04:34:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 04:34:38.493415 /usr/lib/systemd/system-generators/torcx-generator[1086]: time="2025-11-01T04:34:38Z" level=info msg="torcx already run" Nov 1 04:34:38.661023 ldconfig[1045]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Nov 1 04:34:38.671332 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 04:34:38.671369 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 04:34:38.700296 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 04:34:38.784000 audit: BPF prog-id=24 op=LOAD Nov 1 04:34:38.784000 audit: BPF prog-id=15 op=UNLOAD Nov 1 04:34:38.784000 audit: BPF prog-id=25 op=LOAD Nov 1 04:34:38.784000 audit: BPF prog-id=26 op=LOAD Nov 1 04:34:38.787000 audit: BPF prog-id=16 op=UNLOAD Nov 1 04:34:38.787000 audit: BPF prog-id=17 op=UNLOAD Nov 1 04:34:38.790000 audit: BPF prog-id=27 op=LOAD Nov 1 04:34:38.790000 audit: BPF prog-id=20 op=UNLOAD Nov 1 04:34:38.791000 audit: BPF prog-id=28 op=LOAD Nov 1 04:34:38.791000 audit: BPF prog-id=29 op=LOAD Nov 1 04:34:38.791000 audit: BPF prog-id=18 op=UNLOAD Nov 1 04:34:38.791000 audit: BPF prog-id=19 op=UNLOAD Nov 1 04:34:38.794000 audit: BPF prog-id=30 op=LOAD Nov 1 04:34:38.794000 audit: BPF prog-id=21 op=UNLOAD Nov 1 04:34:38.794000 audit: BPF prog-id=31 op=LOAD Nov 1 04:34:38.794000 audit: BPF prog-id=32 op=LOAD Nov 1 04:34:38.795000 audit: BPF prog-id=22 op=UNLOAD Nov 1 04:34:38.795000 audit: BPF prog-id=23 op=UNLOAD Nov 1 04:34:38.805254 systemd[1]: Finished ldconfig.service. Nov 1 04:34:38.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.809063 systemd[1]: Mounted boot.mount. Nov 1 04:34:38.830158 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 04:34:38.832638 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 04:34:38.837771 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 04:34:38.840504 systemd[1]: Starting modprobe@loop.service... Nov 1 04:34:38.842316 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 04:34:38.842497 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 04:34:38.844382 systemd[1]: Finished systemd-boot-update.service. Nov 1 04:34:38.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.845839 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 04:34:38.846318 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 04:34:38.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.847756 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 04:34:38.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.848607 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 04:34:38.850504 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 04:34:38.850705 systemd[1]: Finished modprobe@loop.service. Nov 1 04:34:38.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.854193 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 04:34:38.857494 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 04:34:38.860549 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 04:34:38.863596 systemd[1]: Starting modprobe@loop.service... Nov 1 04:34:38.864496 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 04:34:38.864677 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 04:34:38.866576 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 04:34:38.866910 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 04:34:38.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.868604 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 04:34:38.868948 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 04:34:38.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.870649 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 04:34:38.870972 systemd[1]: Finished modprobe@loop.service. Nov 1 04:34:38.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.875968 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Nov 1 04:34:38.878318 systemd[1]: Starting modprobe@dm_mod.service... Nov 1 04:34:38.882027 systemd[1]: Starting modprobe@drm.service... Nov 1 04:34:38.885897 systemd[1]: Starting modprobe@efi_pstore.service... Nov 1 04:34:38.888681 systemd[1]: Starting modprobe@loop.service... Nov 1 04:34:38.889748 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Nov 1 04:34:38.889941 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 04:34:38.892307 systemd[1]: Starting systemd-networkd-wait-online.service... Nov 1 04:34:38.895307 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Nov 1 04:34:38.895714 systemd[1]: Finished modprobe@dm_mod.service. Nov 1 04:34:38.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.897469 systemd[1]: modprobe@drm.service: Deactivated successfully. Nov 1 04:34:38.897663 systemd[1]: Finished modprobe@drm.service. Nov 1 04:34:38.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.899703 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Nov 1 04:34:38.900075 systemd[1]: Finished modprobe@efi_pstore.service. Nov 1 04:34:38.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.901934 systemd[1]: modprobe@loop.service: Deactivated successfully. Nov 1 04:34:38.902251 systemd[1]: Finished modprobe@loop.service. Nov 1 04:34:38.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.905688 systemd[1]: Finished ensure-sysext.service. Nov 1 04:34:38.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.906611 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Nov 1 04:34:38.906667 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Nov 1 04:34:38.992314 systemd[1]: Finished systemd-tmpfiles-setup.service. Nov 1 04:34:38.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:38.995878 systemd[1]: Starting audit-rules.service... Nov 1 04:34:38.998743 systemd[1]: Starting clean-ca-certificates.service... Nov 1 04:34:39.005000 audit: BPF prog-id=33 op=LOAD Nov 1 04:34:39.009000 audit: BPF prog-id=34 op=LOAD Nov 1 04:34:39.003994 systemd[1]: Starting systemd-journal-catalog-update.service... Nov 1 04:34:39.007447 systemd[1]: Starting systemd-resolved.service... Nov 1 04:34:39.011469 systemd[1]: Starting systemd-timesyncd.service... Nov 1 04:34:39.015858 systemd[1]: Starting systemd-update-utmp.service... Nov 1 04:34:39.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:39.017551 systemd[1]: Finished clean-ca-certificates.service. Nov 1 04:34:39.019406 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Nov 1 04:34:39.027000 audit[1151]: SYSTEM_BOOT pid=1151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Nov 1 04:34:39.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:39.032142 systemd[1]: Finished systemd-update-utmp.service. Nov 1 04:34:39.078967 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 04:34:39.079032 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Nov 1 04:34:39.082615 systemd[1]: Finished systemd-journal-catalog-update.service. Nov 1 04:34:39.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:39.085576 systemd[1]: Starting systemd-update-done.service... Nov 1 04:34:39.100943 systemd[1]: Finished systemd-update-done.service. Nov 1 04:34:39.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:39.108000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Nov 1 04:34:39.108000 audit[1166]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe0e9e2820 a2=420 a3=0 items=0 ppid=1145 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:34:39.108000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Nov 1 04:34:39.108580 augenrules[1166]: No rules Nov 1 04:34:39.109703 systemd[1]: Finished audit-rules.service. Nov 1 04:34:39.125311 systemd-resolved[1149]: Positive Trust Anchors: Nov 1 04:34:39.125335 systemd-resolved[1149]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Nov 1 04:34:39.125375 systemd-resolved[1149]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Nov 1 04:34:39.134036 systemd-resolved[1149]: Using system hostname 'srv-cigeh.gb1.brightbox.com'. Nov 1 04:34:39.137050 systemd[1]: Started systemd-resolved.service. Nov 1 04:34:39.137973 systemd[1]: Reached target network.target. Nov 1 04:34:39.138593 systemd[1]: Reached target nss-lookup.target. Nov 1 04:34:39.141944 systemd[1]: Started systemd-timesyncd.service. Nov 1 04:34:39.142979 systemd[1]: Reached target sysinit.target. Nov 1 04:34:39.143823 systemd[1]: Started motdgen.path. Nov 1 04:34:39.144521 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Nov 1 04:34:39.145320 systemd[1]: Started systemd-tmpfiles-clean.timer. Nov 1 04:34:39.146376 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Nov 1 04:34:39.146426 systemd[1]: Reached target paths.target. Nov 1 04:34:39.147033 systemd[1]: Reached target time-set.target. Nov 1 04:34:39.147930 systemd[1]: Started logrotate.timer. Nov 1 04:34:39.148724 systemd[1]: Started mdadm.timer. Nov 1 04:34:39.149330 systemd[1]: Reached target timers.target. Nov 1 04:34:39.150439 systemd[1]: Listening on dbus.socket. Nov 1 04:34:39.152736 systemd[1]: Starting docker.socket... Nov 1 04:34:39.157050 systemd[1]: Listening on sshd.socket. Nov 1 04:34:39.157850 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 04:34:39.158514 systemd[1]: Listening on docker.socket. Nov 1 04:34:39.159311 systemd[1]: Reached target sockets.target. Nov 1 04:34:39.159920 systemd[1]: Reached target basic.target. Nov 1 04:34:39.160663 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 04:34:39.160715 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Nov 1 04:34:39.162314 systemd[1]: Starting containerd.service... Nov 1 04:34:39.165640 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Nov 1 04:34:39.167933 systemd[1]: Starting dbus.service... Nov 1 04:34:39.171151 systemd[1]: Starting enable-oem-cloudinit.service... Nov 1 04:34:39.175588 systemd[1]: Starting extend-filesystems.service... Nov 1 04:34:39.190079 jq[1178]: false Nov 1 04:34:39.191098 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Nov 1 04:34:39.196321 systemd[1]: Starting motdgen.service... Nov 1 04:34:39.202341 systemd[1]: Starting prepare-helm.service... Nov 1 04:34:39.206092 systemd[1]: Starting ssh-key-proc-cmdline.service... Nov 1 04:34:39.208852 systemd[1]: Starting sshd-keygen.service... Nov 1 04:34:39.217756 systemd[1]: Starting systemd-logind.service... Nov 1 04:34:39.218548 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Nov 1 04:34:39.218723 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Nov 1 04:34:39.219523 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Nov 1 04:34:39.220756 systemd[1]: Starting update-engine.service... Nov 1 04:34:39.224581 systemd[1]: Starting update-ssh-keys-after-ignition.service... Nov 1 04:34:39.232884 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Nov 1 04:34:39.233328 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Nov 1 04:34:39.235442 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Nov 1 04:34:39.235773 systemd[1]: Finished ssh-key-proc-cmdline.service. Nov 1 04:34:39.250706 jq[1193]: true Nov 1 04:34:39.280227 tar[1199]: linux-amd64/LICENSE Nov 1 04:34:39.280676 tar[1199]: linux-amd64/helm Nov 1 04:34:39.284692 jq[1201]: true Nov 1 04:34:39.285346 dbus-daemon[1176]: [system] SELinux support is enabled Nov 1 04:34:39.288000 systemd[1]: Started dbus.service. Nov 1 04:34:39.292169 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Nov 1 04:34:39.292234 systemd[1]: Reached target system-config.target. Nov 1 04:34:39.292966 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Nov 1 04:34:39.293042 systemd[1]: Reached target user-config.target. Nov 1 04:34:39.298612 dbus-daemon[1176]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1027 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Nov 1 04:34:39.315307 extend-filesystems[1180]: Found loop1 Nov 1 04:34:39.315808 systemd[1]: Starting systemd-hostnamed.service... Nov 1 04:34:39.318236 systemd[1]: motdgen.service: Deactivated successfully. Nov 1 04:34:39.318562 systemd[1]: Finished motdgen.service. Nov 1 04:34:39.329806 extend-filesystems[1180]: Found vda Nov 1 04:34:39.331799 extend-filesystems[1180]: Found vda1 Nov 1 04:34:39.332694 extend-filesystems[1180]: Found vda2 Nov 1 04:34:39.333484 extend-filesystems[1180]: Found vda3 Nov 1 04:34:39.337253 extend-filesystems[1180]: Found usr Nov 1 04:34:39.337253 extend-filesystems[1180]: Found vda4 Nov 1 04:34:39.337253 extend-filesystems[1180]: Found vda6 Nov 1 04:34:39.337253 extend-filesystems[1180]: Found vda7 Nov 1 04:34:39.337253 extend-filesystems[1180]: Found vda9 Nov 1 04:34:39.337253 extend-filesystems[1180]: Checking size of /dev/vda9 Nov 1 04:34:39.381151 update_engine[1192]: I1101 04:34:39.380347 1192 main.cc:92] Flatcar Update Engine starting Nov 1 04:34:39.388642 systemd[1]: Started update-engine.service. Nov 1 04:34:39.389075 update_engine[1192]: I1101 04:34:39.388739 1192 update_check_scheduler.cc:74] Next update check in 10m6s Nov 1 04:34:39.390842 extend-filesystems[1180]: Resized partition /dev/vda9 Nov 1 04:34:39.392399 systemd[1]: Started locksmithd.service. Nov 1 04:34:39.408615 extend-filesystems[1229]: resize2fs 1.46.5 (30-Dec-2021) Nov 1 04:34:39.410042 systemd-timesyncd[1150]: Contacted time server 92.53.240.20:123 (0.flatcar.pool.ntp.org). Nov 1 04:34:39.410315 systemd-timesyncd[1150]: Initial clock synchronization to Sat 2025-11-01 04:34:39.249305 UTC. Nov 1 04:34:39.416198 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Nov 1 04:34:39.434937 systemd-networkd[1027]: eth0: Gained IPv6LL Nov 1 04:34:39.438286 systemd[1]: Finished systemd-networkd-wait-online.service. Nov 1 04:34:39.439225 systemd[1]: Reached target network-online.target. Nov 1 04:34:39.442681 systemd[1]: Starting kubelet.service... Nov 1 04:34:39.510755 env[1200]: time="2025-11-01T04:34:39.510627096Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Nov 1 04:34:39.537445 dbus-daemon[1176]: [system] Successfully activated service 'org.freedesktop.hostname1' Nov 1 04:34:39.537655 systemd[1]: Started systemd-hostnamed.service. Nov 1 04:34:39.539202 bash[1231]: Updated "/home/core/.ssh/authorized_keys" Nov 1 04:34:39.540313 systemd[1]: Finished update-ssh-keys-after-ignition.service. Nov 1 04:34:39.541317 dbus-daemon[1176]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1211 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Nov 1 04:34:39.543378 systemd-logind[1191]: Watching system buttons on /dev/input/event2 (Power Button) Nov 1 04:34:39.544813 systemd[1]: Starting polkit.service... Nov 1 04:34:39.566063 systemd-logind[1191]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Nov 1 04:34:39.575285 systemd-logind[1191]: New seat seat0. Nov 1 04:34:39.593175 systemd[1]: Started systemd-logind.service. Nov 1 04:34:39.613723 polkitd[1236]: Started polkitd version 121 Nov 1 04:34:39.618874 env[1200]: time="2025-11-01T04:34:39.618818220Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Nov 1 04:34:39.620387 env[1200]: time="2025-11-01T04:34:39.620354296Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Nov 1 04:34:39.630076 env[1200]: time="2025-11-01T04:34:39.629995707Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Nov 1 04:34:39.637132 env[1200]: time="2025-11-01T04:34:39.637059622Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Nov 1 04:34:39.637961 env[1200]: time="2025-11-01T04:34:39.637911357Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 04:34:39.639537 polkitd[1236]: Loading rules from directory /etc/polkit-1/rules.d Nov 1 04:34:39.641199 env[1200]: time="2025-11-01T04:34:39.641166895Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Nov 1 04:34:39.641388 env[1200]: time="2025-11-01T04:34:39.641351622Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Nov 1 04:34:39.641551 env[1200]: time="2025-11-01T04:34:39.641520379Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Nov 1 04:34:39.643073 env[1200]: time="2025-11-01T04:34:39.643042072Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Nov 1 04:34:39.643328 polkitd[1236]: Loading rules from directory /usr/share/polkit-1/rules.d Nov 1 04:34:39.647147 env[1200]: time="2025-11-01T04:34:39.647074067Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Nov 1 04:34:39.647574 env[1200]: time="2025-11-01T04:34:39.647536535Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Nov 1 04:34:39.650263 polkitd[1236]: Finished loading, compiling and executing 2 rules Nov 1 04:34:39.651891 dbus-daemon[1176]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Nov 1 04:34:39.652166 systemd[1]: Started polkit.service. Nov 1 04:34:39.654283 polkitd[1236]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Nov 1 04:34:39.656634 env[1200]: time="2025-11-01T04:34:39.656586620Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Nov 1 04:34:39.656967 env[1200]: time="2025-11-01T04:34:39.656894352Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Nov 1 04:34:39.658293 env[1200]: time="2025-11-01T04:34:39.658246336Z" level=info msg="metadata content store policy set" policy=shared Nov 1 04:34:39.675882 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Nov 1 04:34:39.697432 systemd-hostnamed[1211]: Hostname set to (static) Nov 1 04:34:39.710639 extend-filesystems[1229]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Nov 1 04:34:39.710639 extend-filesystems[1229]: old_desc_blocks = 1, new_desc_blocks = 8 Nov 1 04:34:39.710639 extend-filesystems[1229]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Nov 1 04:34:39.718738 extend-filesystems[1180]: Resized filesystem in /dev/vda9 Nov 1 04:34:39.712713 systemd[1]: extend-filesystems.service: Deactivated successfully. Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.719859182Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.719988022Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.720023909Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.720176147Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.720232767Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.720281565Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.720345791Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.720371635Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.720413073Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.720438806Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.720467003Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.720517368Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.720767141Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Nov 1 04:34:39.723800 env[1200]: time="2025-11-01T04:34:39.721005370Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Nov 1 04:34:39.712998 systemd[1]: Finished extend-filesystems.service. Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.721580953Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.721647751Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.721675900Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.721767933Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.721794938Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.721822283Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.721850442Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.721873055Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.721893087Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.721912492Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.721931092Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.721954921Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.722234639Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.722264660Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.730559 env[1200]: time="2025-11-01T04:34:39.722320179Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.724999 systemd[1]: Started containerd.service. Nov 1 04:34:39.731573 env[1200]: time="2025-11-01T04:34:39.722340788Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Nov 1 04:34:39.731573 env[1200]: time="2025-11-01T04:34:39.722365295Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Nov 1 04:34:39.731573 env[1200]: time="2025-11-01T04:34:39.722386446Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Nov 1 04:34:39.731573 env[1200]: time="2025-11-01T04:34:39.722431676Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Nov 1 04:34:39.731573 env[1200]: time="2025-11-01T04:34:39.722497620Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.722750608Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.722837313Z" level=info msg="Connect containerd service" Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.722923420Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.723769676Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.724183530Z" level=info msg="Start subscribing containerd event" Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.724278868Z" level=info msg="Start recovering state" Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.724395301Z" level=info msg="Start event monitor" Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.724425724Z" level=info msg="Start snapshots syncer" Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.724447278Z" level=info msg="Start cni network conf syncer for default" Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.724463785Z" level=info msg="Start streaming server" Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.724748208Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.724834725Z" level=info msg=serving... address=/run/containerd/containerd.sock Nov 1 04:34:39.731848 env[1200]: time="2025-11-01T04:34:39.726566501Z" level=info msg="containerd successfully booted in 0.237243s" Nov 1 04:34:40.327948 tar[1199]: linux-amd64/README.md Nov 1 04:34:40.338195 systemd[1]: Finished prepare-helm.service. Nov 1 04:34:40.427975 locksmithd[1226]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Nov 1 04:34:40.948673 systemd-networkd[1027]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:2f9:24:19ff:fef4:be6/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:2f9:24:19ff:fef4:be6/64 assigned by NDisc. Nov 1 04:34:40.948691 systemd-networkd[1027]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Nov 1 04:34:41.088728 systemd[1]: Started kubelet.service. Nov 1 04:34:41.514131 sshd_keygen[1209]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Nov 1 04:34:41.542184 systemd[1]: Finished sshd-keygen.service. Nov 1 04:34:41.545716 systemd[1]: Starting issuegen.service... Nov 1 04:34:41.555457 systemd[1]: issuegen.service: Deactivated successfully. Nov 1 04:34:41.555736 systemd[1]: Finished issuegen.service. Nov 1 04:34:41.558753 systemd[1]: Starting systemd-user-sessions.service... Nov 1 04:34:41.570650 systemd[1]: Finished systemd-user-sessions.service. Nov 1 04:34:41.573761 systemd[1]: Started getty@tty1.service. Nov 1 04:34:41.576651 systemd[1]: Started serial-getty@ttyS0.service. Nov 1 04:34:41.577814 systemd[1]: Reached target getty.target. Nov 1 04:34:41.783332 kubelet[1256]: E1101 04:34:41.783174 1256 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 04:34:41.785992 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 04:34:41.786285 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 04:34:41.786865 systemd[1]: kubelet.service: Consumed 1.187s CPU time. Nov 1 04:34:46.323955 coreos-metadata[1175]: Nov 01 04:34:46.323 WARN failed to locate config-drive, using the metadata service API instead Nov 1 04:34:46.381497 coreos-metadata[1175]: Nov 01 04:34:46.381 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Nov 1 04:34:46.409159 coreos-metadata[1175]: Nov 01 04:34:46.409 INFO Fetch successful Nov 1 04:34:46.409595 coreos-metadata[1175]: Nov 01 04:34:46.409 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Nov 1 04:34:46.438185 coreos-metadata[1175]: Nov 01 04:34:46.438 INFO Fetch successful Nov 1 04:34:46.440541 unknown[1175]: wrote ssh authorized keys file for user: core Nov 1 04:34:46.459428 update-ssh-keys[1278]: Updated "/home/core/.ssh/authorized_keys" Nov 1 04:34:46.460643 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Nov 1 04:34:46.462151 systemd[1]: Reached target multi-user.target. Nov 1 04:34:46.464987 systemd[1]: Starting systemd-update-utmp-runlevel.service... Nov 1 04:34:46.477331 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Nov 1 04:34:46.477816 systemd[1]: Finished systemd-update-utmp-runlevel.service. Nov 1 04:34:46.503492 systemd[1]: Startup finished in 1.199s (kernel) + 7.785s (initrd) + 13.994s (userspace) = 22.979s. Nov 1 04:34:48.745303 systemd[1]: Created slice system-sshd.slice. Nov 1 04:34:48.747206 systemd[1]: Started sshd@0-10.244.11.230:22-139.178.89.65:40976.service. Nov 1 04:34:49.648473 sshd[1281]: Accepted publickey for core from 139.178.89.65 port 40976 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:34:49.652367 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:34:49.669231 systemd[1]: Created slice user-500.slice. Nov 1 04:34:49.672359 systemd[1]: Starting user-runtime-dir@500.service... Nov 1 04:34:49.676679 systemd-logind[1191]: New session 1 of user core. Nov 1 04:34:49.685980 systemd[1]: Finished user-runtime-dir@500.service. Nov 1 04:34:49.689467 systemd[1]: Starting user@500.service... Nov 1 04:34:49.696674 (systemd)[1284]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:34:49.816896 systemd[1284]: Queued start job for default target default.target. Nov 1 04:34:49.818395 systemd[1284]: Reached target paths.target. Nov 1 04:34:49.818617 systemd[1284]: Reached target sockets.target. Nov 1 04:34:49.818813 systemd[1284]: Reached target timers.target. Nov 1 04:34:49.818985 systemd[1284]: Reached target basic.target. Nov 1 04:34:49.819236 systemd[1284]: Reached target default.target. Nov 1 04:34:49.819334 systemd[1]: Started user@500.service. Nov 1 04:34:49.819732 systemd[1284]: Startup finished in 113ms. Nov 1 04:34:49.821121 systemd[1]: Started session-1.scope. Nov 1 04:34:50.447486 systemd[1]: Started sshd@1-10.244.11.230:22-139.178.89.65:40988.service. Nov 1 04:34:51.337542 sshd[1293]: Accepted publickey for core from 139.178.89.65 port 40988 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:34:51.340161 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:34:51.348202 systemd[1]: Started session-2.scope. Nov 1 04:34:51.349212 systemd-logind[1191]: New session 2 of user core. Nov 1 04:34:51.816228 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Nov 1 04:34:51.816478 systemd[1]: Stopped kubelet.service. Nov 1 04:34:51.816546 systemd[1]: kubelet.service: Consumed 1.187s CPU time. Nov 1 04:34:51.818938 systemd[1]: Starting kubelet.service... Nov 1 04:34:51.961010 sshd[1293]: pam_unix(sshd:session): session closed for user core Nov 1 04:34:51.965971 systemd[1]: sshd@1-10.244.11.230:22-139.178.89.65:40988.service: Deactivated successfully. Nov 1 04:34:51.967055 systemd[1]: session-2.scope: Deactivated successfully. Nov 1 04:34:51.967978 systemd-logind[1191]: Session 2 logged out. Waiting for processes to exit. Nov 1 04:34:51.969288 systemd-logind[1191]: Removed session 2. Nov 1 04:34:52.001922 systemd[1]: Started kubelet.service. Nov 1 04:34:52.111940 systemd[1]: Started sshd@2-10.244.11.230:22-139.178.89.65:40996.service. Nov 1 04:34:52.168309 kubelet[1302]: E1101 04:34:52.168209 1302 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 04:34:52.172623 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 04:34:52.172855 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 04:34:53.018631 sshd[1309]: Accepted publickey for core from 139.178.89.65 port 40996 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:34:53.020843 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:34:53.028841 systemd-logind[1191]: New session 3 of user core. Nov 1 04:34:53.030304 systemd[1]: Started session-3.scope. Nov 1 04:34:53.639166 sshd[1309]: pam_unix(sshd:session): session closed for user core Nov 1 04:34:53.642991 systemd[1]: sshd@2-10.244.11.230:22-139.178.89.65:40996.service: Deactivated successfully. Nov 1 04:34:53.644091 systemd[1]: session-3.scope: Deactivated successfully. Nov 1 04:34:53.645015 systemd-logind[1191]: Session 3 logged out. Waiting for processes to exit. Nov 1 04:34:53.646405 systemd-logind[1191]: Removed session 3. Nov 1 04:34:53.786153 systemd[1]: Started sshd@3-10.244.11.230:22-139.178.89.65:41004.service. Nov 1 04:34:54.682576 sshd[1315]: Accepted publickey for core from 139.178.89.65 port 41004 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:34:54.685460 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:34:54.693198 systemd-logind[1191]: New session 4 of user core. Nov 1 04:34:54.693540 systemd[1]: Started session-4.scope. Nov 1 04:34:55.305382 sshd[1315]: pam_unix(sshd:session): session closed for user core Nov 1 04:34:55.309554 systemd-logind[1191]: Session 4 logged out. Waiting for processes to exit. Nov 1 04:34:55.310050 systemd[1]: sshd@3-10.244.11.230:22-139.178.89.65:41004.service: Deactivated successfully. Nov 1 04:34:55.310947 systemd[1]: session-4.scope: Deactivated successfully. Nov 1 04:34:55.312213 systemd-logind[1191]: Removed session 4. Nov 1 04:34:55.455024 systemd[1]: Started sshd@4-10.244.11.230:22-139.178.89.65:41016.service. Nov 1 04:34:56.354996 sshd[1321]: Accepted publickey for core from 139.178.89.65 port 41016 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:34:56.357017 sshd[1321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:34:56.364914 systemd[1]: Started session-5.scope. Nov 1 04:34:56.366215 systemd-logind[1191]: New session 5 of user core. Nov 1 04:34:56.855577 sudo[1324]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Nov 1 04:34:56.856006 sudo[1324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 04:34:56.865417 dbus-daemon[1176]: Н\xab\x9e?V: received setenforce notice (enforcing=-1370309184) Nov 1 04:34:56.868786 sudo[1324]: pam_unix(sudo:session): session closed for user root Nov 1 04:34:57.016025 sshd[1321]: pam_unix(sshd:session): session closed for user core Nov 1 04:34:57.021002 systemd[1]: sshd@4-10.244.11.230:22-139.178.89.65:41016.service: Deactivated successfully. Nov 1 04:34:57.022133 systemd[1]: session-5.scope: Deactivated successfully. Nov 1 04:34:57.023012 systemd-logind[1191]: Session 5 logged out. Waiting for processes to exit. Nov 1 04:34:57.024373 systemd-logind[1191]: Removed session 5. Nov 1 04:34:57.164555 systemd[1]: Started sshd@5-10.244.11.230:22-139.178.89.65:51562.service. Nov 1 04:34:58.054886 sshd[1328]: Accepted publickey for core from 139.178.89.65 port 51562 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:34:58.057675 sshd[1328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:34:58.065375 systemd[1]: Started session-6.scope. Nov 1 04:34:58.066480 systemd-logind[1191]: New session 6 of user core. Nov 1 04:34:58.533048 sudo[1332]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Nov 1 04:34:58.533515 sudo[1332]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 04:34:58.538423 sudo[1332]: pam_unix(sudo:session): session closed for user root Nov 1 04:34:58.545666 sudo[1331]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Nov 1 04:34:58.546515 sudo[1331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 04:34:58.560868 systemd[1]: Stopping audit-rules.service... Nov 1 04:34:58.562000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 04:34:58.566357 kernel: kauditd_printk_skb: 181 callbacks suppressed Nov 1 04:34:58.566496 kernel: audit: type=1305 audit(1761971698.562:210): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Nov 1 04:34:58.566970 auditctl[1335]: No rules Nov 1 04:34:58.568326 systemd[1]: audit-rules.service: Deactivated successfully. Nov 1 04:34:58.568691 systemd[1]: Stopped audit-rules.service. Nov 1 04:34:58.562000 audit[1335]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc508a7850 a2=420 a3=0 items=0 ppid=1 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:34:58.572944 systemd[1]: Starting audit-rules.service... Nov 1 04:34:58.578212 kernel: audit: type=1300 audit(1761971698.562:210): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc508a7850 a2=420 a3=0 items=0 ppid=1 pid=1335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:34:58.578294 kernel: audit: type=1327 audit(1761971698.562:210): proctitle=2F7362696E2F617564697463746C002D44 Nov 1 04:34:58.562000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Nov 1 04:34:58.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:58.585312 kernel: audit: type=1131 audit(1761971698.568:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:58.606612 augenrules[1352]: No rules Nov 1 04:34:58.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:58.607903 systemd[1]: Finished audit-rules.service. Nov 1 04:34:58.613888 sudo[1331]: pam_unix(sudo:session): session closed for user root Nov 1 04:34:58.614701 kernel: audit: type=1130 audit(1761971698.608:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:58.613000 audit[1331]: USER_END pid=1331 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 04:34:58.621153 kernel: audit: type=1106 audit(1761971698.613:213): pid=1331 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 04:34:58.621323 kernel: audit: type=1104 audit(1761971698.613:214): pid=1331 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 04:34:58.613000 audit[1331]: CRED_DISP pid=1331 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 04:34:58.759503 sshd[1328]: pam_unix(sshd:session): session closed for user core Nov 1 04:34:58.760000 audit[1328]: USER_END pid=1328 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:34:58.760000 audit[1328]: CRED_DISP pid=1328 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:34:58.772499 systemd[1]: sshd@5-10.244.11.230:22-139.178.89.65:51562.service: Deactivated successfully. Nov 1 04:34:58.773657 systemd[1]: session-6.scope: Deactivated successfully. Nov 1 04:34:58.777933 kernel: audit: type=1106 audit(1761971698.760:215): pid=1328 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:34:58.778061 kernel: audit: type=1104 audit(1761971698.760:216): pid=1328 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:34:58.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.244.11.230:22-139.178.89.65:51562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:58.785215 kernel: audit: type=1131 audit(1761971698.770:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.244.11.230:22-139.178.89.65:51562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:58.784482 systemd-logind[1191]: Session 6 logged out. Waiting for processes to exit. Nov 1 04:34:58.786481 systemd-logind[1191]: Removed session 6. Nov 1 04:34:58.907985 systemd[1]: Started sshd@6-10.244.11.230:22-139.178.89.65:51572.service. Nov 1 04:34:58.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.244.11.230:22-139.178.89.65:51572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:34:59.809000 audit[1358]: USER_ACCT pid=1358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:34:59.810089 sshd[1358]: Accepted publickey for core from 139.178.89.65 port 51572 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:34:59.811000 audit[1358]: CRED_ACQ pid=1358 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:34:59.811000 audit[1358]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcad73c4b0 a2=3 a3=0 items=0 ppid=1 pid=1358 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:34:59.811000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:34:59.812049 sshd[1358]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:34:59.818558 systemd-logind[1191]: New session 7 of user core. Nov 1 04:34:59.819211 systemd[1]: Started session-7.scope. Nov 1 04:34:59.826000 audit[1358]: USER_START pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:34:59.828000 audit[1360]: CRED_ACQ pid=1360 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:35:00.291000 audit[1361]: USER_ACCT pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 04:35:00.293353 sudo[1361]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Nov 1 04:35:00.292000 audit[1361]: CRED_REFR pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 04:35:00.293786 sudo[1361]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Nov 1 04:35:00.295000 audit[1361]: USER_START pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 04:35:00.333743 systemd[1]: Starting docker.service... Nov 1 04:35:00.395711 env[1371]: time="2025-11-01T04:35:00.395580121Z" level=info msg="Starting up" Nov 1 04:35:00.397859 env[1371]: time="2025-11-01T04:35:00.397825793Z" level=info msg="parsed scheme: \"unix\"" module=grpc Nov 1 04:35:00.398023 env[1371]: time="2025-11-01T04:35:00.397992215Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Nov 1 04:35:00.398526 env[1371]: time="2025-11-01T04:35:00.398491318Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Nov 1 04:35:00.398671 env[1371]: time="2025-11-01T04:35:00.398641573Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Nov 1 04:35:00.402392 env[1371]: time="2025-11-01T04:35:00.402359471Z" level=info msg="parsed scheme: \"unix\"" module=grpc Nov 1 04:35:00.402578 env[1371]: time="2025-11-01T04:35:00.402549020Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Nov 1 04:35:00.402793 env[1371]: time="2025-11-01T04:35:00.402760563Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Nov 1 04:35:00.402929 env[1371]: time="2025-11-01T04:35:00.402901339Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Nov 1 04:35:00.413220 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3663829568-merged.mount: Deactivated successfully. Nov 1 04:35:00.439223 env[1371]: time="2025-11-01T04:35:00.439172774Z" level=info msg="Loading containers: start." Nov 1 04:35:00.533000 audit[1403]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.533000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffca9e0e760 a2=0 a3=7ffca9e0e74c items=0 ppid=1371 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.533000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Nov 1 04:35:00.536000 audit[1405]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.536000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe43076f60 a2=0 a3=7ffe43076f4c items=0 ppid=1371 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.536000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Nov 1 04:35:00.540000 audit[1407]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.540000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc6ed31fb0 a2=0 a3=7ffc6ed31f9c items=0 ppid=1371 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.540000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Nov 1 04:35:00.544000 audit[1409]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.544000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc42884980 a2=0 a3=7ffc4288496c items=0 ppid=1371 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.544000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Nov 1 04:35:00.549000 audit[1411]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.549000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcaa554600 a2=0 a3=7ffcaa5545ec items=0 ppid=1371 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.549000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Nov 1 04:35:00.572000 audit[1416]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.572000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff2cd39ec0 a2=0 a3=7fff2cd39eac items=0 ppid=1371 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.572000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Nov 1 04:35:00.582000 audit[1418]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.582000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc19eb2460 a2=0 a3=7ffc19eb244c items=0 ppid=1371 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.582000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Nov 1 04:35:00.585000 audit[1420]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.585000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdb9987810 a2=0 a3=7ffdb99877fc items=0 ppid=1371 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.585000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Nov 1 04:35:00.588000 audit[1422]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.588000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe9ade9210 a2=0 a3=7ffe9ade91fc items=0 ppid=1371 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.588000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Nov 1 04:35:00.603000 audit[1426]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.603000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdbc5c8e40 a2=0 a3=7ffdbc5c8e2c items=0 ppid=1371 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.603000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Nov 1 04:35:00.609000 audit[1427]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.609000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd7cea63e0 a2=0 a3=7ffd7cea63cc items=0 ppid=1371 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.609000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Nov 1 04:35:00.640153 kernel: Initializing XFRM netlink socket Nov 1 04:35:00.687153 env[1371]: time="2025-11-01T04:35:00.687063245Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Nov 1 04:35:00.737000 audit[1435]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.737000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffe4496120 a2=0 a3=7fffe449610c items=0 ppid=1371 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.737000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Nov 1 04:35:00.750000 audit[1438]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.750000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffcf45cfd0 a2=0 a3=7fffcf45cfbc items=0 ppid=1371 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.750000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Nov 1 04:35:00.755000 audit[1441]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.755000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd5a5a4860 a2=0 a3=7ffd5a5a484c items=0 ppid=1371 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Nov 1 04:35:00.758000 audit[1443]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.758000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc388b07b0 a2=0 a3=7ffc388b079c items=0 ppid=1371 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.758000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Nov 1 04:35:00.761000 audit[1445]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.761000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe3e956090 a2=0 a3=7ffe3e95607c items=0 ppid=1371 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.761000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Nov 1 04:35:00.765000 audit[1447]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.765000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdc7b76c60 a2=0 a3=7ffdc7b76c4c items=0 ppid=1371 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.765000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Nov 1 04:35:00.768000 audit[1449]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.768000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff6ff7e9c0 a2=0 a3=7fff6ff7e9ac items=0 ppid=1371 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.768000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Nov 1 04:35:00.780000 audit[1452]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.780000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffcd7917bc0 a2=0 a3=7ffcd7917bac items=0 ppid=1371 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.780000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Nov 1 04:35:00.783000 audit[1454]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.783000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd250df820 a2=0 a3=7ffd250df80c items=0 ppid=1371 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.783000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Nov 1 04:35:00.786000 audit[1456]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.786000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcd45d86d0 a2=0 a3=7ffcd45d86bc items=0 ppid=1371 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.786000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Nov 1 04:35:00.790000 audit[1458]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.790000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc75dd69b0 a2=0 a3=7ffc75dd699c items=0 ppid=1371 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Nov 1 04:35:00.792417 systemd-networkd[1027]: docker0: Link UP Nov 1 04:35:00.803000 audit[1462]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.803000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe5fcb1bb0 a2=0 a3=7ffe5fcb1b9c items=0 ppid=1371 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.803000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Nov 1 04:35:00.809000 audit[1463]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:00.809000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffe1792040 a2=0 a3=7fffe179202c items=0 ppid=1371 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:00.809000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Nov 1 04:35:00.811304 env[1371]: time="2025-11-01T04:35:00.811264630Z" level=info msg="Loading containers: done." Nov 1 04:35:00.839071 env[1371]: time="2025-11-01T04:35:00.839013190Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Nov 1 04:35:00.839866 env[1371]: time="2025-11-01T04:35:00.839828651Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Nov 1 04:35:00.840288 env[1371]: time="2025-11-01T04:35:00.840248907Z" level=info msg="Daemon has completed initialization" Nov 1 04:35:00.877003 systemd[1]: Started docker.service. Nov 1 04:35:00.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:00.888084 env[1371]: time="2025-11-01T04:35:00.887819513Z" level=info msg="API listen on /run/docker.sock" Nov 1 04:35:02.254659 env[1200]: time="2025-11-01T04:35:02.254542528Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\"" Nov 1 04:35:02.268372 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Nov 1 04:35:02.268773 systemd[1]: Stopped kubelet.service. Nov 1 04:35:02.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:02.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:02.271897 systemd[1]: Starting kubelet.service... Nov 1 04:35:02.469069 systemd[1]: Started kubelet.service. Nov 1 04:35:02.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:02.579923 kubelet[1502]: E1101 04:35:02.579847 1502 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 04:35:02.583295 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 04:35:02.583565 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 04:35:02.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 04:35:03.309817 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount408016385.mount: Deactivated successfully. Nov 1 04:35:10.681379 env[1200]: time="2025-11-01T04:35:10.681141281Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:10.684899 env[1200]: time="2025-11-01T04:35:10.684828388Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b7335a56022aba291f5df653c01b7ab98d64fb5cab221378617f4a1236e06a62,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:10.687983 env[1200]: time="2025-11-01T04:35:10.687934300Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:10.692100 env[1200]: time="2025-11-01T04:35:10.692008767Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.5\" returns image reference \"sha256:b7335a56022aba291f5df653c01b7ab98d64fb5cab221378617f4a1236e06a62\"" Nov 1 04:35:10.694580 env[1200]: time="2025-11-01T04:35:10.693560585Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:1b9c6c00bc1fe86860e72efb8e4148f9e436a132eba4ca636ca4f48d61d6dfb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:10.695049 env[1200]: time="2025-11-01T04:35:10.695012897Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\"" Nov 1 04:35:10.974561 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Nov 1 04:35:10.983348 kernel: kauditd_printk_skb: 88 callbacks suppressed Nov 1 04:35:10.983567 kernel: audit: type=1131 audit(1761971710.974:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:10.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:10.998000 audit: BPF prog-id=40 op=UNLOAD Nov 1 04:35:10.998000 audit: BPF prog-id=39 op=UNLOAD Nov 1 04:35:11.002912 kernel: audit: type=1334 audit(1761971710.998:257): prog-id=40 op=UNLOAD Nov 1 04:35:11.003020 kernel: audit: type=1334 audit(1761971710.998:258): prog-id=39 op=UNLOAD Nov 1 04:35:11.003083 kernel: audit: type=1334 audit(1761971710.998:259): prog-id=38 op=UNLOAD Nov 1 04:35:10.998000 audit: BPF prog-id=38 op=UNLOAD Nov 1 04:35:12.768486 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Nov 1 04:35:12.768958 systemd[1]: Stopped kubelet.service. Nov 1 04:35:12.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:12.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:12.782942 kernel: audit: type=1130 audit(1761971712.767:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:12.783051 kernel: audit: type=1131 audit(1761971712.767:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:12.783628 systemd[1]: Starting kubelet.service... Nov 1 04:35:12.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:12.996350 systemd[1]: Started kubelet.service. Nov 1 04:35:13.004318 kernel: audit: type=1130 audit(1761971712.995:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:13.186409 kubelet[1513]: E1101 04:35:13.185688 1513 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 04:35:13.195632 kernel: audit: type=1131 audit(1761971713.188:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 04:35:13.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 04:35:13.188913 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 04:35:13.189198 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 04:35:13.483266 env[1200]: time="2025-11-01T04:35:13.482738147Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:13.487173 env[1200]: time="2025-11-01T04:35:13.486169718Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8bb43160a0df4d7d34c89d9edbc48735bc2f830771e4b501937338221be0f668,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:13.489158 env[1200]: time="2025-11-01T04:35:13.488850281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:13.491595 env[1200]: time="2025-11-01T04:35:13.491549842Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:1082a6ab67fb46397314dd36b36cb197ba4a4c5365033e9ad22bc7edaaaabd5c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:13.493138 env[1200]: time="2025-11-01T04:35:13.493083136Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.5\" returns image reference \"sha256:8bb43160a0df4d7d34c89d9edbc48735bc2f830771e4b501937338221be0f668\"" Nov 1 04:35:13.494269 env[1200]: time="2025-11-01T04:35:13.494220765Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\"" Nov 1 04:35:15.890415 env[1200]: time="2025-11-01T04:35:15.890267571Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:15.894534 env[1200]: time="2025-11-01T04:35:15.894487981Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:33b680aadf474b7e5e73957fc00c6af86dd0484c699c8461ba33ee656d1823bf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:15.897270 env[1200]: time="2025-11-01T04:35:15.897228440Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:15.899943 env[1200]: time="2025-11-01T04:35:15.899904314Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:3e7b57c9d9f06b77f0064e5be7f3df61e0151101160acd5fdecce911df28a189,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:15.901483 env[1200]: time="2025-11-01T04:35:15.901408501Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.5\" returns image reference \"sha256:33b680aadf474b7e5e73957fc00c6af86dd0484c699c8461ba33ee656d1823bf\"" Nov 1 04:35:15.902805 env[1200]: time="2025-11-01T04:35:15.902768621Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\"" Nov 1 04:35:18.068320 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2959556897.mount: Deactivated successfully. Nov 1 04:35:19.230868 env[1200]: time="2025-11-01T04:35:19.230733255Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:19.236066 env[1200]: time="2025-11-01T04:35:19.236022984Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:19.237854 env[1200]: time="2025-11-01T04:35:19.237817558Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:19.239365 env[1200]: time="2025-11-01T04:35:19.239329843Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:71445ec84ad98bd52a7784865a9d31b1b50b56092d3f7699edc39eefd71befe1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:19.240093 env[1200]: time="2025-11-01T04:35:19.240052852Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.5\" returns image reference \"sha256:2844ee7bb56c2c194e1f4adafb9e7b60b9ed16aa4d07ab8ad1f019362e2efab3\"" Nov 1 04:35:19.242005 env[1200]: time="2025-11-01T04:35:19.241966116Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" Nov 1 04:35:20.082605 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1582818549.mount: Deactivated successfully. Nov 1 04:35:22.898601 env[1200]: time="2025-11-01T04:35:22.898235467Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:22.901751 env[1200]: time="2025-11-01T04:35:22.901708487Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:22.904363 env[1200]: time="2025-11-01T04:35:22.904328358Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:22.907018 env[1200]: time="2025-11-01T04:35:22.906971592Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:22.908547 env[1200]: time="2025-11-01T04:35:22.908452319Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b\"" Nov 1 04:35:22.910206 env[1200]: time="2025-11-01T04:35:22.910029139Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Nov 1 04:35:23.268716 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Nov 1 04:35:23.269352 systemd[1]: Stopped kubelet.service. Nov 1 04:35:23.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:23.280477 kernel: audit: type=1130 audit(1761971723.268:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:23.280701 kernel: audit: type=1131 audit(1761971723.268:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:23.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:23.275296 systemd[1]: Starting kubelet.service... Nov 1 04:35:23.464631 systemd[1]: Started kubelet.service. Nov 1 04:35:23.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:23.540729 kernel: audit: type=1130 audit(1761971723.463:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:23.546435 kubelet[1524]: E1101 04:35:23.546312 1524 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 04:35:23.550192 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 04:35:23.550459 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 04:35:23.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 04:35:23.559147 kernel: audit: type=1131 audit(1761971723.549:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 04:35:23.722956 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1836337605.mount: Deactivated successfully. Nov 1 04:35:23.725593 env[1200]: time="2025-11-01T04:35:23.725532377Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:23.731175 env[1200]: time="2025-11-01T04:35:23.730059188Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:23.732247 env[1200]: time="2025-11-01T04:35:23.732202049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:23.735444 env[1200]: time="2025-11-01T04:35:23.735397085Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:23.736530 env[1200]: time="2025-11-01T04:35:23.736487370Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Nov 1 04:35:23.737344 env[1200]: time="2025-11-01T04:35:23.737283420Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" Nov 1 04:35:24.453067 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1273827914.mount: Deactivated successfully. Nov 1 04:35:24.538637 update_engine[1192]: I1101 04:35:24.537452 1192 update_attempter.cc:509] Updating boot flags... Nov 1 04:35:29.455762 env[1200]: time="2025-11-01T04:35:29.455601103Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:29.458862 env[1200]: time="2025-11-01T04:35:29.458810574Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:29.461883 env[1200]: time="2025-11-01T04:35:29.461845032Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:29.464544 env[1200]: time="2025-11-01T04:35:29.464498725Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:29.466152 env[1200]: time="2025-11-01T04:35:29.466086048Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1\"" Nov 1 04:35:33.768564 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Nov 1 04:35:33.769124 systemd[1]: Stopped kubelet.service. Nov 1 04:35:33.776280 kernel: audit: type=1130 audit(1761971733.768:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:33.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:33.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:33.782529 systemd[1]: Starting kubelet.service... Nov 1 04:35:33.785540 kernel: audit: type=1131 audit(1761971733.768:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:34.485711 systemd[1]: Started kubelet.service. Nov 1 04:35:34.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:34.492145 kernel: audit: type=1130 audit(1761971734.485:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:34.577333 kubelet[1568]: E1101 04:35:34.577246 1568 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Nov 1 04:35:34.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 04:35:34.580559 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Nov 1 04:35:34.587223 kernel: audit: type=1131 audit(1761971734.580:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Nov 1 04:35:34.580798 systemd[1]: kubelet.service: Failed with result 'exit-code'. Nov 1 04:35:34.846091 systemd[1]: Stopped kubelet.service. Nov 1 04:35:34.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:34.860995 kernel: audit: type=1130 audit(1761971734.845:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:34.861173 kernel: audit: type=1131 audit(1761971734.851:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:34.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:34.859881 systemd[1]: Starting kubelet.service... Nov 1 04:35:34.903970 systemd[1]: Reloading. Nov 1 04:35:35.015941 /usr/lib/systemd/system-generators/torcx-generator[1600]: time="2025-11-01T04:35:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 04:35:35.016002 /usr/lib/systemd/system-generators/torcx-generator[1600]: time="2025-11-01T04:35:35Z" level=info msg="torcx already run" Nov 1 04:35:35.162721 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 04:35:35.162770 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 04:35:35.193096 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 04:35:35.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.309686 kernel: audit: type=1400 audit(1761971735.298:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.309877 kernel: audit: type=1400 audit(1761971735.298:275): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.309938 kernel: audit: type=1400 audit(1761971735.303:276): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.319878 kernel: audit: type=1400 audit(1761971735.303:277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.313000 audit: BPF prog-id=43 op=LOAD Nov 1 04:35:35.313000 audit: BPF prog-id=33 op=UNLOAD Nov 1 04:35:35.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.320000 audit: BPF prog-id=44 op=LOAD Nov 1 04:35:35.320000 audit: BPF prog-id=34 op=UNLOAD Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit: BPF prog-id=45 op=LOAD Nov 1 04:35:35.322000 audit: BPF prog-id=24 op=UNLOAD Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit: BPF prog-id=46 op=LOAD Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.322000 audit: BPF prog-id=47 op=LOAD Nov 1 04:35:35.322000 audit: BPF prog-id=25 op=UNLOAD Nov 1 04:35:35.322000 audit: BPF prog-id=26 op=UNLOAD Nov 1 04:35:35.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit: BPF prog-id=48 op=LOAD Nov 1 04:35:35.324000 audit: BPF prog-id=35 op=UNLOAD Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit: BPF prog-id=49 op=LOAD Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.324000 audit: BPF prog-id=50 op=LOAD Nov 1 04:35:35.324000 audit: BPF prog-id=36 op=UNLOAD Nov 1 04:35:35.324000 audit: BPF prog-id=37 op=UNLOAD Nov 1 04:35:35.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.327000 audit: BPF prog-id=51 op=LOAD Nov 1 04:35:35.328000 audit: BPF prog-id=27 op=UNLOAD Nov 1 04:35:35.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit: BPF prog-id=52 op=LOAD Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit: BPF prog-id=53 op=LOAD Nov 1 04:35:35.329000 audit: BPF prog-id=28 op=UNLOAD Nov 1 04:35:35.329000 audit: BPF prog-id=29 op=UNLOAD Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.329000 audit: BPF prog-id=54 op=LOAD Nov 1 04:35:35.329000 audit: BPF prog-id=41 op=UNLOAD Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit: BPF prog-id=55 op=LOAD Nov 1 04:35:35.332000 audit: BPF prog-id=30 op=UNLOAD Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit: BPF prog-id=56 op=LOAD Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:35.332000 audit: BPF prog-id=57 op=LOAD Nov 1 04:35:35.332000 audit: BPF prog-id=31 op=UNLOAD Nov 1 04:35:35.332000 audit: BPF prog-id=32 op=UNLOAD Nov 1 04:35:35.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:35.380808 systemd[1]: Started kubelet.service. Nov 1 04:35:35.385500 systemd[1]: Stopping kubelet.service... Nov 1 04:35:35.386856 systemd[1]: kubelet.service: Deactivated successfully. Nov 1 04:35:35.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:35.387306 systemd[1]: Stopped kubelet.service. Nov 1 04:35:35.389943 systemd[1]: Starting kubelet.service... Nov 1 04:35:35.528483 systemd[1]: Started kubelet.service. Nov 1 04:35:35.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:35.683652 kubelet[1654]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 04:35:35.683652 kubelet[1654]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Nov 1 04:35:35.683652 kubelet[1654]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 04:35:35.683652 kubelet[1654]: I1101 04:35:35.683472 1654 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Nov 1 04:35:36.511208 kubelet[1654]: I1101 04:35:36.511092 1654 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Nov 1 04:35:36.511208 kubelet[1654]: I1101 04:35:36.511163 1654 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Nov 1 04:35:36.511539 kubelet[1654]: I1101 04:35:36.511474 1654 server.go:956] "Client rotation is on, will bootstrap in background" Nov 1 04:35:36.579985 kubelet[1654]: E1101 04:35:36.579895 1654 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.244.11.230:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.11.230:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Nov 1 04:35:36.580334 kubelet[1654]: I1101 04:35:36.580297 1654 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Nov 1 04:35:36.595846 kubelet[1654]: E1101 04:35:36.595793 1654 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Nov 1 04:35:36.596088 kubelet[1654]: I1101 04:35:36.596060 1654 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Nov 1 04:35:36.604033 kubelet[1654]: I1101 04:35:36.603997 1654 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Nov 1 04:35:36.604726 kubelet[1654]: I1101 04:35:36.604685 1654 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Nov 1 04:35:36.605232 kubelet[1654]: I1101 04:35:36.604859 1654 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-cigeh.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Nov 1 04:35:36.605557 kubelet[1654]: I1101 04:35:36.605530 1654 topology_manager.go:138] "Creating topology manager with none policy" Nov 1 04:35:36.605682 kubelet[1654]: I1101 04:35:36.605658 1654 container_manager_linux.go:303] "Creating device plugin manager" Nov 1 04:35:36.607027 kubelet[1654]: I1101 04:35:36.606998 1654 state_mem.go:36] "Initialized new in-memory state store" Nov 1 04:35:36.610313 kubelet[1654]: I1101 04:35:36.610287 1654 kubelet.go:480] "Attempting to sync node with API server" Nov 1 04:35:36.610496 kubelet[1654]: I1101 04:35:36.610471 1654 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Nov 1 04:35:36.614197 kubelet[1654]: I1101 04:35:36.614158 1654 kubelet.go:386] "Adding apiserver pod source" Nov 1 04:35:36.614369 kubelet[1654]: I1101 04:35:36.614343 1654 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Nov 1 04:35:36.619060 kubelet[1654]: E1101 04:35:36.619010 1654 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.244.11.230:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-cigeh.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.11.230:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Nov 1 04:35:36.629674 kubelet[1654]: I1101 04:35:36.629630 1654 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Nov 1 04:35:36.630706 kubelet[1654]: I1101 04:35:36.630678 1654 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Nov 1 04:35:36.632547 kubelet[1654]: W1101 04:35:36.632519 1654 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Nov 1 04:35:36.639360 kubelet[1654]: I1101 04:35:36.639335 1654 watchdog_linux.go:99] "Systemd watchdog is not enabled" Nov 1 04:35:36.639569 kubelet[1654]: I1101 04:35:36.639546 1654 server.go:1289] "Started kubelet" Nov 1 04:35:36.639955 kubelet[1654]: E1101 04:35:36.639887 1654 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.244.11.230:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.11.230:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Nov 1 04:35:36.648405 kubelet[1654]: I1101 04:35:36.648337 1654 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Nov 1 04:35:36.649497 kubelet[1654]: I1101 04:35:36.649424 1654 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Nov 1 04:35:36.649851 kubelet[1654]: I1101 04:35:36.649820 1654 server.go:317] "Adding debug handlers to kubelet server" Nov 1 04:35:36.650431 kubelet[1654]: I1101 04:35:36.650402 1654 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Nov 1 04:35:36.652429 kubelet[1654]: E1101 04:35:36.650970 1654 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.11.230:6443/api/v1/namespaces/default/events\": dial tcp 10.244.11.230:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-cigeh.gb1.brightbox.com.1873c7f58aacf54f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-cigeh.gb1.brightbox.com,UID:srv-cigeh.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-cigeh.gb1.brightbox.com,},FirstTimestamp:2025-11-01 04:35:36.639501647 +0000 UTC m=+1.103086092,LastTimestamp:2025-11-01 04:35:36.639501647 +0000 UTC m=+1.103086092,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-cigeh.gb1.brightbox.com,}" Nov 1 04:35:36.654000 audit[1654]: AVC avc: denied { mac_admin } for pid=1654 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:36.654000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 04:35:36.654000 audit[1654]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a94f90 a1=c0007fd9e0 a2=c000a94f60 a3=25 items=0 ppid=1 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.654000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 04:35:36.656808 kubelet[1654]: I1101 04:35:36.656772 1654 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Nov 1 04:35:36.655000 audit[1654]: AVC avc: denied { mac_admin } for pid=1654 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:36.655000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 04:35:36.655000 audit[1654]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a96360 a1=c0007fd9f8 a2=c000a95020 a3=25 items=0 ppid=1 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.655000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 04:35:36.657507 kubelet[1654]: I1101 04:35:36.657476 1654 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Nov 1 04:35:36.657766 kubelet[1654]: I1101 04:35:36.657741 1654 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Nov 1 04:35:36.659896 kubelet[1654]: I1101 04:35:36.659868 1654 volume_manager.go:297] "Starting Kubelet Volume Manager" Nov 1 04:35:36.659993 kubelet[1654]: I1101 04:35:36.659977 1654 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Nov 1 04:35:36.663725 kubelet[1654]: E1101 04:35:36.657533 1654 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Nov 1 04:35:36.663814 kubelet[1654]: I1101 04:35:36.663792 1654 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Nov 1 04:35:36.663900 kubelet[1654]: I1101 04:35:36.663877 1654 reconciler.go:26] "Reconciler: start to sync state" Nov 1 04:35:36.664794 kubelet[1654]: E1101 04:35:36.664754 1654 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.244.11.230:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.11.230:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Nov 1 04:35:36.665326 kubelet[1654]: E1101 04:35:36.665293 1654 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-cigeh.gb1.brightbox.com\" not found" Nov 1 04:35:36.665662 kubelet[1654]: E1101 04:35:36.665414 1654 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.11.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-cigeh.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.11.230:6443: connect: connection refused" interval="200ms" Nov 1 04:35:36.667821 kubelet[1654]: I1101 04:35:36.667789 1654 factory.go:223] Registration of the containerd container factory successfully Nov 1 04:35:36.667821 kubelet[1654]: I1101 04:35:36.667816 1654 factory.go:223] Registration of the systemd container factory successfully Nov 1 04:35:36.667973 kubelet[1654]: I1101 04:35:36.667915 1654 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Nov 1 04:35:36.669000 audit[1670]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:36.669000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd4a69bd30 a2=0 a3=7ffd4a69bd1c items=0 ppid=1654 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 04:35:36.675000 audit[1673]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:36.675000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd96c5870 a2=0 a3=7fffd96c585c items=0 ppid=1654 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 04:35:36.680000 audit[1676]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:36.680000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe753c3420 a2=0 a3=7ffe753c340c items=0 ppid=1654 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 04:35:36.688000 audit[1678]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:36.688000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc8d085240 a2=0 a3=7ffc8d08522c items=0 ppid=1654 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.688000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 04:35:36.702139 kubelet[1654]: I1101 04:35:36.702047 1654 cpu_manager.go:221] "Starting CPU manager" policy="none" Nov 1 04:35:36.702139 kubelet[1654]: I1101 04:35:36.702076 1654 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Nov 1 04:35:36.702920 kubelet[1654]: I1101 04:35:36.702148 1654 state_mem.go:36] "Initialized new in-memory state store" Nov 1 04:35:36.704274 kubelet[1654]: I1101 04:35:36.704239 1654 policy_none.go:49] "None policy: Start" Nov 1 04:35:36.704350 kubelet[1654]: I1101 04:35:36.704281 1654 memory_manager.go:186] "Starting memorymanager" policy="None" Nov 1 04:35:36.704350 kubelet[1654]: I1101 04:35:36.704317 1654 state_mem.go:35] "Initializing new in-memory state store" Nov 1 04:35:36.722000 audit[1683]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:36.722000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffecadc6d70 a2=0 a3=7ffecadc6d5c items=0 ppid=1654 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.722000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Nov 1 04:35:36.724359 kubelet[1654]: I1101 04:35:36.723920 1654 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Nov 1 04:35:36.724000 audit[1685]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1685 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:36.724000 audit[1685]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffed537e060 a2=0 a3=7ffed537e04c items=0 ppid=1654 pid=1685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Nov 1 04:35:36.726000 audit[1686]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:36.726000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6eec1a30 a2=0 a3=7fff6eec1a1c items=0 ppid=1654 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 04:35:36.727939 kubelet[1654]: I1101 04:35:36.725584 1654 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Nov 1 04:35:36.727939 kubelet[1654]: I1101 04:35:36.725643 1654 status_manager.go:230] "Starting to sync pod status with apiserver" Nov 1 04:35:36.727939 kubelet[1654]: I1101 04:35:36.725680 1654 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Nov 1 04:35:36.727939 kubelet[1654]: I1101 04:35:36.725699 1654 kubelet.go:2436] "Starting kubelet main sync loop" Nov 1 04:35:36.727939 kubelet[1654]: E1101 04:35:36.725757 1654 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Nov 1 04:35:36.727000 audit[1687]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:36.727000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9427ca40 a2=0 a3=7ffd9427ca2c items=0 ppid=1654 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 04:35:36.726247 systemd[1]: Created slice kubepods.slice. Nov 1 04:35:36.728000 audit[1688]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:36.728000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8fb39da0 a2=0 a3=7fff8fb39d8c items=0 ppid=1654 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 04:35:36.730000 audit[1689]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:36.730000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6bbc43f0 a2=0 a3=7ffe6bbc43dc items=0 ppid=1654 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Nov 1 04:35:36.731000 audit[1690]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:36.731000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd841b8a80 a2=0 a3=7ffd841b8a6c items=0 ppid=1654 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.731000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Nov 1 04:35:36.733000 audit[1691]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:36.733000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca5fe6180 a2=0 a3=7ffca5fe616c items=0 ppid=1654 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Nov 1 04:35:36.735433 kubelet[1654]: E1101 04:35:36.735341 1654 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.244.11.230:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.11.230:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Nov 1 04:35:36.741361 systemd[1]: Created slice kubepods-burstable.slice. Nov 1 04:35:36.745878 systemd[1]: Created slice kubepods-besteffort.slice. Nov 1 04:35:36.752750 kubelet[1654]: E1101 04:35:36.752652 1654 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Nov 1 04:35:36.751000 audit[1654]: AVC avc: denied { mac_admin } for pid=1654 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:36.751000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 04:35:36.751000 audit[1654]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005b2d80 a1=c000bece40 a2=c0005b2d50 a3=25 items=0 ppid=1 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:36.751000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 04:35:36.753349 kubelet[1654]: E1101 04:35:36.752894 1654 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Nov 1 04:35:36.753349 kubelet[1654]: I1101 04:35:36.753152 1654 eviction_manager.go:189] "Eviction manager: starting control loop" Nov 1 04:35:36.753349 kubelet[1654]: I1101 04:35:36.753217 1654 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Nov 1 04:35:36.754077 kubelet[1654]: I1101 04:35:36.754051 1654 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Nov 1 04:35:36.756303 kubelet[1654]: E1101 04:35:36.755754 1654 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Nov 1 04:35:36.756303 kubelet[1654]: E1101 04:35:36.755840 1654 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-cigeh.gb1.brightbox.com\" not found" Nov 1 04:35:36.840975 systemd[1]: Created slice kubepods-burstable-pode0e1157ac0ce4e930d56637ae03a1cff.slice. Nov 1 04:35:36.855357 kubelet[1654]: E1101 04:35:36.855301 1654 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cigeh.gb1.brightbox.com\" not found" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.856546 kubelet[1654]: I1101 04:35:36.856519 1654 kubelet_node_status.go:75] "Attempting to register node" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.857346 kubelet[1654]: E1101 04:35:36.857312 1654 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.11.230:6443/api/v1/nodes\": dial tcp 10.244.11.230:6443: connect: connection refused" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.862045 systemd[1]: Created slice kubepods-burstable-poddd1721bfba7da7dbf461b302f5d91e85.slice. Nov 1 04:35:36.866001 kubelet[1654]: I1101 04:35:36.865427 1654 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/dd1721bfba7da7dbf461b302f5d91e85-flexvolume-dir\") pod \"kube-controller-manager-srv-cigeh.gb1.brightbox.com\" (UID: \"dd1721bfba7da7dbf461b302f5d91e85\") " pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.866196 kubelet[1654]: I1101 04:35:36.866154 1654 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8e518644780a0bf0c09775da15528b7e-kubeconfig\") pod \"kube-scheduler-srv-cigeh.gb1.brightbox.com\" (UID: \"8e518644780a0bf0c09775da15528b7e\") " pod="kube-system/kube-scheduler-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.866355 kubelet[1654]: I1101 04:35:36.866325 1654 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e0e1157ac0ce4e930d56637ae03a1cff-ca-certs\") pod \"kube-apiserver-srv-cigeh.gb1.brightbox.com\" (UID: \"e0e1157ac0ce4e930d56637ae03a1cff\") " pod="kube-system/kube-apiserver-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.866520 kubelet[1654]: I1101 04:35:36.866488 1654 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e0e1157ac0ce4e930d56637ae03a1cff-usr-share-ca-certificates\") pod \"kube-apiserver-srv-cigeh.gb1.brightbox.com\" (UID: \"e0e1157ac0ce4e930d56637ae03a1cff\") " pod="kube-system/kube-apiserver-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.866662 kubelet[1654]: I1101 04:35:36.866633 1654 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dd1721bfba7da7dbf461b302f5d91e85-ca-certs\") pod \"kube-controller-manager-srv-cigeh.gb1.brightbox.com\" (UID: \"dd1721bfba7da7dbf461b302f5d91e85\") " pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.866911 kubelet[1654]: I1101 04:35:36.866815 1654 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dd1721bfba7da7dbf461b302f5d91e85-k8s-certs\") pod \"kube-controller-manager-srv-cigeh.gb1.brightbox.com\" (UID: \"dd1721bfba7da7dbf461b302f5d91e85\") " pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.868014 kubelet[1654]: I1101 04:35:36.867982 1654 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/dd1721bfba7da7dbf461b302f5d91e85-kubeconfig\") pod \"kube-controller-manager-srv-cigeh.gb1.brightbox.com\" (UID: \"dd1721bfba7da7dbf461b302f5d91e85\") " pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.869352 systemd[1]: Created slice kubepods-burstable-pod8e518644780a0bf0c09775da15528b7e.slice. Nov 1 04:35:36.871006 kubelet[1654]: I1101 04:35:36.870269 1654 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dd1721bfba7da7dbf461b302f5d91e85-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-cigeh.gb1.brightbox.com\" (UID: \"dd1721bfba7da7dbf461b302f5d91e85\") " pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.871006 kubelet[1654]: I1101 04:35:36.870430 1654 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e0e1157ac0ce4e930d56637ae03a1cff-k8s-certs\") pod \"kube-apiserver-srv-cigeh.gb1.brightbox.com\" (UID: \"e0e1157ac0ce4e930d56637ae03a1cff\") " pod="kube-system/kube-apiserver-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.871006 kubelet[1654]: E1101 04:35:36.867523 1654 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cigeh.gb1.brightbox.com\" not found" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:36.871006 kubelet[1654]: E1101 04:35:36.866066 1654 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.11.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-cigeh.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.11.230:6443: connect: connection refused" interval="400ms" Nov 1 04:35:36.871400 kubelet[1654]: E1101 04:35:36.871360 1654 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cigeh.gb1.brightbox.com\" not found" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:37.061334 kubelet[1654]: I1101 04:35:37.061287 1654 kubelet_node_status.go:75] "Attempting to register node" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:37.061972 kubelet[1654]: E1101 04:35:37.061937 1654 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.11.230:6443/api/v1/nodes\": dial tcp 10.244.11.230:6443: connect: connection refused" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:37.159023 env[1200]: time="2025-11-01T04:35:37.158151285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-cigeh.gb1.brightbox.com,Uid:e0e1157ac0ce4e930d56637ae03a1cff,Namespace:kube-system,Attempt:0,}" Nov 1 04:35:37.171881 env[1200]: time="2025-11-01T04:35:37.171778411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-cigeh.gb1.brightbox.com,Uid:dd1721bfba7da7dbf461b302f5d91e85,Namespace:kube-system,Attempt:0,}" Nov 1 04:35:37.172953 env[1200]: time="2025-11-01T04:35:37.172660762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-cigeh.gb1.brightbox.com,Uid:8e518644780a0bf0c09775da15528b7e,Namespace:kube-system,Attempt:0,}" Nov 1 04:35:37.271846 kubelet[1654]: E1101 04:35:37.271782 1654 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.11.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-cigeh.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.11.230:6443: connect: connection refused" interval="800ms" Nov 1 04:35:37.465739 kubelet[1654]: I1101 04:35:37.465608 1654 kubelet_node_status.go:75] "Attempting to register node" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:37.466546 kubelet[1654]: E1101 04:35:37.466510 1654 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.11.230:6443/api/v1/nodes\": dial tcp 10.244.11.230:6443: connect: connection refused" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:37.552946 kubelet[1654]: E1101 04:35:37.552874 1654 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.244.11.230:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.11.230:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" Nov 1 04:35:37.600777 kubelet[1654]: E1101 04:35:37.600712 1654 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.244.11.230:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-cigeh.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.11.230:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" Nov 1 04:35:37.659034 kubelet[1654]: E1101 04:35:37.658960 1654 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.244.11.230:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.11.230:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" Nov 1 04:35:37.869213 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1650923649.mount: Deactivated successfully. Nov 1 04:35:37.875272 env[1200]: time="2025-11-01T04:35:37.875206835Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:37.892087 env[1200]: time="2025-11-01T04:35:37.891927526Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:37.895361 env[1200]: time="2025-11-01T04:35:37.895323319Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:37.897297 env[1200]: time="2025-11-01T04:35:37.897261575Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:37.929343 env[1200]: time="2025-11-01T04:35:37.929248720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:37.933864 env[1200]: time="2025-11-01T04:35:37.933746274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:37.937229 env[1200]: time="2025-11-01T04:35:37.937189837Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:37.939339 env[1200]: time="2025-11-01T04:35:37.939303320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:37.941030 env[1200]: time="2025-11-01T04:35:37.940981367Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:37.945425 env[1200]: time="2025-11-01T04:35:37.945375165Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:37.953204 env[1200]: time="2025-11-01T04:35:37.953105172Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:37.963128 env[1200]: time="2025-11-01T04:35:37.963059337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:38.015601 env[1200]: time="2025-11-01T04:35:38.015449982Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:35:38.015601 env[1200]: time="2025-11-01T04:35:38.015534095Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:35:38.016253 env[1200]: time="2025-11-01T04:35:38.015801935Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:35:38.016481 env[1200]: time="2025-11-01T04:35:38.016406259Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/76b72c7d5815db0863d97b65a2f25d06e98fe57953a5497ce0a2de31ed7ec12b pid=1701 runtime=io.containerd.runc.v2 Nov 1 04:35:38.023716 env[1200]: time="2025-11-01T04:35:38.023627301Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:35:38.023964 env[1200]: time="2025-11-01T04:35:38.023680286Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:35:38.023964 env[1200]: time="2025-11-01T04:35:38.023724009Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:35:38.024230 env[1200]: time="2025-11-01T04:35:38.024151028Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:35:38.024357 env[1200]: time="2025-11-01T04:35:38.024199775Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:35:38.024357 env[1200]: time="2025-11-01T04:35:38.024240580Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:35:38.024549 env[1200]: time="2025-11-01T04:35:38.024498326Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/18f8b31c3899af492a9e9809cb459191752a71e8f4d797ca4bc1b1b8c88a0e96 pid=1722 runtime=io.containerd.runc.v2 Nov 1 04:35:38.024738 env[1200]: time="2025-11-01T04:35:38.024668860Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bf35c394ea99bc5cab497c9bb46780b68263de75cfc63f0c720381fece8ed88c pid=1721 runtime=io.containerd.runc.v2 Nov 1 04:35:38.055968 systemd[1]: Started cri-containerd-76b72c7d5815db0863d97b65a2f25d06e98fe57953a5497ce0a2de31ed7ec12b.scope. Nov 1 04:35:38.071617 systemd[1]: Started cri-containerd-bf35c394ea99bc5cab497c9bb46780b68263de75cfc63f0c720381fece8ed88c.scope. Nov 1 04:35:38.078637 kubelet[1654]: E1101 04:35:38.078282 1654 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.11.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-cigeh.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.11.230:6443: connect: connection refused" interval="1.6s" Nov 1 04:35:38.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.090000 audit: BPF prog-id=58 op=LOAD Nov 1 04:35:38.094819 systemd[1]: Started cri-containerd-18f8b31c3899af492a9e9809cb459191752a71e8f4d797ca4bc1b1b8c88a0e96.scope. Nov 1 04:35:38.096000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.096000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1701 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623732633764353831356462303836336439376236356132663235 Nov 1 04:35:38.097000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.097000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1701 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623732633764353831356462303836336439376236356132663235 Nov 1 04:35:38.098000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.098000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.098000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.098000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.098000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.098000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.098000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.098000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.098000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.098000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.098000 audit: BPF prog-id=59 op=LOAD Nov 1 04:35:38.098000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003ca860 items=0 ppid=1701 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623732633764353831356462303836336439376236356132663235 Nov 1 04:35:38.100000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.100000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.100000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.100000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.100000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.100000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.100000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.100000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.100000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.100000 audit: BPF prog-id=60 op=LOAD Nov 1 04:35:38.100000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003ca8a8 items=0 ppid=1701 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623732633764353831356462303836336439376236356132663235 Nov 1 04:35:38.102000 audit: BPF prog-id=60 op=UNLOAD Nov 1 04:35:38.102000 audit: BPF prog-id=59 op=UNLOAD Nov 1 04:35:38.102000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.102000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.102000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.102000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.102000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.102000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.102000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.102000 audit[1733]: AVC avc: denied { perfmon } for pid=1733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.102000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.102000 audit[1733]: AVC avc: denied { bpf } for pid=1733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.102000 audit: BPF prog-id=61 op=LOAD Nov 1 04:35:38.102000 audit[1733]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003cacb8 items=0 ppid=1701 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623732633764353831356462303836336439376236356132663235 Nov 1 04:35:38.110529 kubelet[1654]: E1101 04:35:38.110448 1654 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.244.11.230:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.11.230:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" Nov 1 04:35:38.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.131000 audit: BPF prog-id=62 op=LOAD Nov 1 04:35:38.133000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.133000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1721 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333563333934656139396263356361623439376339626234363738 Nov 1 04:35:38.135000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.135000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1721 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333563333934656139396263356361623439376339626234363738 Nov 1 04:35:38.135000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.135000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.135000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.135000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.135000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.135000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.135000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.135000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.135000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.135000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.135000 audit: BPF prog-id=63 op=LOAD Nov 1 04:35:38.135000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00025da20 items=0 ppid=1721 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333563333934656139396263356361623439376339626234363738 Nov 1 04:35:38.136000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.136000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.136000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.136000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.136000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.136000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.136000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.136000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.136000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.136000 audit: BPF prog-id=64 op=LOAD Nov 1 04:35:38.136000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00025da68 items=0 ppid=1721 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333563333934656139396263356361623439376339626234363738 Nov 1 04:35:38.138000 audit: BPF prog-id=64 op=UNLOAD Nov 1 04:35:38.138000 audit: BPF prog-id=63 op=UNLOAD Nov 1 04:35:38.138000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.138000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.138000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.138000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.138000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.138000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.138000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.138000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.138000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.138000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.138000 audit: BPF prog-id=65 op=LOAD Nov 1 04:35:38.138000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00025de78 items=0 ppid=1721 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266333563333934656139396263356361623439376339626234363738 Nov 1 04:35:38.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.157000 audit: BPF prog-id=66 op=LOAD Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1722 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138663862333163333839396166343932613965393830396362343539 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1722 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138663862333163333839396166343932613965393830396362343539 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit: BPF prog-id=67 op=LOAD Nov 1 04:35:38.158000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d4c00 items=0 ppid=1722 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138663862333163333839396166343932613965393830396362343539 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit: BPF prog-id=68 op=LOAD Nov 1 04:35:38.158000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d4c48 items=0 ppid=1722 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138663862333163333839396166343932613965393830396362343539 Nov 1 04:35:38.158000 audit: BPF prog-id=68 op=UNLOAD Nov 1 04:35:38.158000 audit: BPF prog-id=67 op=UNLOAD Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.158000 audit: BPF prog-id=69 op=LOAD Nov 1 04:35:38.158000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d5058 items=0 ppid=1722 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138663862333163333839396166343932613965393830396362343539 Nov 1 04:35:38.191709 env[1200]: time="2025-11-01T04:35:38.191640802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-cigeh.gb1.brightbox.com,Uid:e0e1157ac0ce4e930d56637ae03a1cff,Namespace:kube-system,Attempt:0,} returns sandbox id \"76b72c7d5815db0863d97b65a2f25d06e98fe57953a5497ce0a2de31ed7ec12b\"" Nov 1 04:35:38.201932 env[1200]: time="2025-11-01T04:35:38.201878501Z" level=info msg="CreateContainer within sandbox \"76b72c7d5815db0863d97b65a2f25d06e98fe57953a5497ce0a2de31ed7ec12b\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Nov 1 04:35:38.231488 env[1200]: time="2025-11-01T04:35:38.231415037Z" level=info msg="CreateContainer within sandbox \"76b72c7d5815db0863d97b65a2f25d06e98fe57953a5497ce0a2de31ed7ec12b\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"435dbe1fd9551ef2eda91a99920d3f925a7a92b3dd850928b3c92897cbbaefe8\"" Nov 1 04:35:38.232988 env[1200]: time="2025-11-01T04:35:38.232952570Z" level=info msg="StartContainer for \"435dbe1fd9551ef2eda91a99920d3f925a7a92b3dd850928b3c92897cbbaefe8\"" Nov 1 04:35:38.241635 env[1200]: time="2025-11-01T04:35:38.241579781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-cigeh.gb1.brightbox.com,Uid:8e518644780a0bf0c09775da15528b7e,Namespace:kube-system,Attempt:0,} returns sandbox id \"18f8b31c3899af492a9e9809cb459191752a71e8f4d797ca4bc1b1b8c88a0e96\"" Nov 1 04:35:38.247885 env[1200]: time="2025-11-01T04:35:38.247820567Z" level=info msg="CreateContainer within sandbox \"18f8b31c3899af492a9e9809cb459191752a71e8f4d797ca4bc1b1b8c88a0e96\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Nov 1 04:35:38.261754 env[1200]: time="2025-11-01T04:35:38.261667010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-cigeh.gb1.brightbox.com,Uid:dd1721bfba7da7dbf461b302f5d91e85,Namespace:kube-system,Attempt:0,} returns sandbox id \"bf35c394ea99bc5cab497c9bb46780b68263de75cfc63f0c720381fece8ed88c\"" Nov 1 04:35:38.266324 env[1200]: time="2025-11-01T04:35:38.266278946Z" level=info msg="CreateContainer within sandbox \"bf35c394ea99bc5cab497c9bb46780b68263de75cfc63f0c720381fece8ed88c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Nov 1 04:35:38.267011 env[1200]: time="2025-11-01T04:35:38.266965886Z" level=info msg="CreateContainer within sandbox \"18f8b31c3899af492a9e9809cb459191752a71e8f4d797ca4bc1b1b8c88a0e96\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"0ca1ab676479a2dceeece8b4b408a65a9e407b4919886ecd65a5c3000f30257a\"" Nov 1 04:35:38.268351 env[1200]: time="2025-11-01T04:35:38.268303531Z" level=info msg="StartContainer for \"0ca1ab676479a2dceeece8b4b408a65a9e407b4919886ecd65a5c3000f30257a\"" Nov 1 04:35:38.273958 kubelet[1654]: I1101 04:35:38.273340 1654 kubelet_node_status.go:75] "Attempting to register node" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:38.273958 kubelet[1654]: E1101 04:35:38.273850 1654 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.244.11.230:6443/api/v1/nodes\": dial tcp 10.244.11.230:6443: connect: connection refused" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:38.285801 systemd[1]: Started cri-containerd-435dbe1fd9551ef2eda91a99920d3f925a7a92b3dd850928b3c92897cbbaefe8.scope. Nov 1 04:35:38.295580 env[1200]: time="2025-11-01T04:35:38.295512350Z" level=info msg="CreateContainer within sandbox \"bf35c394ea99bc5cab497c9bb46780b68263de75cfc63f0c720381fece8ed88c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"f3e23df31eef8092f8e2ce39180750bc2edde76ac1d4098f6b42b213b681b0d6\"" Nov 1 04:35:38.296368 env[1200]: time="2025-11-01T04:35:38.296188330Z" level=info msg="StartContainer for \"f3e23df31eef8092f8e2ce39180750bc2edde76ac1d4098f6b42b213b681b0d6\"" Nov 1 04:35:38.312318 systemd[1]: Started cri-containerd-0ca1ab676479a2dceeece8b4b408a65a9e407b4919886ecd65a5c3000f30257a.scope. Nov 1 04:35:38.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.326000 audit: BPF prog-id=70 op=LOAD Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=1701 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356462653166643935353165663265646139316139393932306433 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=1701 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356462653166643935353165663265646139316139393932306433 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit: BPF prog-id=71 op=LOAD Nov 1 04:35:38.327000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00021ab50 items=0 ppid=1701 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356462653166643935353165663265646139316139393932306433 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit: BPF prog-id=72 op=LOAD Nov 1 04:35:38.327000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00021ab98 items=0 ppid=1701 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356462653166643935353165663265646139316139393932306433 Nov 1 04:35:38.327000 audit: BPF prog-id=72 op=UNLOAD Nov 1 04:35:38.327000 audit: BPF prog-id=71 op=UNLOAD Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.327000 audit: BPF prog-id=73 op=LOAD Nov 1 04:35:38.327000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00021afa8 items=0 ppid=1701 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433356462653166643935353165663265646139316139393932306433 Nov 1 04:35:38.348973 systemd[1]: Started cri-containerd-f3e23df31eef8092f8e2ce39180750bc2edde76ac1d4098f6b42b213b681b0d6.scope. Nov 1 04:35:38.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.374000 audit: BPF prog-id=74 op=LOAD Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1722 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613161623637363437396132646365656563653862346234303861 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1722 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613161623637363437396132646365656563653862346234303861 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit: BPF prog-id=75 op=LOAD Nov 1 04:35:38.375000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025390 items=0 ppid=1722 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613161623637363437396132646365656563653862346234303861 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.375000 audit: BPF prog-id=76 op=LOAD Nov 1 04:35:38.375000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000253d8 items=0 ppid=1722 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613161623637363437396132646365656563653862346234303861 Nov 1 04:35:38.375000 audit: BPF prog-id=76 op=UNLOAD Nov 1 04:35:38.375000 audit: BPF prog-id=75 op=UNLOAD Nov 1 04:35:38.376000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.376000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.376000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.376000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.376000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.376000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.376000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.376000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.376000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.376000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.376000 audit: BPF prog-id=77 op=LOAD Nov 1 04:35:38.376000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000257e8 items=0 ppid=1722 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613161623637363437396132646365656563653862346234303861 Nov 1 04:35:38.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.407000 audit: BPF prog-id=78 op=LOAD Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1721 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653233646633316565663830393266386532636533393138303735 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1721 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653233646633316565663830393266386532636533393138303735 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit: BPF prog-id=79 op=LOAD Nov 1 04:35:38.408000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b4ee0 items=0 ppid=1721 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653233646633316565663830393266386532636533393138303735 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.408000 audit: BPF prog-id=80 op=LOAD Nov 1 04:35:38.408000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b4f28 items=0 ppid=1721 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653233646633316565663830393266386532636533393138303735 Nov 1 04:35:38.408000 audit: BPF prog-id=80 op=UNLOAD Nov 1 04:35:38.409000 audit: BPF prog-id=79 op=UNLOAD Nov 1 04:35:38.409000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.409000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.409000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.409000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.409000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.409000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.409000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.409000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.409000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.409000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:38.409000 audit: BPF prog-id=81 op=LOAD Nov 1 04:35:38.409000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b5338 items=0 ppid=1721 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:38.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633653233646633316565663830393266386532636533393138303735 Nov 1 04:35:38.438446 env[1200]: time="2025-11-01T04:35:38.438386102Z" level=info msg="StartContainer for \"435dbe1fd9551ef2eda91a99920d3f925a7a92b3dd850928b3c92897cbbaefe8\" returns successfully" Nov 1 04:35:38.457505 env[1200]: time="2025-11-01T04:35:38.457442736Z" level=info msg="StartContainer for \"0ca1ab676479a2dceeece8b4b408a65a9e407b4919886ecd65a5c3000f30257a\" returns successfully" Nov 1 04:35:38.482233 env[1200]: time="2025-11-01T04:35:38.482106590Z" level=info msg="StartContainer for \"f3e23df31eef8092f8e2ce39180750bc2edde76ac1d4098f6b42b213b681b0d6\" returns successfully" Nov 1 04:35:38.727378 kubelet[1654]: E1101 04:35:38.727193 1654 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.244.11.230:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.11.230:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" Nov 1 04:35:38.745531 kubelet[1654]: E1101 04:35:38.745491 1654 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cigeh.gb1.brightbox.com\" not found" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:38.749621 kubelet[1654]: E1101 04:35:38.749591 1654 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cigeh.gb1.brightbox.com\" not found" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:38.753349 kubelet[1654]: E1101 04:35:38.752961 1654 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cigeh.gb1.brightbox.com\" not found" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:39.756836 kubelet[1654]: E1101 04:35:39.756778 1654 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cigeh.gb1.brightbox.com\" not found" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:39.762721 kubelet[1654]: E1101 04:35:39.762677 1654 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cigeh.gb1.brightbox.com\" not found" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:39.877607 kubelet[1654]: I1101 04:35:39.877558 1654 kubelet_node_status.go:75] "Attempting to register node" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:41.161908 kubelet[1654]: E1101 04:35:41.161844 1654 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-cigeh.gb1.brightbox.com\" not found" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:41.189546 kernel: kauditd_printk_skb: 561 callbacks suppressed Nov 1 04:35:41.189796 kernel: audit: type=1400 audit(1761971741.180:572): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:41.180000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:41.180000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00051b8f0 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:35:41.201379 kernel: audit: type=1300 audit(1761971741.180:572): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00051b8f0 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:35:41.180000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:35:41.210152 kernel: audit: type=1327 audit(1761971741.180:572): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:35:41.191000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:41.218141 kernel: audit: type=1400 audit(1761971741.191:573): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:41.191000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00051fde0 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:35:41.228146 kernel: audit: type=1300 audit(1761971741.191:573): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00051fde0 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:35:41.191000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:35:41.236230 kernel: audit: type=1327 audit(1761971741.191:573): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:35:42.224000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:42.233147 kernel: audit: type=1400 audit(1761971742.224:574): avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:42.224000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0088fbb60 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:35:42.242147 kernel: audit: type=1300 audit(1761971742.224:574): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0088fbb60 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:35:42.224000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:35:42.224000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:42.259160 kernel: audit: type=1327 audit(1761971742.224:574): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:35:42.259287 kernel: audit: type=1400 audit(1761971742.224:575): avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:42.224000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0044019b0 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:35:42.224000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:35:42.240000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:42.240000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0035d8180 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:35:42.240000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:35:42.266000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525845 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:42.266000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c004401c20 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:35:42.266000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:35:42.331000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:42.331000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c003d75b00 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:35:42.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:35:42.331000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:42.331000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c0038b35f0 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:35:42.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:35:42.452957 kubelet[1654]: E1101 04:35:42.452891 1654 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-cigeh.gb1.brightbox.com\" not found" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:42.509963 kubelet[1654]: I1101 04:35:42.509813 1654 kubelet_node_status.go:78] "Successfully registered node" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:42.509963 kubelet[1654]: E1101 04:35:42.509879 1654 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"srv-cigeh.gb1.brightbox.com\": node \"srv-cigeh.gb1.brightbox.com\" not found" Nov 1 04:35:42.565720 kubelet[1654]: I1101 04:35:42.565639 1654 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:42.588095 kubelet[1654]: E1101 04:35:42.588025 1654 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-cigeh.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:42.588095 kubelet[1654]: I1101 04:35:42.588081 1654 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:42.596887 kubelet[1654]: E1101 04:35:42.596824 1654 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-srv-cigeh.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:42.596887 kubelet[1654]: I1101 04:35:42.596886 1654 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:42.601210 kubelet[1654]: E1101 04:35:42.601170 1654 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-cigeh.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:42.623341 kubelet[1654]: I1101 04:35:42.623278 1654 apiserver.go:52] "Watching apiserver" Nov 1 04:35:42.664363 kubelet[1654]: I1101 04:35:42.664304 1654 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Nov 1 04:35:44.666851 systemd[1]: Reloading. Nov 1 04:35:44.795017 /usr/lib/systemd/system-generators/torcx-generator[1963]: time="2025-11-01T04:35:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Nov 1 04:35:44.795087 /usr/lib/systemd/system-generators/torcx-generator[1963]: time="2025-11-01T04:35:44Z" level=info msg="torcx already run" Nov 1 04:35:44.917661 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Nov 1 04:35:44.918311 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Nov 1 04:35:44.951282 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Nov 1 04:35:45.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.095000 audit: BPF prog-id=82 op=LOAD Nov 1 04:35:45.095000 audit: BPF prog-id=43 op=UNLOAD Nov 1 04:35:45.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.096000 audit: BPF prog-id=83 op=LOAD Nov 1 04:35:45.096000 audit: BPF prog-id=74 op=UNLOAD Nov 1 04:35:45.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.098000 audit: BPF prog-id=84 op=LOAD Nov 1 04:35:45.098000 audit: BPF prog-id=44 op=UNLOAD Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit: BPF prog-id=85 op=LOAD Nov 1 04:35:45.100000 audit: BPF prog-id=45 op=UNLOAD Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit: BPF prog-id=86 op=LOAD Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.100000 audit: BPF prog-id=87 op=LOAD Nov 1 04:35:45.100000 audit: BPF prog-id=46 op=UNLOAD Nov 1 04:35:45.100000 audit: BPF prog-id=47 op=UNLOAD Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit: BPF prog-id=88 op=LOAD Nov 1 04:35:45.102000 audit: BPF prog-id=48 op=UNLOAD Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit: BPF prog-id=89 op=LOAD Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.103000 audit: BPF prog-id=90 op=LOAD Nov 1 04:35:45.103000 audit: BPF prog-id=49 op=UNLOAD Nov 1 04:35:45.103000 audit: BPF prog-id=50 op=UNLOAD Nov 1 04:35:45.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.104000 audit: BPF prog-id=91 op=LOAD Nov 1 04:35:45.104000 audit: BPF prog-id=62 op=UNLOAD Nov 1 04:35:45.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.107000 audit: BPF prog-id=92 op=LOAD Nov 1 04:35:45.107000 audit: BPF prog-id=51 op=UNLOAD Nov 1 04:35:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.108000 audit: BPF prog-id=93 op=LOAD Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit: BPF prog-id=94 op=LOAD Nov 1 04:35:45.109000 audit: BPF prog-id=52 op=UNLOAD Nov 1 04:35:45.109000 audit: BPF prog-id=53 op=UNLOAD Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.109000 audit: BPF prog-id=95 op=LOAD Nov 1 04:35:45.110000 audit: BPF prog-id=54 op=UNLOAD Nov 1 04:35:45.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.113000 audit: BPF prog-id=96 op=LOAD Nov 1 04:35:45.113000 audit: BPF prog-id=58 op=UNLOAD Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit: BPF prog-id=97 op=LOAD Nov 1 04:35:45.114000 audit: BPF prog-id=55 op=UNLOAD Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit: BPF prog-id=98 op=LOAD Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.114000 audit: BPF prog-id=99 op=LOAD Nov 1 04:35:45.114000 audit: BPF prog-id=56 op=UNLOAD Nov 1 04:35:45.114000 audit: BPF prog-id=57 op=UNLOAD Nov 1 04:35:45.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.116000 audit: BPF prog-id=100 op=LOAD Nov 1 04:35:45.116000 audit: BPF prog-id=66 op=UNLOAD Nov 1 04:35:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.120000 audit: BPF prog-id=101 op=LOAD Nov 1 04:35:45.120000 audit: BPF prog-id=70 op=UNLOAD Nov 1 04:35:45.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:45.121000 audit: BPF prog-id=102 op=LOAD Nov 1 04:35:45.121000 audit: BPF prog-id=78 op=UNLOAD Nov 1 04:35:45.156958 systemd[1]: Stopping kubelet.service... Nov 1 04:35:45.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:45.177862 systemd[1]: kubelet.service: Deactivated successfully. Nov 1 04:35:45.178882 systemd[1]: Stopped kubelet.service. Nov 1 04:35:45.179353 systemd[1]: kubelet.service: Consumed 1.548s CPU time. Nov 1 04:35:45.184105 systemd[1]: Starting kubelet.service... Nov 1 04:35:46.194648 kernel: kauditd_printk_skb: 259 callbacks suppressed Nov 1 04:35:46.195279 kernel: audit: type=1400 audit(1761971746.186:825): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:46.186000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:46.186000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000382a80 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:35:46.207151 kernel: audit: type=1300 audit(1761971746.186:825): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000382a80 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:35:46.186000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:35:46.216152 kernel: audit: type=1327 audit(1761971746.186:825): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:35:46.216339 kernel: audit: type=1400 audit(1761971746.190:826): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:46.190000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:46.224575 kernel: audit: type=1300 audit(1761971746.190:826): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000382d80 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:35:46.190000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000382d80 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:35:46.190000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:35:46.190000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:46.248223 kernel: audit: type=1327 audit(1761971746.190:826): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:35:46.248459 kernel: audit: type=1400 audit(1761971746.190:827): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:46.190000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003830a0 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:35:46.257170 kernel: audit: type=1300 audit(1761971746.190:827): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003830a0 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:35:46.257305 kernel: audit: type=1327 audit(1761971746.190:827): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:35:46.190000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:35:46.196000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:46.270503 kernel: audit: type=1400 audit(1761971746.196:828): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:35:46.196000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000383380 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:35:46.196000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:35:46.713279 systemd[1]: Started kubelet.service. Nov 1 04:35:46.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:35:46.870860 kubelet[2011]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 04:35:46.871960 kubelet[2011]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Nov 1 04:35:46.872106 kubelet[2011]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Nov 1 04:35:46.872385 kubelet[2011]: I1101 04:35:46.872332 2011 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Nov 1 04:35:46.895428 kubelet[2011]: I1101 04:35:46.895375 2011 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" Nov 1 04:35:46.895740 kubelet[2011]: I1101 04:35:46.895715 2011 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Nov 1 04:35:46.896398 kubelet[2011]: I1101 04:35:46.896372 2011 server.go:956] "Client rotation is on, will bootstrap in background" Nov 1 04:35:46.899028 kubelet[2011]: I1101 04:35:46.898974 2011 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" Nov 1 04:35:46.944975 kubelet[2011]: I1101 04:35:46.944925 2011 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Nov 1 04:35:46.954269 kubelet[2011]: E1101 04:35:46.954199 2011 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Nov 1 04:35:46.954576 kubelet[2011]: I1101 04:35:46.954548 2011 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Nov 1 04:35:46.964148 kubelet[2011]: I1101 04:35:46.963964 2011 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Nov 1 04:35:46.964979 kubelet[2011]: I1101 04:35:46.964927 2011 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Nov 1 04:35:46.965879 kubelet[2011]: I1101 04:35:46.965189 2011 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-cigeh.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Nov 1 04:35:46.966370 kubelet[2011]: I1101 04:35:46.966342 2011 topology_manager.go:138] "Creating topology manager with none policy" Nov 1 04:35:46.966529 kubelet[2011]: I1101 04:35:46.966505 2011 container_manager_linux.go:303] "Creating device plugin manager" Nov 1 04:35:46.966770 kubelet[2011]: I1101 04:35:46.966746 2011 state_mem.go:36] "Initialized new in-memory state store" Nov 1 04:35:46.970788 kubelet[2011]: I1101 04:35:46.970748 2011 kubelet.go:480] "Attempting to sync node with API server" Nov 1 04:35:46.970966 kubelet[2011]: I1101 04:35:46.970938 2011 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" Nov 1 04:35:46.971215 kubelet[2011]: I1101 04:35:46.971181 2011 kubelet.go:386] "Adding apiserver pod source" Nov 1 04:35:46.972381 kubelet[2011]: I1101 04:35:46.972354 2011 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Nov 1 04:35:46.991875 kubelet[2011]: I1101 04:35:46.991825 2011 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Nov 1 04:35:46.993088 kubelet[2011]: I1101 04:35:46.993061 2011 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" Nov 1 04:35:47.000622 kubelet[2011]: I1101 04:35:47.000591 2011 watchdog_linux.go:99] "Systemd watchdog is not enabled" Nov 1 04:35:47.002000 audit[2011]: AVC avc: denied { mac_admin } for pid=2011 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:47.002000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 04:35:47.002000 audit[2011]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00031a1e0 a1=c000c870e0 a2=c00031a180 a3=25 items=0 ppid=1 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:47.002000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 04:35:47.004702 kubelet[2011]: I1101 04:35:47.004665 2011 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Nov 1 04:35:47.003000 audit[2011]: AVC avc: denied { mac_admin } for pid=2011 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:47.003000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 04:35:47.003000 audit[2011]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b7fec0 a1=c000c870f8 a2=c00031a300 a3=25 items=0 ppid=1 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:47.003000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 04:35:47.005505 kubelet[2011]: I1101 04:35:47.005475 2011 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Nov 1 04:35:47.006252 kubelet[2011]: I1101 04:35:47.006206 2011 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Nov 1 04:35:47.007034 kubelet[2011]: I1101 04:35:47.006895 2011 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Nov 1 04:35:47.014555 kubelet[2011]: I1101 04:35:47.014514 2011 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Nov 1 04:35:47.017016 kubelet[2011]: I1101 04:35:47.016956 2011 volume_manager.go:297] "Starting Kubelet Volume Manager" Nov 1 04:35:47.018905 kubelet[2011]: I1101 04:35:47.018864 2011 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Nov 1 04:35:47.021829 kubelet[2011]: I1101 04:35:47.019323 2011 reconciler.go:26] "Reconciler: start to sync state" Nov 1 04:35:47.022110 kubelet[2011]: I1101 04:35:47.000860 2011 server.go:1289] "Started kubelet" Nov 1 04:35:47.027807 kubelet[2011]: I1101 04:35:47.027769 2011 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Nov 1 04:35:47.031487 kubelet[2011]: I1101 04:35:47.021720 2011 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 Nov 1 04:35:47.033963 kubelet[2011]: I1101 04:35:47.033917 2011 server.go:317] "Adding debug handlers to kubelet server" Nov 1 04:35:47.038672 kubelet[2011]: I1101 04:35:47.038636 2011 factory.go:223] Registration of the containerd container factory successfully Nov 1 04:35:47.038899 kubelet[2011]: I1101 04:35:47.038876 2011 factory.go:223] Registration of the systemd container factory successfully Nov 1 04:35:47.039172 kubelet[2011]: I1101 04:35:47.039138 2011 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Nov 1 04:35:47.086874 kubelet[2011]: I1101 04:35:47.086801 2011 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" Nov 1 04:35:47.091022 kubelet[2011]: I1101 04:35:47.090499 2011 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" Nov 1 04:35:47.091022 kubelet[2011]: I1101 04:35:47.090549 2011 status_manager.go:230] "Starting to sync pod status with apiserver" Nov 1 04:35:47.091022 kubelet[2011]: I1101 04:35:47.090588 2011 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Nov 1 04:35:47.091022 kubelet[2011]: I1101 04:35:47.090601 2011 kubelet.go:2436] "Starting kubelet main sync loop" Nov 1 04:35:47.091022 kubelet[2011]: E1101 04:35:47.090703 2011 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Nov 1 04:35:47.142477 kubelet[2011]: I1101 04:35:47.142431 2011 cpu_manager.go:221] "Starting CPU manager" policy="none" Nov 1 04:35:47.142477 kubelet[2011]: I1101 04:35:47.142461 2011 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Nov 1 04:35:47.142812 kubelet[2011]: I1101 04:35:47.142495 2011 state_mem.go:36] "Initialized new in-memory state store" Nov 1 04:35:47.142812 kubelet[2011]: I1101 04:35:47.142750 2011 state_mem.go:88] "Updated default CPUSet" cpuSet="" Nov 1 04:35:47.142812 kubelet[2011]: I1101 04:35:47.142779 2011 state_mem.go:96] "Updated CPUSet assignments" assignments={} Nov 1 04:35:47.143022 kubelet[2011]: I1101 04:35:47.142819 2011 policy_none.go:49] "None policy: Start" Nov 1 04:35:47.143022 kubelet[2011]: I1101 04:35:47.142850 2011 memory_manager.go:186] "Starting memorymanager" policy="None" Nov 1 04:35:47.143022 kubelet[2011]: I1101 04:35:47.142882 2011 state_mem.go:35] "Initializing new in-memory state store" Nov 1 04:35:47.143236 kubelet[2011]: I1101 04:35:47.143066 2011 state_mem.go:75] "Updated machine memory state" Nov 1 04:35:47.160659 kubelet[2011]: E1101 04:35:47.160605 2011 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" Nov 1 04:35:47.159000 audit[2011]: AVC avc: denied { mac_admin } for pid=2011 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:47.159000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Nov 1 04:35:47.159000 audit[2011]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb7e60 a1=c000d3a4b0 a2=c000bb7e30 a3=25 items=0 ppid=1 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:47.159000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Nov 1 04:35:47.161430 kubelet[2011]: E1101 04:35:47.160707 2011 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" Nov 1 04:35:47.161430 kubelet[2011]: I1101 04:35:47.160960 2011 eviction_manager.go:189] "Eviction manager: starting control loop" Nov 1 04:35:47.161430 kubelet[2011]: I1101 04:35:47.160988 2011 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Nov 1 04:35:47.162711 kubelet[2011]: I1101 04:35:47.162172 2011 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Nov 1 04:35:47.170379 kubelet[2011]: E1101 04:35:47.170339 2011 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Nov 1 04:35:47.205038 kubelet[2011]: I1101 04:35:47.204967 2011 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.205820 kubelet[2011]: I1101 04:35:47.205780 2011 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.207734 kubelet[2011]: I1101 04:35:47.207702 2011 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.219285 kubelet[2011]: I1101 04:35:47.219138 2011 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Nov 1 04:35:47.222457 kubelet[2011]: I1101 04:35:47.222429 2011 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Nov 1 04:35:47.223875 kubelet[2011]: I1101 04:35:47.223827 2011 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Nov 1 04:35:47.295619 kubelet[2011]: I1101 04:35:47.295569 2011 kubelet_node_status.go:75] "Attempting to register node" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.306242 kubelet[2011]: I1101 04:35:47.306202 2011 kubelet_node_status.go:124] "Node was previously registered" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.306529 kubelet[2011]: I1101 04:35:47.306505 2011 kubelet_node_status.go:78] "Successfully registered node" node="srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.324061 kubelet[2011]: I1101 04:35:47.324020 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e0e1157ac0ce4e930d56637ae03a1cff-ca-certs\") pod \"kube-apiserver-srv-cigeh.gb1.brightbox.com\" (UID: \"e0e1157ac0ce4e930d56637ae03a1cff\") " pod="kube-system/kube-apiserver-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.324348 kubelet[2011]: I1101 04:35:47.324319 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e0e1157ac0ce4e930d56637ae03a1cff-k8s-certs\") pod \"kube-apiserver-srv-cigeh.gb1.brightbox.com\" (UID: \"e0e1157ac0ce4e930d56637ae03a1cff\") " pod="kube-system/kube-apiserver-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.324568 kubelet[2011]: I1101 04:35:47.324494 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dd1721bfba7da7dbf461b302f5d91e85-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-cigeh.gb1.brightbox.com\" (UID: \"dd1721bfba7da7dbf461b302f5d91e85\") " pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.324768 kubelet[2011]: I1101 04:35:47.324721 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8e518644780a0bf0c09775da15528b7e-kubeconfig\") pod \"kube-scheduler-srv-cigeh.gb1.brightbox.com\" (UID: \"8e518644780a0bf0c09775da15528b7e\") " pod="kube-system/kube-scheduler-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.324985 kubelet[2011]: I1101 04:35:47.324957 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e0e1157ac0ce4e930d56637ae03a1cff-usr-share-ca-certificates\") pod \"kube-apiserver-srv-cigeh.gb1.brightbox.com\" (UID: \"e0e1157ac0ce4e930d56637ae03a1cff\") " pod="kube-system/kube-apiserver-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.325236 kubelet[2011]: I1101 04:35:47.325171 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dd1721bfba7da7dbf461b302f5d91e85-ca-certs\") pod \"kube-controller-manager-srv-cigeh.gb1.brightbox.com\" (UID: \"dd1721bfba7da7dbf461b302f5d91e85\") " pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.325442 kubelet[2011]: I1101 04:35:47.325406 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/dd1721bfba7da7dbf461b302f5d91e85-flexvolume-dir\") pod \"kube-controller-manager-srv-cigeh.gb1.brightbox.com\" (UID: \"dd1721bfba7da7dbf461b302f5d91e85\") " pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.325671 kubelet[2011]: I1101 04:35:47.325609 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dd1721bfba7da7dbf461b302f5d91e85-k8s-certs\") pod \"kube-controller-manager-srv-cigeh.gb1.brightbox.com\" (UID: \"dd1721bfba7da7dbf461b302f5d91e85\") " pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.325915 kubelet[2011]: I1101 04:35:47.325888 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/dd1721bfba7da7dbf461b302f5d91e85-kubeconfig\") pod \"kube-controller-manager-srv-cigeh.gb1.brightbox.com\" (UID: \"dd1721bfba7da7dbf461b302f5d91e85\") " pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:47.974813 kubelet[2011]: I1101 04:35:47.974724 2011 apiserver.go:52] "Watching apiserver" Nov 1 04:35:48.022901 kubelet[2011]: I1101 04:35:48.022814 2011 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Nov 1 04:35:48.138059 kubelet[2011]: I1101 04:35:48.138005 2011 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:48.140140 kubelet[2011]: I1101 04:35:48.139812 2011 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:48.158491 kubelet[2011]: I1101 04:35:48.158237 2011 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Nov 1 04:35:48.158491 kubelet[2011]: E1101 04:35:48.158311 2011 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-cigeh.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:48.158872 kubelet[2011]: I1101 04:35:48.158763 2011 warnings.go:110] "Warning: metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots]" Nov 1 04:35:48.158872 kubelet[2011]: E1101 04:35:48.158805 2011 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-cigeh.gb1.brightbox.com\" already exists" pod="kube-system/kube-scheduler-srv-cigeh.gb1.brightbox.com" Nov 1 04:35:48.212756 kubelet[2011]: I1101 04:35:48.212614 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-cigeh.gb1.brightbox.com" podStartSLOduration=1.2125828 podStartE2EDuration="1.2125828s" podCreationTimestamp="2025-11-01 04:35:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-11-01 04:35:48.190725991 +0000 UTC m=+1.459315416" watchObservedRunningTime="2025-11-01 04:35:48.2125828 +0000 UTC m=+1.481172211" Nov 1 04:35:48.213273 kubelet[2011]: I1101 04:35:48.213218 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-cigeh.gb1.brightbox.com" podStartSLOduration=1.213208902 podStartE2EDuration="1.213208902s" podCreationTimestamp="2025-11-01 04:35:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-11-01 04:35:48.211147587 +0000 UTC m=+1.479736998" watchObservedRunningTime="2025-11-01 04:35:48.213208902 +0000 UTC m=+1.481798308" Nov 1 04:35:48.234498 kubelet[2011]: I1101 04:35:48.234313 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-cigeh.gb1.brightbox.com" podStartSLOduration=1.23427516 podStartE2EDuration="1.23427516s" podCreationTimestamp="2025-11-01 04:35:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-11-01 04:35:48.23372483 +0000 UTC m=+1.502314245" watchObservedRunningTime="2025-11-01 04:35:48.23427516 +0000 UTC m=+1.502864563" Nov 1 04:35:50.248000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=525870 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Nov 1 04:35:50.248000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004e5080 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:35:50.248000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:35:50.878005 kubelet[2011]: I1101 04:35:50.877913 2011 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Nov 1 04:35:50.882060 env[1200]: time="2025-11-01T04:35:50.880175579Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Nov 1 04:35:50.882812 kubelet[2011]: I1101 04:35:50.880578 2011 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Nov 1 04:35:51.500300 systemd[1]: Created slice kubepods-besteffort-pod686ecf90_e811_4147_8252_396b54370e89.slice. Nov 1 04:35:51.556460 kubelet[2011]: I1101 04:35:51.556401 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/686ecf90-e811-4147-8252-396b54370e89-xtables-lock\") pod \"kube-proxy-fp55g\" (UID: \"686ecf90-e811-4147-8252-396b54370e89\") " pod="kube-system/kube-proxy-fp55g" Nov 1 04:35:51.556787 kubelet[2011]: I1101 04:35:51.556755 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/686ecf90-e811-4147-8252-396b54370e89-lib-modules\") pod \"kube-proxy-fp55g\" (UID: \"686ecf90-e811-4147-8252-396b54370e89\") " pod="kube-system/kube-proxy-fp55g" Nov 1 04:35:51.557005 kubelet[2011]: I1101 04:35:51.556912 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/686ecf90-e811-4147-8252-396b54370e89-kube-proxy\") pod \"kube-proxy-fp55g\" (UID: \"686ecf90-e811-4147-8252-396b54370e89\") " pod="kube-system/kube-proxy-fp55g" Nov 1 04:35:51.557225 kubelet[2011]: I1101 04:35:51.557190 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qtcbp\" (UniqueName: \"kubernetes.io/projected/686ecf90-e811-4147-8252-396b54370e89-kube-api-access-qtcbp\") pod \"kube-proxy-fp55g\" (UID: \"686ecf90-e811-4147-8252-396b54370e89\") " pod="kube-system/kube-proxy-fp55g" Nov 1 04:35:51.667082 kubelet[2011]: I1101 04:35:51.667007 2011 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Nov 1 04:35:51.810542 env[1200]: time="2025-11-01T04:35:51.810461018Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fp55g,Uid:686ecf90-e811-4147-8252-396b54370e89,Namespace:kube-system,Attempt:0,}" Nov 1 04:35:51.849184 env[1200]: time="2025-11-01T04:35:51.848867664Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:35:51.849184 env[1200]: time="2025-11-01T04:35:51.849018158Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:35:51.849184 env[1200]: time="2025-11-01T04:35:51.849047591Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:35:51.849644 env[1200]: time="2025-11-01T04:35:51.849286528Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/de830f5c669103f6c74b31c5c83f58bcff84e6bd66b8f0bd9d81751efb59a30f pid=2067 runtime=io.containerd.runc.v2 Nov 1 04:35:51.913303 systemd[1]: Started cri-containerd-de830f5c669103f6c74b31c5c83f58bcff84e6bd66b8f0bd9d81751efb59a30f.scope. Nov 1 04:35:51.996165 kernel: kauditd_printk_skb: 18 callbacks suppressed Nov 1 04:35:51.996391 kernel: audit: type=1400 audit(1761971751.988:834): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.003203 kernel: audit: type=1400 audit(1761971751.988:835): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.010255 kernel: audit: type=1400 audit(1761971751.991:836): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.021894 kernel: audit: type=1400 audit(1761971751.991:837): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.022045 kernel: audit: type=1400 audit(1761971751.991:838): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.032794 kernel: audit: type=1400 audit(1761971751.991:839): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.032932 kernel: audit: type=1400 audit(1761971751.991:840): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.041208 kernel: audit: type=1400 audit(1761971751.991:841): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.048287 kernel: audit: type=1400 audit(1761971751.991:842): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.058155 kernel: audit: type=1400 audit(1761971751.995:843): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.995000 audit: BPF prog-id=103 op=LOAD Nov 1 04:35:51.996000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.996000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2067 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:51.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383330663563363639313033663663373462333163356338336635 Nov 1 04:35:51.996000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.996000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2067 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:51.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383330663563363639313033663663373462333163356338336635 Nov 1 04:35:51.996000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.996000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.996000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.996000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.996000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.996000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.996000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.996000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.996000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.996000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:51.996000 audit: BPF prog-id=104 op=LOAD Nov 1 04:35:51.996000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030cbe0 items=0 ppid=2067 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:51.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383330663563363639313033663663373462333163356338336635 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit: BPF prog-id=105 op=LOAD Nov 1 04:35:52.001000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030cc28 items=0 ppid=2067 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383330663563363639313033663663373462333163356338336635 Nov 1 04:35:52.001000 audit: BPF prog-id=105 op=UNLOAD Nov 1 04:35:52.001000 audit: BPF prog-id=104 op=UNLOAD Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { perfmon } for pid=2077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit[2077]: AVC avc: denied { bpf } for pid=2077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.001000 audit: BPF prog-id=106 op=LOAD Nov 1 04:35:52.001000 audit[2077]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030d038 items=0 ppid=2067 pid=2077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383330663563363639313033663663373462333163356338336635 Nov 1 04:35:52.065626 env[1200]: time="2025-11-01T04:35:52.063992199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-fp55g,Uid:686ecf90-e811-4147-8252-396b54370e89,Namespace:kube-system,Attempt:0,} returns sandbox id \"de830f5c669103f6c74b31c5c83f58bcff84e6bd66b8f0bd9d81751efb59a30f\"" Nov 1 04:35:52.078110 env[1200]: time="2025-11-01T04:35:52.077840984Z" level=info msg="CreateContainer within sandbox \"de830f5c669103f6c74b31c5c83f58bcff84e6bd66b8f0bd9d81751efb59a30f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Nov 1 04:35:52.130928 env[1200]: time="2025-11-01T04:35:52.130828498Z" level=info msg="CreateContainer within sandbox \"de830f5c669103f6c74b31c5c83f58bcff84e6bd66b8f0bd9d81751efb59a30f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5ac47832893d7a2d594420e6c729ca883b306feab3c55561ac6bb1df8f7e43b1\"" Nov 1 04:35:52.134521 env[1200]: time="2025-11-01T04:35:52.134388056Z" level=info msg="StartContainer for \"5ac47832893d7a2d594420e6c729ca883b306feab3c55561ac6bb1df8f7e43b1\"" Nov 1 04:35:52.145538 systemd[1]: Created slice kubepods-besteffort-podd61e2c2a_4f3b_44e8_9674_75690f4cd6c9.slice. Nov 1 04:35:52.166687 kubelet[2011]: I1101 04:35:52.166469 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fhl7t\" (UniqueName: \"kubernetes.io/projected/d61e2c2a-4f3b-44e8-9674-75690f4cd6c9-kube-api-access-fhl7t\") pod \"tigera-operator-7dcd859c48-4sdfm\" (UID: \"d61e2c2a-4f3b-44e8-9674-75690f4cd6c9\") " pod="tigera-operator/tigera-operator-7dcd859c48-4sdfm" Nov 1 04:35:52.166687 kubelet[2011]: I1101 04:35:52.166534 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d61e2c2a-4f3b-44e8-9674-75690f4cd6c9-var-lib-calico\") pod \"tigera-operator-7dcd859c48-4sdfm\" (UID: \"d61e2c2a-4f3b-44e8-9674-75690f4cd6c9\") " pod="tigera-operator/tigera-operator-7dcd859c48-4sdfm" Nov 1 04:35:52.203386 systemd[1]: Started cri-containerd-5ac47832893d7a2d594420e6c729ca883b306feab3c55561ac6bb1df8f7e43b1.scope. Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f8e361f79b8 items=0 ppid=2067 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633437383332383933643761326435393434323065366337323963 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit: BPF prog-id=107 op=LOAD Nov 1 04:35:52.263000 audit[2108]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001bca38 items=0 ppid=2067 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633437383332383933643761326435393434323065366337323963 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.263000 audit: BPF prog-id=108 op=LOAD Nov 1 04:35:52.263000 audit[2108]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001bca88 items=0 ppid=2067 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633437383332383933643761326435393434323065366337323963 Nov 1 04:35:52.264000 audit: BPF prog-id=108 op=UNLOAD Nov 1 04:35:52.264000 audit: BPF prog-id=107 op=UNLOAD Nov 1 04:35:52.264000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.264000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.264000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.264000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.264000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.264000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.264000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.264000 audit[2108]: AVC avc: denied { perfmon } for pid=2108 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.264000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.264000 audit[2108]: AVC avc: denied { bpf } for pid=2108 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.264000 audit: BPF prog-id=109 op=LOAD Nov 1 04:35:52.264000 audit[2108]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001bcb18 items=0 ppid=2067 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633437383332383933643761326435393434323065366337323963 Nov 1 04:35:52.294242 env[1200]: time="2025-11-01T04:35:52.294187230Z" level=info msg="StartContainer for \"5ac47832893d7a2d594420e6c729ca883b306feab3c55561ac6bb1df8f7e43b1\" returns successfully" Nov 1 04:35:52.453876 env[1200]: time="2025-11-01T04:35:52.453718922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-4sdfm,Uid:d61e2c2a-4f3b-44e8-9674-75690f4cd6c9,Namespace:tigera-operator,Attempt:0,}" Nov 1 04:35:52.485976 env[1200]: time="2025-11-01T04:35:52.485555950Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:35:52.485976 env[1200]: time="2025-11-01T04:35:52.485643650Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:35:52.485976 env[1200]: time="2025-11-01T04:35:52.485669380Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:35:52.486395 env[1200]: time="2025-11-01T04:35:52.486045664Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/086c08da55dd22855dfa152457e378d6eabd92428abbb3dfa20e750eaa7ba691 pid=2142 runtime=io.containerd.runc.v2 Nov 1 04:35:52.515788 systemd[1]: Started cri-containerd-086c08da55dd22855dfa152457e378d6eabd92428abbb3dfa20e750eaa7ba691.scope. Nov 1 04:35:52.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.539000 audit: BPF prog-id=110 op=LOAD Nov 1 04:35:52.539000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.539000 audit[2153]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2142 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038366330386461353564643232383535646661313532343537653337 Nov 1 04:35:52.539000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.539000 audit[2153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2142 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.539000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038366330386461353564643232383535646661313532343537653337 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit: BPF prog-id=111 op=LOAD Nov 1 04:35:52.540000 audit[2153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003e41f0 items=0 ppid=2142 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038366330386461353564643232383535646661313532343537653337 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit: BPF prog-id=112 op=LOAD Nov 1 04:35:52.540000 audit[2153]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003e4238 items=0 ppid=2142 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038366330386461353564643232383535646661313532343537653337 Nov 1 04:35:52.540000 audit: BPF prog-id=112 op=UNLOAD Nov 1 04:35:52.540000 audit: BPF prog-id=111 op=UNLOAD Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { perfmon } for pid=2153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit[2153]: AVC avc: denied { bpf } for pid=2153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:52.540000 audit: BPF prog-id=113 op=LOAD Nov 1 04:35:52.540000 audit[2153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003e4648 items=0 ppid=2142 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038366330386461353564643232383535646661313532343537653337 Nov 1 04:35:52.597254 env[1200]: time="2025-11-01T04:35:52.597052431Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-4sdfm,Uid:d61e2c2a-4f3b-44e8-9674-75690f4cd6c9,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"086c08da55dd22855dfa152457e378d6eabd92428abbb3dfa20e750eaa7ba691\"" Nov 1 04:35:52.602014 env[1200]: time="2025-11-01T04:35:52.601807798Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\"" Nov 1 04:35:52.691866 systemd[1]: run-containerd-runc-k8s.io-de830f5c669103f6c74b31c5c83f58bcff84e6bd66b8f0bd9d81751efb59a30f-runc.pAmuAI.mount: Deactivated successfully. Nov 1 04:35:52.886000 audit[2211]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:52.886000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb02993a0 a2=0 a3=7ffeb029938c items=0 ppid=2119 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 04:35:52.887000 audit[2212]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:52.887000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe04287800 a2=0 a3=7ffe042877ec items=0 ppid=2119 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Nov 1 04:35:52.890000 audit[2214]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:52.890000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde879ab50 a2=0 a3=7ffde879ab3c items=0 ppid=2119 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.890000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 04:35:52.895000 audit[2217]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:52.895000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5aca4f70 a2=0 a3=7ffc5aca4f5c items=0 ppid=2119 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.897000 audit[2216]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:52.897000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef2acbfd0 a2=0 a3=7ffef2acbfbc items=0 ppid=2119 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Nov 1 04:35:52.899000 audit[2218]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:52.899000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc205cde0 a2=0 a3=7ffcc205cdcc items=0 ppid=2119 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 04:35:52.895000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Nov 1 04:35:52.998000 audit[2219]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:52.998000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffceb605cb0 a2=0 a3=7ffceb605c9c items=0 ppid=2119 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:52.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 04:35:53.004000 audit[2221]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.004000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe7de4d290 a2=0 a3=7ffe7de4d27c items=0 ppid=2119 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Nov 1 04:35:53.010000 audit[2224]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.010000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdce3072e0 a2=0 a3=7ffdce3072cc items=0 ppid=2119 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.010000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Nov 1 04:35:53.012000 audit[2225]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.012000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff842725f0 a2=0 a3=7fff842725dc items=0 ppid=2119 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 04:35:53.016000 audit[2227]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.016000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff3cff0480 a2=0 a3=7fff3cff046c items=0 ppid=2119 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 04:35:53.018000 audit[2228]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.018000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd88402510 a2=0 a3=7ffd884024fc items=0 ppid=2119 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 04:35:53.026000 audit[2230]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.026000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff6ca26840 a2=0 a3=7fff6ca2682c items=0 ppid=2119 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 04:35:53.032000 audit[2233]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.032000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffdf2ae160 a2=0 a3=7fffdf2ae14c items=0 ppid=2119 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Nov 1 04:35:53.033000 audit[2234]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.033000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb6da1160 a2=0 a3=7ffeb6da114c items=0 ppid=2119 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 04:35:53.038000 audit[2236]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.038000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd438d22b0 a2=0 a3=7ffd438d229c items=0 ppid=2119 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 04:35:53.039000 audit[2237]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.039000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed49da5e0 a2=0 a3=7ffed49da5cc items=0 ppid=2119 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 04:35:53.044000 audit[2239]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.044000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcab9c0fd0 a2=0 a3=7ffcab9c0fbc items=0 ppid=2119 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 04:35:53.051000 audit[2242]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.051000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe68ed2f50 a2=0 a3=7ffe68ed2f3c items=0 ppid=2119 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 04:35:53.057000 audit[2245]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.057000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc42bf5f10 a2=0 a3=7ffc42bf5efc items=0 ppid=2119 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.057000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 04:35:53.059000 audit[2246]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.059000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd5cc6490 a2=0 a3=7ffdd5cc647c items=0 ppid=2119 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 04:35:53.064000 audit[2248]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.064000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc78aab6f0 a2=0 a3=7ffc78aab6dc items=0 ppid=2119 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 04:35:53.070000 audit[2251]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.070000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd072367b0 a2=0 a3=7ffd0723679c items=0 ppid=2119 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 04:35:53.072000 audit[2252]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.072000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffceb0f8c30 a2=0 a3=7ffceb0f8c1c items=0 ppid=2119 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 04:35:53.077000 audit[2254]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Nov 1 04:35:53.077000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffcdd177fb0 a2=0 a3=7ffcdd177f9c items=0 ppid=2119 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 04:35:53.116000 audit[2260]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:35:53.116000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc64427140 a2=0 a3=7ffc6442712c items=0 ppid=2119 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.116000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:35:53.129000 audit[2260]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:35:53.129000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc64427140 a2=0 a3=7ffc6442712c items=0 ppid=2119 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:35:53.132000 audit[2265]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.132000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd02d57160 a2=0 a3=7ffd02d5714c items=0 ppid=2119 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Nov 1 04:35:53.137000 audit[2267]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.137000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffed6bab2f0 a2=0 a3=7ffed6bab2dc items=0 ppid=2119 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.137000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Nov 1 04:35:53.145000 audit[2270]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.145000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff193730f0 a2=0 a3=7fff193730dc items=0 ppid=2119 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Nov 1 04:35:53.148000 audit[2271]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.148000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe585fabf0 a2=0 a3=7ffe585fabdc items=0 ppid=2119 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Nov 1 04:35:53.151000 audit[2273]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.151000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7687a8e0 a2=0 a3=7ffd7687a8cc items=0 ppid=2119 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.151000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Nov 1 04:35:53.153000 audit[2274]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.153000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea9a2d340 a2=0 a3=7ffea9a2d32c items=0 ppid=2119 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Nov 1 04:35:53.157000 audit[2276]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.157000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe784133f0 a2=0 a3=7ffe784133dc items=0 ppid=2119 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Nov 1 04:35:53.163000 audit[2279]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.163000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffca92cf8c0 a2=0 a3=7ffca92cf8ac items=0 ppid=2119 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Nov 1 04:35:53.166000 audit[2280]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.166000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff92ef4990 a2=0 a3=7fff92ef497c items=0 ppid=2119 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Nov 1 04:35:53.170000 audit[2282]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.170000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe35780ce0 a2=0 a3=7ffe35780ccc items=0 ppid=2119 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Nov 1 04:35:53.172000 audit[2283]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.172000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe856fb0c0 a2=0 a3=7ffe856fb0ac items=0 ppid=2119 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Nov 1 04:35:53.177000 audit[2285]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.177000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7de117a0 a2=0 a3=7ffe7de1178c items=0 ppid=2119 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.177000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Nov 1 04:35:53.183000 audit[2288]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.183000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb350f6c0 a2=0 a3=7ffcb350f6ac items=0 ppid=2119 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Nov 1 04:35:53.194000 audit[2291]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.194000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea2b02cb0 a2=0 a3=7ffea2b02c9c items=0 ppid=2119 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Nov 1 04:35:53.196000 audit[2292]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.196000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef061da30 a2=0 a3=7ffef061da1c items=0 ppid=2119 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Nov 1 04:35:53.200000 audit[2294]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.200000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc5e5b3a70 a2=0 a3=7ffc5e5b3a5c items=0 ppid=2119 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 04:35:53.212000 audit[2297]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.212000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd4b9626a0 a2=0 a3=7ffd4b96268c items=0 ppid=2119 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Nov 1 04:35:53.217000 audit[2298]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.217000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff78e8d360 a2=0 a3=7fff78e8d34c items=0 ppid=2119 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Nov 1 04:35:53.220000 audit[2300]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.220000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffa2fd3860 a2=0 a3=7fffa2fd384c items=0 ppid=2119 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Nov 1 04:35:53.222000 audit[2301]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.222000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9f1690d0 a2=0 a3=7ffe9f1690bc items=0 ppid=2119 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Nov 1 04:35:53.233000 audit[2303]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.233000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe506cd0c0 a2=0 a3=7ffe506cd0ac items=0 ppid=2119 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 04:35:53.241000 audit[2306]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Nov 1 04:35:53.241000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffee07a33e0 a2=0 a3=7ffee07a33cc items=0 ppid=2119 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Nov 1 04:35:53.250000 audit[2308]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 04:35:53.250000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe0363b1b0 a2=0 a3=7ffe0363b19c items=0 ppid=2119 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.250000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:35:53.250000 audit[2308]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Nov 1 04:35:53.250000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe0363b1b0 a2=0 a3=7ffe0363b19c items=0 ppid=2119 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:53.250000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:35:54.208351 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1281058063.mount: Deactivated successfully. Nov 1 04:35:55.623392 kubelet[2011]: I1101 04:35:55.623223 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-fp55g" podStartSLOduration=4.623108992 podStartE2EDuration="4.623108992s" podCreationTimestamp="2025-11-01 04:35:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-11-01 04:35:53.206072263 +0000 UTC m=+6.474661671" watchObservedRunningTime="2025-11-01 04:35:55.623108992 +0000 UTC m=+8.891698403" Nov 1 04:35:56.119488 env[1200]: time="2025-11-01T04:35:56.118265726Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:56.122109 env[1200]: time="2025-11-01T04:35:56.122066340Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:56.124470 env[1200]: time="2025-11-01T04:35:56.124432231Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:56.126572 env[1200]: time="2025-11-01T04:35:56.126530178Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:1b629a1403f5b6d7243f7dd523d04b8a50352a33c1d4d6970b6002a8733acf2e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:35:56.127800 env[1200]: time="2025-11-01T04:35:56.127759933Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\" returns image reference \"sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1\"" Nov 1 04:35:56.134693 env[1200]: time="2025-11-01T04:35:56.134614081Z" level=info msg="CreateContainer within sandbox \"086c08da55dd22855dfa152457e378d6eabd92428abbb3dfa20e750eaa7ba691\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Nov 1 04:35:56.154207 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount975330531.mount: Deactivated successfully. Nov 1 04:35:56.162165 env[1200]: time="2025-11-01T04:35:56.161230762Z" level=info msg="CreateContainer within sandbox \"086c08da55dd22855dfa152457e378d6eabd92428abbb3dfa20e750eaa7ba691\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"dd67cf68a7d8856bd78686d6fba7d7e4b6ed90260aab0c9d87e554f09100a50a\"" Nov 1 04:35:56.163747 env[1200]: time="2025-11-01T04:35:56.163693785Z" level=info msg="StartContainer for \"dd67cf68a7d8856bd78686d6fba7d7e4b6ed90260aab0c9d87e554f09100a50a\"" Nov 1 04:35:56.205957 systemd[1]: Started cri-containerd-dd67cf68a7d8856bd78686d6fba7d7e4b6ed90260aab0c9d87e554f09100a50a.scope. Nov 1 04:35:56.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.251000 audit: BPF prog-id=114 op=LOAD Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2142 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:56.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363763663638613764383835366264373836383664366662613764 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2142 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:56.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363763663638613764383835366264373836383664366662613764 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit: BPF prog-id=115 op=LOAD Nov 1 04:35:56.252000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000dfd10 items=0 ppid=2142 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:56.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363763663638613764383835366264373836383664366662613764 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.252000 audit: BPF prog-id=116 op=LOAD Nov 1 04:35:56.252000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000dfd58 items=0 ppid=2142 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:56.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363763663638613764383835366264373836383664366662613764 Nov 1 04:35:56.253000 audit: BPF prog-id=116 op=UNLOAD Nov 1 04:35:56.253000 audit: BPF prog-id=115 op=UNLOAD Nov 1 04:35:56.253000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.253000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.253000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.253000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.253000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.253000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.253000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.253000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.253000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.253000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:35:56.253000 audit: BPF prog-id=117 op=LOAD Nov 1 04:35:56.253000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000330168 items=0 ppid=2142 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:35:56.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363763663638613764383835366264373836383664366662613764 Nov 1 04:35:56.280533 env[1200]: time="2025-11-01T04:35:56.280471866Z" level=info msg="StartContainer for \"dd67cf68a7d8856bd78686d6fba7d7e4b6ed90260aab0c9d87e554f09100a50a\" returns successfully" Nov 1 04:35:57.147377 systemd[1]: run-containerd-runc-k8s.io-dd67cf68a7d8856bd78686d6fba7d7e4b6ed90260aab0c9d87e554f09100a50a-runc.rQ7d5v.mount: Deactivated successfully. Nov 1 04:35:57.266457 kubelet[2011]: I1101 04:35:57.266356 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7dcd859c48-4sdfm" podStartSLOduration=1.737860017 podStartE2EDuration="5.266335214s" podCreationTimestamp="2025-11-01 04:35:52 +0000 UTC" firstStartedPulling="2025-11-01 04:35:52.601081809 +0000 UTC m=+5.869671213" lastFinishedPulling="2025-11-01 04:35:56.129557012 +0000 UTC m=+9.398146410" observedRunningTime="2025-11-01 04:35:57.239510449 +0000 UTC m=+10.508099857" watchObservedRunningTime="2025-11-01 04:35:57.266335214 +0000 UTC m=+10.534924624" Nov 1 04:36:04.045000 audit[1361]: USER_END pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 04:36:04.046253 sudo[1361]: pam_unix(sudo:session): session closed for user root Nov 1 04:36:04.049634 kernel: kauditd_printk_skb: 357 callbacks suppressed Nov 1 04:36:04.049822 kernel: audit: type=1106 audit(1761971764.045:945): pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 04:36:04.047000 audit[1361]: CRED_DISP pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 04:36:04.073491 kernel: audit: type=1104 audit(1761971764.047:946): pid=1361 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Nov 1 04:36:04.235331 sshd[1358]: pam_unix(sshd:session): session closed for user core Nov 1 04:36:04.248000 audit[1358]: USER_END pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:36:04.260530 kernel: audit: type=1106 audit(1761971764.248:947): pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:36:04.266247 systemd[1]: sshd@6-10.244.11.230:22-139.178.89.65:51572.service: Deactivated successfully. Nov 1 04:36:04.269302 systemd[1]: session-7.scope: Deactivated successfully. Nov 1 04:36:04.269745 systemd[1]: session-7.scope: Consumed 7.692s CPU time. Nov 1 04:36:04.249000 audit[1358]: CRED_DISP pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:36:04.277149 kernel: audit: type=1104 audit(1761971764.249:948): pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:36:04.278504 systemd-logind[1191]: Session 7 logged out. Waiting for processes to exit. Nov 1 04:36:04.281796 systemd-logind[1191]: Removed session 7. Nov 1 04:36:04.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.244.11.230:22-139.178.89.65:51572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:36:04.288229 kernel: audit: type=1131 audit(1761971764.265:949): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.244.11.230:22-139.178.89.65:51572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:36:04.873000 audit[2392]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:04.873000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff09a65aa0 a2=0 a3=7fff09a65a8c items=0 ppid=2119 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:04.888639 kernel: audit: type=1325 audit(1761971764.873:950): table=filter:89 family=2 entries=14 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:04.888841 kernel: audit: type=1300 audit(1761971764.873:950): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff09a65aa0 a2=0 a3=7fff09a65a8c items=0 ppid=2119 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:04.873000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:04.898240 kernel: audit: type=1327 audit(1761971764.873:950): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:04.890000 audit[2392]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:04.903140 kernel: audit: type=1325 audit(1761971764.890:951): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:04.913545 kernel: audit: type=1300 audit(1761971764.890:951): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff09a65aa0 a2=0 a3=0 items=0 ppid=2119 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:04.890000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff09a65aa0 a2=0 a3=0 items=0 ppid=2119 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:04.890000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:04.925000 audit[2394]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:04.925000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcf6ffa640 a2=0 a3=7ffcf6ffa62c items=0 ppid=2119 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:04.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:04.932000 audit[2394]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:04.932000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcf6ffa640 a2=0 a3=0 items=0 ppid=2119 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:04.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:07.946000 audit[2399]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:07.946000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffda0b4c2e0 a2=0 a3=7ffda0b4c2cc items=0 ppid=2119 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:07.946000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:07.950000 audit[2399]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:07.950000 audit[2399]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffda0b4c2e0 a2=0 a3=0 items=0 ppid=2119 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:07.950000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:07.982000 audit[2401]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:07.982000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff577312b0 a2=0 a3=7fff5773129c items=0 ppid=2119 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:07.982000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:07.987000 audit[2401]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:07.987000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff577312b0 a2=0 a3=0 items=0 ppid=2119 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:07.987000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:09.017000 audit[2403]: NETFILTER_CFG table=filter:97 family=2 entries=19 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:09.017000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe1eb12f80 a2=0 a3=7ffe1eb12f6c items=0 ppid=2119 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:09.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:09.021000 audit[2403]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:09.021000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe1eb12f80 a2=0 a3=0 items=0 ppid=2119 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:09.021000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:10.037904 systemd[1]: Created slice kubepods-besteffort-pod8c8d92c3_cc06_4ead_a0e3_344f3c725357.slice. Nov 1 04:36:10.107235 kernel: kauditd_printk_skb: 25 callbacks suppressed Nov 1 04:36:10.107489 kernel: audit: type=1325 audit(1761971770.100:960): table=filter:99 family=2 entries=21 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:10.100000 audit[2405]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:10.108174 kubelet[2011]: I1101 04:36:10.108075 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8c8d92c3-cc06-4ead-a0e3-344f3c725357-tigera-ca-bundle\") pod \"calico-typha-64d7cc8975-p85bt\" (UID: \"8c8d92c3-cc06-4ead-a0e3-344f3c725357\") " pod="calico-system/calico-typha-64d7cc8975-p85bt" Nov 1 04:36:10.109048 kubelet[2011]: I1101 04:36:10.109018 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/8c8d92c3-cc06-4ead-a0e3-344f3c725357-typha-certs\") pod \"calico-typha-64d7cc8975-p85bt\" (UID: \"8c8d92c3-cc06-4ead-a0e3-344f3c725357\") " pod="calico-system/calico-typha-64d7cc8975-p85bt" Nov 1 04:36:10.109317 kubelet[2011]: I1101 04:36:10.109253 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-86pfh\" (UniqueName: \"kubernetes.io/projected/8c8d92c3-cc06-4ead-a0e3-344f3c725357-kube-api-access-86pfh\") pod \"calico-typha-64d7cc8975-p85bt\" (UID: \"8c8d92c3-cc06-4ead-a0e3-344f3c725357\") " pod="calico-system/calico-typha-64d7cc8975-p85bt" Nov 1 04:36:10.100000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffef37c1bd0 a2=0 a3=7ffef37c1bbc items=0 ppid=2119 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.118367 kernel: audit: type=1300 audit(1761971770.100:960): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffef37c1bd0 a2=0 a3=7ffef37c1bbc items=0 ppid=2119 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.100000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:10.125381 kernel: audit: type=1327 audit(1761971770.100:960): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:10.119000 audit[2405]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:10.130134 kernel: audit: type=1325 audit(1761971770.119:961): table=nat:100 family=2 entries=12 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:10.140004 kernel: audit: type=1300 audit(1761971770.119:961): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffef37c1bd0 a2=0 a3=0 items=0 ppid=2119 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.119000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffef37c1bd0 a2=0 a3=0 items=0 ppid=2119 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.119000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:10.145146 kernel: audit: type=1327 audit(1761971770.119:961): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:10.234788 systemd[1]: Created slice kubepods-besteffort-podfcfc4990_66a6_44e8_afb2_d6ec87ca6355.slice. Nov 1 04:36:10.310851 kubelet[2011]: I1101 04:36:10.310700 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/fcfc4990-66a6-44e8-afb2-d6ec87ca6355-flexvol-driver-host\") pod \"calico-node-ppnfh\" (UID: \"fcfc4990-66a6-44e8-afb2-d6ec87ca6355\") " pod="calico-system/calico-node-ppnfh" Nov 1 04:36:10.311175 kubelet[2011]: I1101 04:36:10.311144 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/fcfc4990-66a6-44e8-afb2-d6ec87ca6355-lib-modules\") pod \"calico-node-ppnfh\" (UID: \"fcfc4990-66a6-44e8-afb2-d6ec87ca6355\") " pod="calico-system/calico-node-ppnfh" Nov 1 04:36:10.311867 kubelet[2011]: I1101 04:36:10.311333 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/fcfc4990-66a6-44e8-afb2-d6ec87ca6355-policysync\") pod \"calico-node-ppnfh\" (UID: \"fcfc4990-66a6-44e8-afb2-d6ec87ca6355\") " pod="calico-system/calico-node-ppnfh" Nov 1 04:36:10.311867 kubelet[2011]: I1101 04:36:10.311396 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/fcfc4990-66a6-44e8-afb2-d6ec87ca6355-var-lib-calico\") pod \"calico-node-ppnfh\" (UID: \"fcfc4990-66a6-44e8-afb2-d6ec87ca6355\") " pod="calico-system/calico-node-ppnfh" Nov 1 04:36:10.311867 kubelet[2011]: I1101 04:36:10.311428 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/fcfc4990-66a6-44e8-afb2-d6ec87ca6355-cni-log-dir\") pod \"calico-node-ppnfh\" (UID: \"fcfc4990-66a6-44e8-afb2-d6ec87ca6355\") " pod="calico-system/calico-node-ppnfh" Nov 1 04:36:10.311867 kubelet[2011]: I1101 04:36:10.311474 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/fcfc4990-66a6-44e8-afb2-d6ec87ca6355-node-certs\") pod \"calico-node-ppnfh\" (UID: \"fcfc4990-66a6-44e8-afb2-d6ec87ca6355\") " pod="calico-system/calico-node-ppnfh" Nov 1 04:36:10.311867 kubelet[2011]: I1101 04:36:10.311502 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fcfc4990-66a6-44e8-afb2-d6ec87ca6355-tigera-ca-bundle\") pod \"calico-node-ppnfh\" (UID: \"fcfc4990-66a6-44e8-afb2-d6ec87ca6355\") " pod="calico-system/calico-node-ppnfh" Nov 1 04:36:10.312239 kubelet[2011]: I1101 04:36:10.311539 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/fcfc4990-66a6-44e8-afb2-d6ec87ca6355-xtables-lock\") pod \"calico-node-ppnfh\" (UID: \"fcfc4990-66a6-44e8-afb2-d6ec87ca6355\") " pod="calico-system/calico-node-ppnfh" Nov 1 04:36:10.312239 kubelet[2011]: I1101 04:36:10.311569 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9wd9b\" (UniqueName: \"kubernetes.io/projected/fcfc4990-66a6-44e8-afb2-d6ec87ca6355-kube-api-access-9wd9b\") pod \"calico-node-ppnfh\" (UID: \"fcfc4990-66a6-44e8-afb2-d6ec87ca6355\") " pod="calico-system/calico-node-ppnfh" Nov 1 04:36:10.312239 kubelet[2011]: I1101 04:36:10.311612 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/fcfc4990-66a6-44e8-afb2-d6ec87ca6355-var-run-calico\") pod \"calico-node-ppnfh\" (UID: \"fcfc4990-66a6-44e8-afb2-d6ec87ca6355\") " pod="calico-system/calico-node-ppnfh" Nov 1 04:36:10.312239 kubelet[2011]: I1101 04:36:10.311661 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/fcfc4990-66a6-44e8-afb2-d6ec87ca6355-cni-bin-dir\") pod \"calico-node-ppnfh\" (UID: \"fcfc4990-66a6-44e8-afb2-d6ec87ca6355\") " pod="calico-system/calico-node-ppnfh" Nov 1 04:36:10.312239 kubelet[2011]: I1101 04:36:10.311696 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/fcfc4990-66a6-44e8-afb2-d6ec87ca6355-cni-net-dir\") pod \"calico-node-ppnfh\" (UID: \"fcfc4990-66a6-44e8-afb2-d6ec87ca6355\") " pod="calico-system/calico-node-ppnfh" Nov 1 04:36:10.343544 kubelet[2011]: E1101 04:36:10.343483 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:10.354512 env[1200]: time="2025-11-01T04:36:10.354394163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-64d7cc8975-p85bt,Uid:8c8d92c3-cc06-4ead-a0e3-344f3c725357,Namespace:calico-system,Attempt:0,}" Nov 1 04:36:10.400803 env[1200]: time="2025-11-01T04:36:10.398540951Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:36:10.400803 env[1200]: time="2025-11-01T04:36:10.398691676Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:36:10.400803 env[1200]: time="2025-11-01T04:36:10.398711060Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:36:10.400803 env[1200]: time="2025-11-01T04:36:10.399057560Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c3125b4658b804c9b781fdb851e44c16d7047e4e287b067b33f49309c904abb6 pid=2415 runtime=io.containerd.runc.v2 Nov 1 04:36:10.412267 kubelet[2011]: I1101 04:36:10.412213 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ccda356b-9c43-49d4-bc40-aea58a266a51-kubelet-dir\") pod \"csi-node-driver-xqtpq\" (UID: \"ccda356b-9c43-49d4-bc40-aea58a266a51\") " pod="calico-system/csi-node-driver-xqtpq" Nov 1 04:36:10.412267 kubelet[2011]: I1101 04:36:10.412272 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ccda356b-9c43-49d4-bc40-aea58a266a51-varrun\") pod \"csi-node-driver-xqtpq\" (UID: \"ccda356b-9c43-49d4-bc40-aea58a266a51\") " pod="calico-system/csi-node-driver-xqtpq" Nov 1 04:36:10.413069 kubelet[2011]: I1101 04:36:10.412777 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ccda356b-9c43-49d4-bc40-aea58a266a51-registration-dir\") pod \"csi-node-driver-xqtpq\" (UID: \"ccda356b-9c43-49d4-bc40-aea58a266a51\") " pod="calico-system/csi-node-driver-xqtpq" Nov 1 04:36:10.413069 kubelet[2011]: I1101 04:36:10.412853 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ccda356b-9c43-49d4-bc40-aea58a266a51-socket-dir\") pod \"csi-node-driver-xqtpq\" (UID: \"ccda356b-9c43-49d4-bc40-aea58a266a51\") " pod="calico-system/csi-node-driver-xqtpq" Nov 1 04:36:10.413069 kubelet[2011]: I1101 04:36:10.412897 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9dpjt\" (UniqueName: \"kubernetes.io/projected/ccda356b-9c43-49d4-bc40-aea58a266a51-kube-api-access-9dpjt\") pod \"csi-node-driver-xqtpq\" (UID: \"ccda356b-9c43-49d4-bc40-aea58a266a51\") " pod="calico-system/csi-node-driver-xqtpq" Nov 1 04:36:10.415717 kubelet[2011]: E1101 04:36:10.415166 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.415717 kubelet[2011]: W1101 04:36:10.415207 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.415717 kubelet[2011]: E1101 04:36:10.415308 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.418789 kubelet[2011]: E1101 04:36:10.418743 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.418789 kubelet[2011]: W1101 04:36:10.418769 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.418789 kubelet[2011]: E1101 04:36:10.418790 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.435148 kubelet[2011]: E1101 04:36:10.428729 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.435148 kubelet[2011]: W1101 04:36:10.428765 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.435148 kubelet[2011]: E1101 04:36:10.428800 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.443373 kubelet[2011]: E1101 04:36:10.443324 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.443373 kubelet[2011]: W1101 04:36:10.443359 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.443373 kubelet[2011]: E1101 04:36:10.443389 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.443758 kubelet[2011]: E1101 04:36:10.443719 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.443758 kubelet[2011]: W1101 04:36:10.443735 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.443758 kubelet[2011]: E1101 04:36:10.443751 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.444096 kubelet[2011]: E1101 04:36:10.444020 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.444096 kubelet[2011]: W1101 04:36:10.444040 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.444096 kubelet[2011]: E1101 04:36:10.444056 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.447170 kubelet[2011]: E1101 04:36:10.446403 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.447170 kubelet[2011]: W1101 04:36:10.446426 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.447170 kubelet[2011]: E1101 04:36:10.446447 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.447170 kubelet[2011]: E1101 04:36:10.446806 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.447170 kubelet[2011]: W1101 04:36:10.446824 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.447170 kubelet[2011]: E1101 04:36:10.446840 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.447170 kubelet[2011]: E1101 04:36:10.447170 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.447615 kubelet[2011]: W1101 04:36:10.447185 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.447615 kubelet[2011]: E1101 04:36:10.447201 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.447615 kubelet[2011]: E1101 04:36:10.447497 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.447615 kubelet[2011]: W1101 04:36:10.447512 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.447615 kubelet[2011]: E1101 04:36:10.447527 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.478070 systemd[1]: Started cri-containerd-c3125b4658b804c9b781fdb851e44c16d7047e4e287b067b33f49309c904abb6.scope. Nov 1 04:36:10.482564 kubelet[2011]: E1101 04:36:10.482106 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.482564 kubelet[2011]: W1101 04:36:10.482150 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.482564 kubelet[2011]: E1101 04:36:10.482178 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.514892 kubelet[2011]: E1101 04:36:10.514614 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.514892 kubelet[2011]: W1101 04:36:10.514648 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.514892 kubelet[2011]: E1101 04:36:10.514677 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.515554 kubelet[2011]: E1101 04:36:10.515459 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.515554 kubelet[2011]: W1101 04:36:10.515479 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.515554 kubelet[2011]: E1101 04:36:10.515496 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.515990 kubelet[2011]: E1101 04:36:10.515951 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.515990 kubelet[2011]: W1101 04:36:10.515980 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.516183 kubelet[2011]: E1101 04:36:10.516002 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.516333 kubelet[2011]: E1101 04:36:10.516308 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.516333 kubelet[2011]: W1101 04:36:10.516329 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.516505 kubelet[2011]: E1101 04:36:10.516346 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.516677 kubelet[2011]: E1101 04:36:10.516655 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.516677 kubelet[2011]: W1101 04:36:10.516675 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.516829 kubelet[2011]: E1101 04:36:10.516691 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.517087 kubelet[2011]: E1101 04:36:10.517051 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.517087 kubelet[2011]: W1101 04:36:10.517075 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.517271 kubelet[2011]: E1101 04:36:10.517093 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.517476 kubelet[2011]: E1101 04:36:10.517416 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.517476 kubelet[2011]: W1101 04:36:10.517444 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.517476 kubelet[2011]: E1101 04:36:10.517461 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.517847 kubelet[2011]: E1101 04:36:10.517821 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.517939 kubelet[2011]: W1101 04:36:10.517852 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.517939 kubelet[2011]: E1101 04:36:10.517870 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.518796 kubelet[2011]: E1101 04:36:10.518183 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.518796 kubelet[2011]: W1101 04:36:10.518204 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.518796 kubelet[2011]: E1101 04:36:10.518228 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.518796 kubelet[2011]: E1101 04:36:10.518578 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.518796 kubelet[2011]: W1101 04:36:10.518593 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.518796 kubelet[2011]: E1101 04:36:10.518624 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.519247 kubelet[2011]: E1101 04:36:10.519173 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.519247 kubelet[2011]: W1101 04:36:10.519220 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.519247 kubelet[2011]: E1101 04:36:10.519238 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.519588 kubelet[2011]: E1101 04:36:10.519565 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.519588 kubelet[2011]: W1101 04:36:10.519584 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.519754 kubelet[2011]: E1101 04:36:10.519611 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.519935 kubelet[2011]: E1101 04:36:10.519905 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.519935 kubelet[2011]: W1101 04:36:10.519925 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.520087 kubelet[2011]: E1101 04:36:10.519941 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.520778 kubelet[2011]: E1101 04:36:10.520720 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.520778 kubelet[2011]: W1101 04:36:10.520740 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.520924 kubelet[2011]: E1101 04:36:10.520757 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.524247 kubelet[2011]: E1101 04:36:10.521174 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.524247 kubelet[2011]: W1101 04:36:10.521195 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.524247 kubelet[2011]: E1101 04:36:10.521211 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.524247 kubelet[2011]: E1101 04:36:10.521577 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.524247 kubelet[2011]: W1101 04:36:10.521592 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.524247 kubelet[2011]: E1101 04:36:10.521621 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.524247 kubelet[2011]: E1101 04:36:10.521860 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.524247 kubelet[2011]: W1101 04:36:10.521874 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.524247 kubelet[2011]: E1101 04:36:10.521889 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.524247 kubelet[2011]: E1101 04:36:10.522154 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.524907 kubelet[2011]: W1101 04:36:10.522168 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.524907 kubelet[2011]: E1101 04:36:10.522183 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.524907 kubelet[2011]: E1101 04:36:10.522442 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.524907 kubelet[2011]: W1101 04:36:10.522456 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.524907 kubelet[2011]: E1101 04:36:10.522471 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.524907 kubelet[2011]: E1101 04:36:10.522777 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.524907 kubelet[2011]: W1101 04:36:10.522792 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.524907 kubelet[2011]: E1101 04:36:10.522807 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.524907 kubelet[2011]: E1101 04:36:10.523050 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.524907 kubelet[2011]: W1101 04:36:10.523064 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.527279 kubelet[2011]: E1101 04:36:10.523080 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.527279 kubelet[2011]: E1101 04:36:10.525016 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.527279 kubelet[2011]: W1101 04:36:10.525037 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.527279 kubelet[2011]: E1101 04:36:10.525055 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.527279 kubelet[2011]: E1101 04:36:10.525456 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.527279 kubelet[2011]: W1101 04:36:10.525471 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.527279 kubelet[2011]: E1101 04:36:10.525487 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.527279 kubelet[2011]: E1101 04:36:10.525762 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.527279 kubelet[2011]: W1101 04:36:10.525776 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.527279 kubelet[2011]: E1101 04:36:10.525807 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.527890 kubelet[2011]: E1101 04:36:10.526088 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.527890 kubelet[2011]: W1101 04:36:10.526104 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.527890 kubelet[2011]: E1101 04:36:10.526277 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.546233 kernel: audit: type=1400 audit(1761971770.538:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.546323 kubelet[2011]: E1101 04:36:10.543985 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:10.546323 kubelet[2011]: W1101 04:36:10.544016 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:10.546323 kubelet[2011]: E1101 04:36:10.544043 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:10.546527 env[1200]: time="2025-11-01T04:36:10.541238071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ppnfh,Uid:fcfc4990-66a6-44e8-afb2-d6ec87ca6355,Namespace:calico-system,Attempt:0,}" Nov 1 04:36:10.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.557472 kernel: audit: type=1400 audit(1761971770.538:963): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.557576 kernel: audit: type=1400 audit(1761971770.538:964): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.562973 kernel: audit: type=1400 audit(1761971770.538:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.538000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.538000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.539000 audit: BPF prog-id=118 op=LOAD Nov 1 04:36:10.545000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.545000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2415 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.545000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313235623436353862383034633962373831666462383531653434 Nov 1 04:36:10.546000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.546000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2415 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313235623436353862383034633962373831666462383531653434 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit: BPF prog-id=119 op=LOAD Nov 1 04:36:10.551000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025380 items=0 ppid=2415 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313235623436353862383034633962373831666462383531653434 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.551000 audit: BPF prog-id=120 op=LOAD Nov 1 04:36:10.551000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000253c8 items=0 ppid=2415 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313235623436353862383034633962373831666462383531653434 Nov 1 04:36:10.556000 audit: BPF prog-id=120 op=UNLOAD Nov 1 04:36:10.556000 audit: BPF prog-id=119 op=UNLOAD Nov 1 04:36:10.556000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.556000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.556000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.556000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.556000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.556000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.556000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.556000 audit[2426]: AVC avc: denied { perfmon } for pid=2426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.556000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.556000 audit[2426]: AVC avc: denied { bpf } for pid=2426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.556000 audit: BPF prog-id=121 op=LOAD Nov 1 04:36:10.556000 audit[2426]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000257d8 items=0 ppid=2415 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333313235623436353862383034633962373831666462383531653434 Nov 1 04:36:10.603146 env[1200]: time="2025-11-01T04:36:10.602725088Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:36:10.603146 env[1200]: time="2025-11-01T04:36:10.602812454Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:36:10.603146 env[1200]: time="2025-11-01T04:36:10.602832776Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:36:10.603477 env[1200]: time="2025-11-01T04:36:10.603246748Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7e753be9ab9a6dccf3034d59aaf916e13a6578695a13060693fa78b56ceb8256 pid=2489 runtime=io.containerd.runc.v2 Nov 1 04:36:10.636869 env[1200]: time="2025-11-01T04:36:10.636800777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-64d7cc8975-p85bt,Uid:8c8d92c3-cc06-4ead-a0e3-344f3c725357,Namespace:calico-system,Attempt:0,} returns sandbox id \"c3125b4658b804c9b781fdb851e44c16d7047e4e287b067b33f49309c904abb6\"" Nov 1 04:36:10.641424 env[1200]: time="2025-11-01T04:36:10.641205514Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\"" Nov 1 04:36:10.649887 systemd[1]: Started cri-containerd-7e753be9ab9a6dccf3034d59aaf916e13a6578695a13060693fa78b56ceb8256.scope. Nov 1 04:36:10.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.666000 audit: BPF prog-id=122 op=LOAD Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2489 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373533626539616239613664636366333033346435396161663931 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2489 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373533626539616239613664636366333033346435396161663931 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit: BPF prog-id=123 op=LOAD Nov 1 04:36:10.668000 audit[2499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024990 items=0 ppid=2489 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373533626539616239613664636366333033346435396161663931 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit: BPF prog-id=124 op=LOAD Nov 1 04:36:10.668000 audit[2499]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000249d8 items=0 ppid=2489 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373533626539616239613664636366333033346435396161663931 Nov 1 04:36:10.668000 audit: BPF prog-id=124 op=UNLOAD Nov 1 04:36:10.668000 audit: BPF prog-id=123 op=UNLOAD Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { perfmon } for pid=2499 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit[2499]: AVC avc: denied { bpf } for pid=2499 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:10.668000 audit: BPF prog-id=125 op=LOAD Nov 1 04:36:10.668000 audit[2499]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000024de8 items=0 ppid=2489 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:10.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765373533626539616239613664636366333033346435396161663931 Nov 1 04:36:10.695373 env[1200]: time="2025-11-01T04:36:10.695296339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-ppnfh,Uid:fcfc4990-66a6-44e8-afb2-d6ec87ca6355,Namespace:calico-system,Attempt:0,} returns sandbox id \"7e753be9ab9a6dccf3034d59aaf916e13a6578695a13060693fa78b56ceb8256\"" Nov 1 04:36:11.152000 audit[2530]: NETFILTER_CFG table=filter:101 family=2 entries=22 op=nft_register_rule pid=2530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:11.152000 audit[2530]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffc764bcc90 a2=0 a3=7ffc764bcc7c items=0 ppid=2119 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:11.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:11.157000 audit[2530]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=2530 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:11.157000 audit[2530]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc764bcc90 a2=0 a3=0 items=0 ppid=2119 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:11.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:12.092086 kubelet[2011]: E1101 04:36:12.091993 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:12.155751 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2814088739.mount: Deactivated successfully. Nov 1 04:36:14.092640 kubelet[2011]: E1101 04:36:14.092144 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:14.292137 env[1200]: time="2025-11-01T04:36:14.290476783Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:14.295726 env[1200]: time="2025-11-01T04:36:14.294182157Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:14.297414 env[1200]: time="2025-11-01T04:36:14.297376264Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:14.300193 env[1200]: time="2025-11-01T04:36:14.300144498Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:6f437220b5b3c627fb4a0fc8dc323363101f3c22a8f337612c2a1ddfb73b810c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:14.302163 env[1200]: time="2025-11-01T04:36:14.301315368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\" returns image reference \"sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958\"" Nov 1 04:36:14.308563 env[1200]: time="2025-11-01T04:36:14.306786526Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Nov 1 04:36:14.341613 env[1200]: time="2025-11-01T04:36:14.341505171Z" level=info msg="CreateContainer within sandbox \"c3125b4658b804c9b781fdb851e44c16d7047e4e287b067b33f49309c904abb6\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Nov 1 04:36:14.376197 env[1200]: time="2025-11-01T04:36:14.372362495Z" level=info msg="CreateContainer within sandbox \"c3125b4658b804c9b781fdb851e44c16d7047e4e287b067b33f49309c904abb6\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"eb1d8608551b2bb9a07d9b9a5cb32e248b8ebe93e69bfb9e0b220a873f58a91a\"" Nov 1 04:36:14.374542 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3296494302.mount: Deactivated successfully. Nov 1 04:36:14.379139 env[1200]: time="2025-11-01T04:36:14.378558069Z" level=info msg="StartContainer for \"eb1d8608551b2bb9a07d9b9a5cb32e248b8ebe93e69bfb9e0b220a873f58a91a\"" Nov 1 04:36:14.428884 systemd[1]: Started cri-containerd-eb1d8608551b2bb9a07d9b9a5cb32e248b8ebe93e69bfb9e0b220a873f58a91a.scope. Nov 1 04:36:14.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.469000 audit: BPF prog-id=126 op=LOAD Nov 1 04:36:14.470000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.470000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2415 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:14.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562316438363038353531623262623961303764396239613563623332 Nov 1 04:36:14.470000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.470000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2415 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:14.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562316438363038353531623262623961303764396239613563623332 Nov 1 04:36:14.470000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.470000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.470000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.470000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.470000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.470000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.470000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.470000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.470000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.470000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.470000 audit: BPF prog-id=127 op=LOAD Nov 1 04:36:14.470000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000284880 items=0 ppid=2415 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:14.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562316438363038353531623262623961303764396239613563623332 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit: BPF prog-id=128 op=LOAD Nov 1 04:36:14.471000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002848c8 items=0 ppid=2415 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:14.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562316438363038353531623262623961303764396239613563623332 Nov 1 04:36:14.471000 audit: BPF prog-id=128 op=UNLOAD Nov 1 04:36:14.471000 audit: BPF prog-id=127 op=UNLOAD Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:14.471000 audit: BPF prog-id=129 op=LOAD Nov 1 04:36:14.471000 audit[2542]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000284cd8 items=0 ppid=2415 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:14.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562316438363038353531623262623961303764396239613563623332 Nov 1 04:36:14.533024 env[1200]: time="2025-11-01T04:36:14.532916370Z" level=info msg="StartContainer for \"eb1d8608551b2bb9a07d9b9a5cb32e248b8ebe93e69bfb9e0b220a873f58a91a\" returns successfully" Nov 1 04:36:15.322535 kubelet[2011]: E1101 04:36:15.322439 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.323382 kubelet[2011]: W1101 04:36:15.323188 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.323382 kubelet[2011]: E1101 04:36:15.323291 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.323721 kubelet[2011]: E1101 04:36:15.323689 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.323721 kubelet[2011]: W1101 04:36:15.323714 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.323881 kubelet[2011]: E1101 04:36:15.323732 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.324068 kubelet[2011]: E1101 04:36:15.324038 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.324068 kubelet[2011]: W1101 04:36:15.324062 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.324278 kubelet[2011]: E1101 04:36:15.324088 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.324573 kubelet[2011]: E1101 04:36:15.324543 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.324573 kubelet[2011]: W1101 04:36:15.324567 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.324699 kubelet[2011]: E1101 04:36:15.324584 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.324905 kubelet[2011]: E1101 04:36:15.324884 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.324995 kubelet[2011]: W1101 04:36:15.324905 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.324995 kubelet[2011]: E1101 04:36:15.324922 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.325245 kubelet[2011]: E1101 04:36:15.325226 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.325309 kubelet[2011]: W1101 04:36:15.325245 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.325309 kubelet[2011]: E1101 04:36:15.325261 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.325581 kubelet[2011]: E1101 04:36:15.325560 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.325581 kubelet[2011]: W1101 04:36:15.325580 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.325754 kubelet[2011]: E1101 04:36:15.325596 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.325887 kubelet[2011]: E1101 04:36:15.325867 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.325977 kubelet[2011]: W1101 04:36:15.325887 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.325977 kubelet[2011]: E1101 04:36:15.325904 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.326215 kubelet[2011]: E1101 04:36:15.326197 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.326313 kubelet[2011]: W1101 04:36:15.326217 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.326313 kubelet[2011]: E1101 04:36:15.326232 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.326539 kubelet[2011]: E1101 04:36:15.326508 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.326539 kubelet[2011]: W1101 04:36:15.326538 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.326691 kubelet[2011]: E1101 04:36:15.326555 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.326850 kubelet[2011]: E1101 04:36:15.326830 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.326926 kubelet[2011]: W1101 04:36:15.326851 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.326926 kubelet[2011]: E1101 04:36:15.326867 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.327173 kubelet[2011]: E1101 04:36:15.327153 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.327264 kubelet[2011]: W1101 04:36:15.327173 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.327264 kubelet[2011]: E1101 04:36:15.327189 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.327520 kubelet[2011]: E1101 04:36:15.327493 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.327599 kubelet[2011]: W1101 04:36:15.327521 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.327599 kubelet[2011]: E1101 04:36:15.327542 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.327844 kubelet[2011]: E1101 04:36:15.327825 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.327927 kubelet[2011]: W1101 04:36:15.327844 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.327927 kubelet[2011]: E1101 04:36:15.327859 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.328159 kubelet[2011]: E1101 04:36:15.328142 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.328243 kubelet[2011]: W1101 04:36:15.328160 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.328243 kubelet[2011]: E1101 04:36:15.328175 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.364019 kubelet[2011]: E1101 04:36:15.363953 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.364019 kubelet[2011]: W1101 04:36:15.364004 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.364019 kubelet[2011]: E1101 04:36:15.364036 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.364634 kubelet[2011]: E1101 04:36:15.364594 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.364634 kubelet[2011]: W1101 04:36:15.364618 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.364634 kubelet[2011]: E1101 04:36:15.364636 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.364987 kubelet[2011]: E1101 04:36:15.364955 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.364987 kubelet[2011]: W1101 04:36:15.364979 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.365175 kubelet[2011]: E1101 04:36:15.364996 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.365417 kubelet[2011]: E1101 04:36:15.365384 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.365417 kubelet[2011]: W1101 04:36:15.365408 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.365553 kubelet[2011]: E1101 04:36:15.365443 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.365797 kubelet[2011]: E1101 04:36:15.365764 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.365797 kubelet[2011]: W1101 04:36:15.365788 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.365952 kubelet[2011]: E1101 04:36:15.365805 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.366089 kubelet[2011]: E1101 04:36:15.366067 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.366194 kubelet[2011]: W1101 04:36:15.366092 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.366194 kubelet[2011]: E1101 04:36:15.366109 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.366413 kubelet[2011]: E1101 04:36:15.366391 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.366413 kubelet[2011]: W1101 04:36:15.366413 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.366562 kubelet[2011]: E1101 04:36:15.366430 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.366796 kubelet[2011]: E1101 04:36:15.366773 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.366796 kubelet[2011]: W1101 04:36:15.366796 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.366912 kubelet[2011]: E1101 04:36:15.366813 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.367265 kubelet[2011]: E1101 04:36:15.367238 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.367265 kubelet[2011]: W1101 04:36:15.367260 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.367435 kubelet[2011]: E1101 04:36:15.367277 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.368014 kubelet[2011]: E1101 04:36:15.367976 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.368014 kubelet[2011]: W1101 04:36:15.368000 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.368014 kubelet[2011]: E1101 04:36:15.368016 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.368492 kubelet[2011]: E1101 04:36:15.368457 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.368492 kubelet[2011]: W1101 04:36:15.368483 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.368840 kubelet[2011]: E1101 04:36:15.368500 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.368840 kubelet[2011]: E1101 04:36:15.368788 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.368840 kubelet[2011]: W1101 04:36:15.368802 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.368840 kubelet[2011]: E1101 04:36:15.368817 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.369140 kubelet[2011]: E1101 04:36:15.369083 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.369140 kubelet[2011]: W1101 04:36:15.369106 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.369140 kubelet[2011]: E1101 04:36:15.369139 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.369507 kubelet[2011]: E1101 04:36:15.369476 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.369507 kubelet[2011]: W1101 04:36:15.369499 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.369642 kubelet[2011]: E1101 04:36:15.369525 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.370965 kubelet[2011]: E1101 04:36:15.370923 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.370965 kubelet[2011]: W1101 04:36:15.370960 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.371207 kubelet[2011]: E1101 04:36:15.370981 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.371507 kubelet[2011]: E1101 04:36:15.371450 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.371507 kubelet[2011]: W1101 04:36:15.371483 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.371507 kubelet[2011]: E1101 04:36:15.371501 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.372161 kubelet[2011]: E1101 04:36:15.372085 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.372161 kubelet[2011]: W1101 04:36:15.372109 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.372311 kubelet[2011]: E1101 04:36:15.372169 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.372510 kubelet[2011]: E1101 04:36:15.372485 2011 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Nov 1 04:36:15.372596 kubelet[2011]: W1101 04:36:15.372508 2011 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Nov 1 04:36:15.372596 kubelet[2011]: E1101 04:36:15.372582 2011 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Nov 1 04:36:15.954374 env[1200]: time="2025-11-01T04:36:15.954277409Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:15.956876 env[1200]: time="2025-11-01T04:36:15.956839905Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:15.960442 env[1200]: time="2025-11-01T04:36:15.960366541Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:15.963102 env[1200]: time="2025-11-01T04:36:15.963027984Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:15.963608 env[1200]: time="2025-11-01T04:36:15.963554178Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Nov 1 04:36:15.970823 env[1200]: time="2025-11-01T04:36:15.970745346Z" level=info msg="CreateContainer within sandbox \"7e753be9ab9a6dccf3034d59aaf916e13a6578695a13060693fa78b56ceb8256\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Nov 1 04:36:15.991436 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1193029768.mount: Deactivated successfully. Nov 1 04:36:15.998872 env[1200]: time="2025-11-01T04:36:15.998785922Z" level=info msg="CreateContainer within sandbox \"7e753be9ab9a6dccf3034d59aaf916e13a6578695a13060693fa78b56ceb8256\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0ce23b0e06ba43ec0898422f464a269ed2bde166de5c5f46aec649c49eaec302\"" Nov 1 04:36:16.003402 env[1200]: time="2025-11-01T04:36:16.002572425Z" level=info msg="StartContainer for \"0ce23b0e06ba43ec0898422f464a269ed2bde166de5c5f46aec649c49eaec302\"" Nov 1 04:36:16.057007 systemd[1]: Started cri-containerd-0ce23b0e06ba43ec0898422f464a269ed2bde166de5c5f46aec649c49eaec302.scope. Nov 1 04:36:16.092161 kubelet[2011]: E1101 04:36:16.092009 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:16.100000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.103704 kernel: kauditd_printk_skb: 173 callbacks suppressed Nov 1 04:36:16.103857 kernel: audit: type=1400 audit(1761971776.100:1018): avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.100000 audit[2616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1c1c437208 items=0 ppid=2489 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:16.117622 kernel: audit: type=1300 audit(1761971776.100:1018): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1c1c437208 items=0 ppid=2489 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:16.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063653233623065303662613433656330383938343232663436346132 Nov 1 04:36:16.130143 kernel: audit: type=1327 audit(1761971776.100:1018): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063653233623065303662613433656330383938343232663436346132 Nov 1 04:36:16.101000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.143759 kernel: audit: type=1400 audit(1761971776.101:1019): avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.143962 kernel: audit: type=1400 audit(1761971776.101:1019): avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.101000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.101000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.155153 kernel: audit: type=1400 audit(1761971776.101:1019): avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.101000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.101000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.165612 kernel: audit: type=1400 audit(1761971776.101:1019): avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.165756 kernel: audit: type=1400 audit(1761971776.101:1019): avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.101000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.172147 kernel: audit: type=1400 audit(1761971776.101:1019): avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.101000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.101000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.101000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.101000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.101000 audit: BPF prog-id=130 op=LOAD Nov 1 04:36:16.101000 audit[2616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003307f8 items=0 ppid=2489 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:16.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063653233623065303662613433656330383938343232663436346132 Nov 1 04:36:16.116000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.179205 kernel: audit: type=1400 audit(1761971776.101:1019): avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.116000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.116000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.116000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.116000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.116000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.116000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.116000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.116000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.116000 audit: BPF prog-id=131 op=LOAD Nov 1 04:36:16.116000 audit[2616]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000330848 items=0 ppid=2489 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:16.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063653233623065303662613433656330383938343232663436346132 Nov 1 04:36:16.117000 audit: BPF prog-id=131 op=UNLOAD Nov 1 04:36:16.117000 audit: BPF prog-id=130 op=UNLOAD Nov 1 04:36:16.117000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.117000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.117000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.117000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.117000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.117000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.117000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.117000 audit[2616]: AVC avc: denied { perfmon } for pid=2616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.117000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.117000 audit[2616]: AVC avc: denied { bpf } for pid=2616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:16.117000 audit: BPF prog-id=132 op=LOAD Nov 1 04:36:16.117000 audit[2616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003308d8 items=0 ppid=2489 pid=2616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:16.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063653233623065303662613433656330383938343232663436346132 Nov 1 04:36:16.183919 env[1200]: time="2025-11-01T04:36:16.183846133Z" level=info msg="StartContainer for \"0ce23b0e06ba43ec0898422f464a269ed2bde166de5c5f46aec649c49eaec302\" returns successfully" Nov 1 04:36:16.194203 systemd[1]: cri-containerd-0ce23b0e06ba43ec0898422f464a269ed2bde166de5c5f46aec649c49eaec302.scope: Deactivated successfully. Nov 1 04:36:16.196000 audit: BPF prog-id=132 op=UNLOAD Nov 1 04:36:16.281064 kubelet[2011]: I1101 04:36:16.281015 2011 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Nov 1 04:36:16.360428 kubelet[2011]: I1101 04:36:16.316643 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-64d7cc8975-p85bt" podStartSLOduration=3.650367749 podStartE2EDuration="7.316599033s" podCreationTimestamp="2025-11-01 04:36:09 +0000 UTC" firstStartedPulling="2025-11-01 04:36:10.639727911 +0000 UTC m=+23.908317315" lastFinishedPulling="2025-11-01 04:36:14.305959196 +0000 UTC m=+27.574548599" observedRunningTime="2025-11-01 04:36:15.295326245 +0000 UTC m=+28.563915661" watchObservedRunningTime="2025-11-01 04:36:16.316599033 +0000 UTC m=+29.585188444" Nov 1 04:36:16.320814 systemd[1]: run-containerd-runc-k8s.io-0ce23b0e06ba43ec0898422f464a269ed2bde166de5c5f46aec649c49eaec302-runc.23LHDh.mount: Deactivated successfully. Nov 1 04:36:16.320973 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0ce23b0e06ba43ec0898422f464a269ed2bde166de5c5f46aec649c49eaec302-rootfs.mount: Deactivated successfully. Nov 1 04:36:16.391674 env[1200]: time="2025-11-01T04:36:16.391599839Z" level=info msg="shim disconnected" id=0ce23b0e06ba43ec0898422f464a269ed2bde166de5c5f46aec649c49eaec302 Nov 1 04:36:16.392001 env[1200]: time="2025-11-01T04:36:16.391958280Z" level=warning msg="cleaning up after shim disconnected" id=0ce23b0e06ba43ec0898422f464a269ed2bde166de5c5f46aec649c49eaec302 namespace=k8s.io Nov 1 04:36:16.392166 env[1200]: time="2025-11-01T04:36:16.392136746Z" level=info msg="cleaning up dead shim" Nov 1 04:36:16.413451 env[1200]: time="2025-11-01T04:36:16.413367923Z" level=warning msg="cleanup warnings time=\"2025-11-01T04:36:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2656 runtime=io.containerd.runc.v2\n" Nov 1 04:36:17.289505 env[1200]: time="2025-11-01T04:36:17.289361178Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Nov 1 04:36:18.092638 kubelet[2011]: E1101 04:36:18.092068 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:20.092546 kubelet[2011]: E1101 04:36:20.091939 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:22.092626 kubelet[2011]: E1101 04:36:22.092506 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:24.003926 env[1200]: time="2025-11-01T04:36:24.003752652Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:24.006624 env[1200]: time="2025-11-01T04:36:24.006582489Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:24.009231 env[1200]: time="2025-11-01T04:36:24.009192053Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:24.011883 env[1200]: time="2025-11-01T04:36:24.011844417Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:24.012392 env[1200]: time="2025-11-01T04:36:24.012342931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Nov 1 04:36:24.023002 env[1200]: time="2025-11-01T04:36:24.022939427Z" level=info msg="CreateContainer within sandbox \"7e753be9ab9a6dccf3034d59aaf916e13a6578695a13060693fa78b56ceb8256\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Nov 1 04:36:24.047192 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4248990041.mount: Deactivated successfully. Nov 1 04:36:24.054465 env[1200]: time="2025-11-01T04:36:24.054393886Z" level=info msg="CreateContainer within sandbox \"7e753be9ab9a6dccf3034d59aaf916e13a6578695a13060693fa78b56ceb8256\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"cb0be0ca420390bc640de451099bd005d5e3b31c7fc8508301c1a3f28e661fc6\"" Nov 1 04:36:24.056593 env[1200]: time="2025-11-01T04:36:24.056547636Z" level=info msg="StartContainer for \"cb0be0ca420390bc640de451099bd005d5e3b31c7fc8508301c1a3f28e661fc6\"" Nov 1 04:36:24.092902 kubelet[2011]: E1101 04:36:24.092093 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:24.112379 systemd[1]: run-containerd-runc-k8s.io-cb0be0ca420390bc640de451099bd005d5e3b31c7fc8508301c1a3f28e661fc6-runc.tHf987.mount: Deactivated successfully. Nov 1 04:36:24.115787 systemd[1]: Started cri-containerd-cb0be0ca420390bc640de451099bd005d5e3b31c7fc8508301c1a3f28e661fc6.scope. Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.162373 kernel: kauditd_printk_skb: 34 callbacks suppressed Nov 1 04:36:24.162521 kernel: audit: type=1400 audit(1761971784.153:1025): avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.162610 kernel: audit: type=1300 audit(1761971784.153:1025): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f5fdaee0b98 items=0 ppid=2489 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:24.176905 kernel: audit: type=1327 audit(1761971784.153:1025): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362306265306361343230333930626336343064653435313039396264 Nov 1 04:36:24.177005 kernel: audit: type=1400 audit(1761971784.153:1026): avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f5fdaee0b98 items=0 ppid=2489 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:24.182684 kernel: audit: type=1400 audit(1761971784.153:1026): avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362306265306361343230333930626336343064653435313039396264 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.194161 kernel: audit: type=1400 audit(1761971784.153:1026): avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.200212 kernel: audit: type=1400 audit(1761971784.153:1026): avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.207157 kernel: audit: type=1400 audit(1761971784.153:1026): avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.215172 kernel: audit: type=1400 audit(1761971784.153:1026): avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit: BPF prog-id=133 op=LOAD Nov 1 04:36:24.153000 audit[2682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001c1928 items=0 ppid=2489 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:24.222406 kernel: audit: type=1400 audit(1761971784.153:1026): avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362306265306361343230333930626336343064653435313039396264 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.153000 audit: BPF prog-id=134 op=LOAD Nov 1 04:36:24.153000 audit[2682]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001c1978 items=0 ppid=2489 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:24.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362306265306361343230333930626336343064653435313039396264 Nov 1 04:36:24.154000 audit: BPF prog-id=134 op=UNLOAD Nov 1 04:36:24.154000 audit: BPF prog-id=133 op=UNLOAD Nov 1 04:36:24.154000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.154000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.154000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.154000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.154000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.154000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.154000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.154000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.154000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.154000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:24.154000 audit: BPF prog-id=135 op=LOAD Nov 1 04:36:24.154000 audit[2682]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001c1a08 items=0 ppid=2489 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:24.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362306265306361343230333930626336343064653435313039396264 Nov 1 04:36:24.250531 env[1200]: time="2025-11-01T04:36:24.250462190Z" level=info msg="StartContainer for \"cb0be0ca420390bc640de451099bd005d5e3b31c7fc8508301c1a3f28e661fc6\" returns successfully" Nov 1 04:36:25.597217 env[1200]: time="2025-11-01T04:36:25.597041037Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Nov 1 04:36:25.601768 systemd[1]: cri-containerd-cb0be0ca420390bc640de451099bd005d5e3b31c7fc8508301c1a3f28e661fc6.scope: Deactivated successfully. Nov 1 04:36:25.605000 audit: BPF prog-id=135 op=UNLOAD Nov 1 04:36:25.635055 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cb0be0ca420390bc640de451099bd005d5e3b31c7fc8508301c1a3f28e661fc6-rootfs.mount: Deactivated successfully. Nov 1 04:36:25.640892 env[1200]: time="2025-11-01T04:36:25.640593167Z" level=info msg="shim disconnected" id=cb0be0ca420390bc640de451099bd005d5e3b31c7fc8508301c1a3f28e661fc6 Nov 1 04:36:25.640892 env[1200]: time="2025-11-01T04:36:25.640662412Z" level=warning msg="cleaning up after shim disconnected" id=cb0be0ca420390bc640de451099bd005d5e3b31c7fc8508301c1a3f28e661fc6 namespace=k8s.io Nov 1 04:36:25.640892 env[1200]: time="2025-11-01T04:36:25.640681738Z" level=info msg="cleaning up dead shim" Nov 1 04:36:25.650687 kubelet[2011]: I1101 04:36:25.646722 2011 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Nov 1 04:36:25.662838 env[1200]: time="2025-11-01T04:36:25.662676447Z" level=warning msg="cleanup warnings time=\"2025-11-01T04:36:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2722 runtime=io.containerd.runc.v2\n" Nov 1 04:36:25.807380 systemd[1]: Created slice kubepods-besteffort-pod930f616e_1417_4da3_9618_cb374f34ba9f.slice. Nov 1 04:36:25.812716 kubelet[2011]: I1101 04:36:25.812639 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l4fcd\" (UniqueName: \"kubernetes.io/projected/930f616e-1417-4da3-9618-cb374f34ba9f-kube-api-access-l4fcd\") pod \"whisker-7df74cf549-xc5dz\" (UID: \"930f616e-1417-4da3-9618-cb374f34ba9f\") " pod="calico-system/whisker-7df74cf549-xc5dz" Nov 1 04:36:25.813077 kubelet[2011]: I1101 04:36:25.813045 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m4ggz\" (UniqueName: \"kubernetes.io/projected/a466af82-23ad-4581-8753-4ea82dbddbf8-kube-api-access-m4ggz\") pod \"calico-apiserver-d5d4c457c-d2k4h\" (UID: \"a466af82-23ad-4581-8753-4ea82dbddbf8\") " pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" Nov 1 04:36:25.813291 kubelet[2011]: I1101 04:36:25.813250 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9v4fk\" (UniqueName: \"kubernetes.io/projected/657f9ac9-0c7d-43e1-abaf-a7867906be5a-kube-api-access-9v4fk\") pod \"coredns-674b8bbfcf-p9bjl\" (UID: \"657f9ac9-0c7d-43e1-abaf-a7867906be5a\") " pod="kube-system/coredns-674b8bbfcf-p9bjl" Nov 1 04:36:25.813466 kubelet[2011]: I1101 04:36:25.813424 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/930f616e-1417-4da3-9618-cb374f34ba9f-whisker-backend-key-pair\") pod \"whisker-7df74cf549-xc5dz\" (UID: \"930f616e-1417-4da3-9618-cb374f34ba9f\") " pod="calico-system/whisker-7df74cf549-xc5dz" Nov 1 04:36:25.816708 kubelet[2011]: I1101 04:36:25.813607 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a04c514c-f548-4854-abe7-a0adc995c889-tigera-ca-bundle\") pod \"calico-kube-controllers-6d9b84d64-gh6zn\" (UID: \"a04c514c-f548-4854-abe7-a0adc995c889\") " pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" Nov 1 04:36:25.816909 kubelet[2011]: I1101 04:36:25.816878 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a466af82-23ad-4581-8753-4ea82dbddbf8-calico-apiserver-certs\") pod \"calico-apiserver-d5d4c457c-d2k4h\" (UID: \"a466af82-23ad-4581-8753-4ea82dbddbf8\") " pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" Nov 1 04:36:25.817101 kubelet[2011]: I1101 04:36:25.817057 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/657f9ac9-0c7d-43e1-abaf-a7867906be5a-config-volume\") pod \"coredns-674b8bbfcf-p9bjl\" (UID: \"657f9ac9-0c7d-43e1-abaf-a7867906be5a\") " pod="kube-system/coredns-674b8bbfcf-p9bjl" Nov 1 04:36:25.817288 kubelet[2011]: I1101 04:36:25.817249 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hx58l\" (UniqueName: \"kubernetes.io/projected/2dc02a63-186f-4d13-a96f-fb0c7f4c930f-kube-api-access-hx58l\") pod \"coredns-674b8bbfcf-pfkdh\" (UID: \"2dc02a63-186f-4d13-a96f-fb0c7f4c930f\") " pod="kube-system/coredns-674b8bbfcf-pfkdh" Nov 1 04:36:25.817462 kubelet[2011]: I1101 04:36:25.817432 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/930f616e-1417-4da3-9618-cb374f34ba9f-whisker-ca-bundle\") pod \"whisker-7df74cf549-xc5dz\" (UID: \"930f616e-1417-4da3-9618-cb374f34ba9f\") " pod="calico-system/whisker-7df74cf549-xc5dz" Nov 1 04:36:25.817663 kubelet[2011]: I1101 04:36:25.817624 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s2gct\" (UniqueName: \"kubernetes.io/projected/a04c514c-f548-4854-abe7-a0adc995c889-kube-api-access-s2gct\") pod \"calico-kube-controllers-6d9b84d64-gh6zn\" (UID: \"a04c514c-f548-4854-abe7-a0adc995c889\") " pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" Nov 1 04:36:25.819193 kubelet[2011]: I1101 04:36:25.819162 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/2dc02a63-186f-4d13-a96f-fb0c7f4c930f-config-volume\") pod \"coredns-674b8bbfcf-pfkdh\" (UID: \"2dc02a63-186f-4d13-a96f-fb0c7f4c930f\") " pod="kube-system/coredns-674b8bbfcf-pfkdh" Nov 1 04:36:25.827791 systemd[1]: Created slice kubepods-burstable-pod657f9ac9_0c7d_43e1_abaf_a7867906be5a.slice. Nov 1 04:36:25.835424 systemd[1]: Created slice kubepods-besteffort-poda04c514c_f548_4854_abe7_a0adc995c889.slice. Nov 1 04:36:25.846008 systemd[1]: Created slice kubepods-burstable-pod2dc02a63_186f_4d13_a96f_fb0c7f4c930f.slice. Nov 1 04:36:25.866104 systemd[1]: Created slice kubepods-besteffort-pod9a35816c_1be0_4aa2_bf66_79617ab8330f.slice. Nov 1 04:36:25.873198 systemd[1]: Created slice kubepods-besteffort-poda466af82_23ad_4581_8753_4ea82dbddbf8.slice. Nov 1 04:36:25.888606 systemd[1]: Created slice kubepods-besteffort-pod25204a16_ec6d_4388_9ea1_9773f8c99782.slice. Nov 1 04:36:25.920472 kubelet[2011]: I1101 04:36:25.920383 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/9a35816c-1be0-4aa2-bf66-79617ab8330f-config\") pod \"goldmane-666569f655-klqkh\" (UID: \"9a35816c-1be0-4aa2-bf66-79617ab8330f\") " pod="calico-system/goldmane-666569f655-klqkh" Nov 1 04:36:25.920472 kubelet[2011]: I1101 04:36:25.920454 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/9a35816c-1be0-4aa2-bf66-79617ab8330f-goldmane-key-pair\") pod \"goldmane-666569f655-klqkh\" (UID: \"9a35816c-1be0-4aa2-bf66-79617ab8330f\") " pod="calico-system/goldmane-666569f655-klqkh" Nov 1 04:36:25.920846 kubelet[2011]: I1101 04:36:25.920489 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fl4cq\" (UniqueName: \"kubernetes.io/projected/9a35816c-1be0-4aa2-bf66-79617ab8330f-kube-api-access-fl4cq\") pod \"goldmane-666569f655-klqkh\" (UID: \"9a35816c-1be0-4aa2-bf66-79617ab8330f\") " pod="calico-system/goldmane-666569f655-klqkh" Nov 1 04:36:25.920846 kubelet[2011]: I1101 04:36:25.920694 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vsjht\" (UniqueName: \"kubernetes.io/projected/25204a16-ec6d-4388-9ea1-9773f8c99782-kube-api-access-vsjht\") pod \"calico-apiserver-d5d4c457c-bzssw\" (UID: \"25204a16-ec6d-4388-9ea1-9773f8c99782\") " pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" Nov 1 04:36:25.920846 kubelet[2011]: I1101 04:36:25.920755 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9a35816c-1be0-4aa2-bf66-79617ab8330f-goldmane-ca-bundle\") pod \"goldmane-666569f655-klqkh\" (UID: \"9a35816c-1be0-4aa2-bf66-79617ab8330f\") " pod="calico-system/goldmane-666569f655-klqkh" Nov 1 04:36:25.920846 kubelet[2011]: I1101 04:36:25.920793 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/25204a16-ec6d-4388-9ea1-9773f8c99782-calico-apiserver-certs\") pod \"calico-apiserver-d5d4c457c-bzssw\" (UID: \"25204a16-ec6d-4388-9ea1-9773f8c99782\") " pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" Nov 1 04:36:26.099591 systemd[1]: Created slice kubepods-besteffort-podccda356b_9c43_49d4_bc40_aea58a266a51.slice. Nov 1 04:36:26.108605 env[1200]: time="2025-11-01T04:36:26.107872715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xqtpq,Uid:ccda356b-9c43-49d4-bc40-aea58a266a51,Namespace:calico-system,Attempt:0,}" Nov 1 04:36:26.123915 env[1200]: time="2025-11-01T04:36:26.122969392Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7df74cf549-xc5dz,Uid:930f616e-1417-4da3-9618-cb374f34ba9f,Namespace:calico-system,Attempt:0,}" Nov 1 04:36:26.133524 env[1200]: time="2025-11-01T04:36:26.133439802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-p9bjl,Uid:657f9ac9-0c7d-43e1-abaf-a7867906be5a,Namespace:kube-system,Attempt:0,}" Nov 1 04:36:26.142970 env[1200]: time="2025-11-01T04:36:26.142829312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6d9b84d64-gh6zn,Uid:a04c514c-f548-4854-abe7-a0adc995c889,Namespace:calico-system,Attempt:0,}" Nov 1 04:36:26.160236 env[1200]: time="2025-11-01T04:36:26.160179493Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-pfkdh,Uid:2dc02a63-186f-4d13-a96f-fb0c7f4c930f,Namespace:kube-system,Attempt:0,}" Nov 1 04:36:26.176080 env[1200]: time="2025-11-01T04:36:26.176014406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-klqkh,Uid:9a35816c-1be0-4aa2-bf66-79617ab8330f,Namespace:calico-system,Attempt:0,}" Nov 1 04:36:26.187881 env[1200]: time="2025-11-01T04:36:26.187826401Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d5d4c457c-d2k4h,Uid:a466af82-23ad-4581-8753-4ea82dbddbf8,Namespace:calico-apiserver,Attempt:0,}" Nov 1 04:36:26.217645 env[1200]: time="2025-11-01T04:36:26.213582257Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d5d4c457c-bzssw,Uid:25204a16-ec6d-4388-9ea1-9773f8c99782,Namespace:calico-apiserver,Attempt:0,}" Nov 1 04:36:26.400268 env[1200]: time="2025-11-01T04:36:26.395470226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Nov 1 04:36:26.469067 env[1200]: time="2025-11-01T04:36:26.468971265Z" level=error msg="Failed to destroy network for sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.469598 env[1200]: time="2025-11-01T04:36:26.469550132Z" level=error msg="encountered an error cleaning up failed sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.469695 env[1200]: time="2025-11-01T04:36:26.469628750Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xqtpq,Uid:ccda356b-9c43-49d4-bc40-aea58a266a51,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.471697 kubelet[2011]: E1101 04:36:26.471493 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.472344 kubelet[2011]: E1101 04:36:26.472247 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xqtpq" Nov 1 04:36:26.473780 kubelet[2011]: E1101 04:36:26.473289 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xqtpq" Nov 1 04:36:26.473780 kubelet[2011]: E1101 04:36:26.473393 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xqtpq_calico-system(ccda356b-9c43-49d4-bc40-aea58a266a51)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xqtpq_calico-system(ccda356b-9c43-49d4-bc40-aea58a266a51)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:26.541803 env[1200]: time="2025-11-01T04:36:26.541693113Z" level=error msg="Failed to destroy network for sandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.542305 env[1200]: time="2025-11-01T04:36:26.542250627Z" level=error msg="encountered an error cleaning up failed sandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.542461 env[1200]: time="2025-11-01T04:36:26.542339288Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-p9bjl,Uid:657f9ac9-0c7d-43e1-abaf-a7867906be5a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.544772 kubelet[2011]: E1101 04:36:26.542922 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.544772 kubelet[2011]: E1101 04:36:26.543015 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-p9bjl" Nov 1 04:36:26.544772 kubelet[2011]: E1101 04:36:26.543051 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-p9bjl" Nov 1 04:36:26.545109 kubelet[2011]: E1101 04:36:26.543177 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-p9bjl_kube-system(657f9ac9-0c7d-43e1-abaf-a7867906be5a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-p9bjl_kube-system(657f9ac9-0c7d-43e1-abaf-a7867906be5a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-p9bjl" podUID="657f9ac9-0c7d-43e1-abaf-a7867906be5a" Nov 1 04:36:26.568864 env[1200]: time="2025-11-01T04:36:26.568729807Z" level=error msg="Failed to destroy network for sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.569371 env[1200]: time="2025-11-01T04:36:26.569295993Z" level=error msg="encountered an error cleaning up failed sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.569522 env[1200]: time="2025-11-01T04:36:26.569388149Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7df74cf549-xc5dz,Uid:930f616e-1417-4da3-9618-cb374f34ba9f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.570430 kubelet[2011]: E1101 04:36:26.569935 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.570430 kubelet[2011]: E1101 04:36:26.570036 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-7df74cf549-xc5dz" Nov 1 04:36:26.570430 kubelet[2011]: E1101 04:36:26.570082 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-7df74cf549-xc5dz" Nov 1 04:36:26.570711 kubelet[2011]: E1101 04:36:26.570206 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-7df74cf549-xc5dz_calico-system(930f616e-1417-4da3-9618-cb374f34ba9f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-7df74cf549-xc5dz_calico-system(930f616e-1417-4da3-9618-cb374f34ba9f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-7df74cf549-xc5dz" podUID="930f616e-1417-4da3-9618-cb374f34ba9f" Nov 1 04:36:26.609716 env[1200]: time="2025-11-01T04:36:26.609623728Z" level=error msg="Failed to destroy network for sandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.610418 env[1200]: time="2025-11-01T04:36:26.610220501Z" level=error msg="encountered an error cleaning up failed sandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.610418 env[1200]: time="2025-11-01T04:36:26.610286984Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6d9b84d64-gh6zn,Uid:a04c514c-f548-4854-abe7-a0adc995c889,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.612655 kubelet[2011]: E1101 04:36:26.610808 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.612655 kubelet[2011]: E1101 04:36:26.610900 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" Nov 1 04:36:26.612655 kubelet[2011]: E1101 04:36:26.610934 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" Nov 1 04:36:26.614295 kubelet[2011]: E1101 04:36:26.611084 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6d9b84d64-gh6zn_calico-system(a04c514c-f548-4854-abe7-a0adc995c889)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6d9b84d64-gh6zn_calico-system(a04c514c-f548-4854-abe7-a0adc995c889)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" podUID="a04c514c-f548-4854-abe7-a0adc995c889" Nov 1 04:36:26.626954 env[1200]: time="2025-11-01T04:36:26.626874204Z" level=error msg="Failed to destroy network for sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.627692 env[1200]: time="2025-11-01T04:36:26.627645581Z" level=error msg="encountered an error cleaning up failed sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.628156 env[1200]: time="2025-11-01T04:36:26.628086493Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-pfkdh,Uid:2dc02a63-186f-4d13-a96f-fb0c7f4c930f,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.629819 kubelet[2011]: E1101 04:36:26.628491 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.629819 kubelet[2011]: E1101 04:36:26.628574 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-pfkdh" Nov 1 04:36:26.629819 kubelet[2011]: E1101 04:36:26.628610 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-pfkdh" Nov 1 04:36:26.630105 kubelet[2011]: E1101 04:36:26.628680 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-pfkdh_kube-system(2dc02a63-186f-4d13-a96f-fb0c7f4c930f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-pfkdh_kube-system(2dc02a63-186f-4d13-a96f-fb0c7f4c930f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-pfkdh" podUID="2dc02a63-186f-4d13-a96f-fb0c7f4c930f" Nov 1 04:36:26.671952 env[1200]: time="2025-11-01T04:36:26.671710727Z" level=error msg="Failed to destroy network for sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.678288 env[1200]: time="2025-11-01T04:36:26.674498561Z" level=error msg="encountered an error cleaning up failed sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.678288 env[1200]: time="2025-11-01T04:36:26.674576101Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-klqkh,Uid:9a35816c-1be0-4aa2-bf66-79617ab8330f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.678565 kubelet[2011]: E1101 04:36:26.677833 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.678565 kubelet[2011]: E1101 04:36:26.677940 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-klqkh" Nov 1 04:36:26.678565 kubelet[2011]: E1101 04:36:26.677974 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-klqkh" Nov 1 04:36:26.676624 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a-shm.mount: Deactivated successfully. Nov 1 04:36:26.682670 kubelet[2011]: E1101 04:36:26.679154 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-666569f655-klqkh_calico-system(9a35816c-1be0-4aa2-bf66-79617ab8330f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-666569f655-klqkh_calico-system(9a35816c-1be0-4aa2-bf66-79617ab8330f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-klqkh" podUID="9a35816c-1be0-4aa2-bf66-79617ab8330f" Nov 1 04:36:26.694795 env[1200]: time="2025-11-01T04:36:26.694698492Z" level=error msg="Failed to destroy network for sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.702366 env[1200]: time="2025-11-01T04:36:26.695266784Z" level=error msg="encountered an error cleaning up failed sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.702366 env[1200]: time="2025-11-01T04:36:26.695347178Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d5d4c457c-bzssw,Uid:25204a16-ec6d-4388-9ea1-9773f8c99782,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.702609 kubelet[2011]: E1101 04:36:26.699302 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.702609 kubelet[2011]: E1101 04:36:26.699396 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" Nov 1 04:36:26.702609 kubelet[2011]: E1101 04:36:26.699438 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" Nov 1 04:36:26.697906 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd-shm.mount: Deactivated successfully. Nov 1 04:36:26.702951 kubelet[2011]: E1101 04:36:26.699556 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-d5d4c457c-bzssw_calico-apiserver(25204a16-ec6d-4388-9ea1-9773f8c99782)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-d5d4c457c-bzssw_calico-apiserver(25204a16-ec6d-4388-9ea1-9773f8c99782)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" podUID="25204a16-ec6d-4388-9ea1-9773f8c99782" Nov 1 04:36:26.706782 env[1200]: time="2025-11-01T04:36:26.706674901Z" level=error msg="Failed to destroy network for sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.711292 env[1200]: time="2025-11-01T04:36:26.707211317Z" level=error msg="encountered an error cleaning up failed sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.711292 env[1200]: time="2025-11-01T04:36:26.707281002Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d5d4c457c-d2k4h,Uid:a466af82-23ad-4581-8753-4ea82dbddbf8,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.709839 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935-shm.mount: Deactivated successfully. Nov 1 04:36:26.712140 kubelet[2011]: E1101 04:36:26.707510 2011 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:26.712140 kubelet[2011]: E1101 04:36:26.707585 2011 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" Nov 1 04:36:26.712140 kubelet[2011]: E1101 04:36:26.707617 2011 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" Nov 1 04:36:26.712501 kubelet[2011]: E1101 04:36:26.707683 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-d5d4c457c-d2k4h_calico-apiserver(a466af82-23ad-4581-8753-4ea82dbddbf8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-d5d4c457c-d2k4h_calico-apiserver(a466af82-23ad-4581-8753-4ea82dbddbf8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8" Nov 1 04:36:27.382852 kubelet[2011]: I1101 04:36:27.382049 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:36:27.384884 kubelet[2011]: I1101 04:36:27.384139 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:36:27.386718 env[1200]: time="2025-11-01T04:36:27.386623428Z" level=info msg="StopPodSandbox for \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\"" Nov 1 04:36:27.387923 env[1200]: time="2025-11-01T04:36:27.386543724Z" level=info msg="StopPodSandbox for \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\"" Nov 1 04:36:27.388143 kubelet[2011]: I1101 04:36:27.388036 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:27.390277 env[1200]: time="2025-11-01T04:36:27.390233849Z" level=info msg="StopPodSandbox for \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\"" Nov 1 04:36:27.394367 kubelet[2011]: I1101 04:36:27.394328 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:36:27.397190 env[1200]: time="2025-11-01T04:36:27.395520944Z" level=info msg="StopPodSandbox for \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\"" Nov 1 04:36:27.401783 kubelet[2011]: I1101 04:36:27.401081 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:36:27.408358 env[1200]: time="2025-11-01T04:36:27.408302743Z" level=info msg="StopPodSandbox for \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\"" Nov 1 04:36:27.413793 kubelet[2011]: I1101 04:36:27.411104 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:27.413948 env[1200]: time="2025-11-01T04:36:27.413860928Z" level=info msg="StopPodSandbox for \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\"" Nov 1 04:36:27.416401 kubelet[2011]: I1101 04:36:27.415999 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:27.418462 env[1200]: time="2025-11-01T04:36:27.418014679Z" level=info msg="StopPodSandbox for \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\"" Nov 1 04:36:27.422227 kubelet[2011]: I1101 04:36:27.422188 2011 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:36:27.425784 env[1200]: time="2025-11-01T04:36:27.425723202Z" level=info msg="StopPodSandbox for \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\"" Nov 1 04:36:27.615566 env[1200]: time="2025-11-01T04:36:27.615383114Z" level=error msg="StopPodSandbox for \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\" failed" error="failed to destroy network for sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:27.617069 kubelet[2011]: E1101 04:36:27.617001 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:36:27.617276 kubelet[2011]: E1101 04:36:27.617134 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30"} Nov 1 04:36:27.617343 kubelet[2011]: E1101 04:36:27.617298 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ccda356b-9c43-49d4-bc40-aea58a266a51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:27.617514 kubelet[2011]: E1101 04:36:27.617341 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ccda356b-9c43-49d4-bc40-aea58a266a51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:27.633577 env[1200]: time="2025-11-01T04:36:27.633304275Z" level=error msg="StopPodSandbox for \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\" failed" error="failed to destroy network for sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:27.634836 kubelet[2011]: E1101 04:36:27.634775 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:36:27.635438 kubelet[2011]: E1101 04:36:27.634855 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd"} Nov 1 04:36:27.635438 kubelet[2011]: E1101 04:36:27.634958 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25204a16-ec6d-4388-9ea1-9773f8c99782\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:27.635438 kubelet[2011]: E1101 04:36:27.635015 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25204a16-ec6d-4388-9ea1-9773f8c99782\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" podUID="25204a16-ec6d-4388-9ea1-9773f8c99782" Nov 1 04:36:27.645861 env[1200]: time="2025-11-01T04:36:27.645778798Z" level=error msg="StopPodSandbox for \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\" failed" error="failed to destroy network for sandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:27.646199 kubelet[2011]: E1101 04:36:27.646133 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:27.646310 kubelet[2011]: E1101 04:36:27.646225 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a"} Nov 1 04:36:27.646310 kubelet[2011]: E1101 04:36:27.646295 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"657f9ac9-0c7d-43e1-abaf-a7867906be5a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:27.646495 kubelet[2011]: E1101 04:36:27.646331 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"657f9ac9-0c7d-43e1-abaf-a7867906be5a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-p9bjl" podUID="657f9ac9-0c7d-43e1-abaf-a7867906be5a" Nov 1 04:36:27.660640 env[1200]: time="2025-11-01T04:36:27.660553983Z" level=error msg="StopPodSandbox for \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\" failed" error="failed to destroy network for sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:27.661172 kubelet[2011]: E1101 04:36:27.661095 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:36:27.661305 kubelet[2011]: E1101 04:36:27.661193 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a"} Nov 1 04:36:27.661305 kubelet[2011]: E1101 04:36:27.661257 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9a35816c-1be0-4aa2-bf66-79617ab8330f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:27.661499 kubelet[2011]: E1101 04:36:27.661294 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9a35816c-1be0-4aa2-bf66-79617ab8330f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-klqkh" podUID="9a35816c-1be0-4aa2-bf66-79617ab8330f" Nov 1 04:36:27.666625 env[1200]: time="2025-11-01T04:36:27.666539708Z" level=error msg="StopPodSandbox for \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\" failed" error="failed to destroy network for sandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:27.667280 kubelet[2011]: E1101 04:36:27.666971 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:27.667280 kubelet[2011]: E1101 04:36:27.667050 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d"} Nov 1 04:36:27.667280 kubelet[2011]: E1101 04:36:27.667160 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a04c514c-f548-4854-abe7-a0adc995c889\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:27.667280 kubelet[2011]: E1101 04:36:27.667234 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a04c514c-f548-4854-abe7-a0adc995c889\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" podUID="a04c514c-f548-4854-abe7-a0adc995c889" Nov 1 04:36:27.671754 env[1200]: time="2025-11-01T04:36:27.671674916Z" level=error msg="StopPodSandbox for \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\" failed" error="failed to destroy network for sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:27.672005 kubelet[2011]: E1101 04:36:27.671941 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:36:27.672164 kubelet[2011]: E1101 04:36:27.672000 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935"} Nov 1 04:36:27.672164 kubelet[2011]: E1101 04:36:27.672045 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a466af82-23ad-4581-8753-4ea82dbddbf8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:27.672164 kubelet[2011]: E1101 04:36:27.672077 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a466af82-23ad-4581-8753-4ea82dbddbf8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8" Nov 1 04:36:27.679429 env[1200]: time="2025-11-01T04:36:27.679344509Z" level=error msg="StopPodSandbox for \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\" failed" error="failed to destroy network for sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:27.680304 kubelet[2011]: E1101 04:36:27.679890 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:36:27.680304 kubelet[2011]: E1101 04:36:27.679995 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef"} Nov 1 04:36:27.680304 kubelet[2011]: E1101 04:36:27.680073 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2dc02a63-186f-4d13-a96f-fb0c7f4c930f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:27.680304 kubelet[2011]: E1101 04:36:27.680154 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2dc02a63-186f-4d13-a96f-fb0c7f4c930f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-pfkdh" podUID="2dc02a63-186f-4d13-a96f-fb0c7f4c930f" Nov 1 04:36:27.683360 env[1200]: time="2025-11-01T04:36:27.683304881Z" level=error msg="StopPodSandbox for \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\" failed" error="failed to destroy network for sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:27.683717 kubelet[2011]: E1101 04:36:27.683653 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:27.683885 kubelet[2011]: E1101 04:36:27.683724 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4"} Nov 1 04:36:27.683885 kubelet[2011]: E1101 04:36:27.683787 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"930f616e-1417-4da3-9618-cb374f34ba9f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:27.683885 kubelet[2011]: E1101 04:36:27.683822 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"930f616e-1417-4da3-9618-cb374f34ba9f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-7df74cf549-xc5dz" podUID="930f616e-1417-4da3-9618-cb374f34ba9f" Nov 1 04:36:33.516922 kubelet[2011]: I1101 04:36:33.514936 2011 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Nov 1 04:36:33.664000 audit[3080]: NETFILTER_CFG table=filter:103 family=2 entries=21 op=nft_register_rule pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:33.669629 kernel: kauditd_printk_skb: 34 callbacks suppressed Nov 1 04:36:33.670061 kernel: audit: type=1325 audit(1761971793.664:1032): table=filter:103 family=2 entries=21 op=nft_register_rule pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:33.664000 audit[3080]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffef42e220 a2=0 a3=7fffef42e20c items=0 ppid=2119 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:33.679484 kernel: audit: type=1300 audit(1761971793.664:1032): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffef42e220 a2=0 a3=7fffef42e20c items=0 ppid=2119 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:33.679979 kernel: audit: type=1327 audit(1761971793.664:1032): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:33.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:33.683000 audit[3080]: NETFILTER_CFG table=nat:104 family=2 entries=19 op=nft_register_chain pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:33.697623 kernel: audit: type=1325 audit(1761971793.683:1033): table=nat:104 family=2 entries=19 op=nft_register_chain pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:33.697748 kernel: audit: type=1300 audit(1761971793.683:1033): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fffef42e220 a2=0 a3=7fffef42e20c items=0 ppid=2119 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:33.683000 audit[3080]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fffef42e220 a2=0 a3=7fffef42e20c items=0 ppid=2119 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:33.701910 kernel: audit: type=1327 audit(1761971793.683:1033): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:33.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:38.092898 env[1200]: time="2025-11-01T04:36:38.092697533Z" level=info msg="StopPodSandbox for \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\"" Nov 1 04:36:38.108247 env[1200]: time="2025-11-01T04:36:38.108168447Z" level=info msg="StopPodSandbox for \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\"" Nov 1 04:36:38.115426 env[1200]: time="2025-11-01T04:36:38.108437055Z" level=info msg="StopPodSandbox for \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\"" Nov 1 04:36:38.226221 env[1200]: time="2025-11-01T04:36:38.223818999Z" level=error msg="StopPodSandbox for \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\" failed" error="failed to destroy network for sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:38.226590 kubelet[2011]: E1101 04:36:38.226203 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:36:38.226590 kubelet[2011]: E1101 04:36:38.226411 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a"} Nov 1 04:36:38.226590 kubelet[2011]: E1101 04:36:38.226485 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9a35816c-1be0-4aa2-bf66-79617ab8330f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:38.226590 kubelet[2011]: E1101 04:36:38.226543 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9a35816c-1be0-4aa2-bf66-79617ab8330f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-klqkh" podUID="9a35816c-1be0-4aa2-bf66-79617ab8330f" Nov 1 04:36:38.252214 env[1200]: time="2025-11-01T04:36:38.252082162Z" level=error msg="StopPodSandbox for \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\" failed" error="failed to destroy network for sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:38.252953 kubelet[2011]: E1101 04:36:38.252826 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:36:38.252953 kubelet[2011]: E1101 04:36:38.252944 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30"} Nov 1 04:36:38.253672 kubelet[2011]: E1101 04:36:38.253006 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ccda356b-9c43-49d4-bc40-aea58a266a51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:38.253672 kubelet[2011]: E1101 04:36:38.253053 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ccda356b-9c43-49d4-bc40-aea58a266a51\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:38.263862 env[1200]: time="2025-11-01T04:36:38.263755921Z" level=error msg="StopPodSandbox for \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\" failed" error="failed to destroy network for sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:38.264567 kubelet[2011]: E1101 04:36:38.264499 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:36:38.264695 kubelet[2011]: E1101 04:36:38.264596 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935"} Nov 1 04:36:38.264695 kubelet[2011]: E1101 04:36:38.264653 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a466af82-23ad-4581-8753-4ea82dbddbf8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:38.267594 kubelet[2011]: E1101 04:36:38.264697 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a466af82-23ad-4581-8753-4ea82dbddbf8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8" Nov 1 04:36:38.838482 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount673776216.mount: Deactivated successfully. Nov 1 04:36:38.895677 env[1200]: time="2025-11-01T04:36:38.895339536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:38.897462 env[1200]: time="2025-11-01T04:36:38.897426738Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:38.899561 env[1200]: time="2025-11-01T04:36:38.899526298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:38.900946 env[1200]: time="2025-11-01T04:36:38.900871500Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Nov 1 04:36:38.901997 env[1200]: time="2025-11-01T04:36:38.901882136Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Nov 1 04:36:38.965090 env[1200]: time="2025-11-01T04:36:38.965012497Z" level=info msg="CreateContainer within sandbox \"7e753be9ab9a6dccf3034d59aaf916e13a6578695a13060693fa78b56ceb8256\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Nov 1 04:36:39.008124 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1668952896.mount: Deactivated successfully. Nov 1 04:36:39.014809 env[1200]: time="2025-11-01T04:36:39.014739684Z" level=info msg="CreateContainer within sandbox \"7e753be9ab9a6dccf3034d59aaf916e13a6578695a13060693fa78b56ceb8256\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e94866dd2eac4a2d9e9bdc40f6693a84a986f175738a6ef5840ae4839d9ad10c\"" Nov 1 04:36:39.017411 env[1200]: time="2025-11-01T04:36:39.015975572Z" level=info msg="StartContainer for \"e94866dd2eac4a2d9e9bdc40f6693a84a986f175738a6ef5840ae4839d9ad10c\"" Nov 1 04:36:39.052721 systemd[1]: Started cri-containerd-e94866dd2eac4a2d9e9bdc40f6693a84a986f175738a6ef5840ae4839d9ad10c.scope. Nov 1 04:36:39.101131 env[1200]: time="2025-11-01T04:36:39.100554201Z" level=info msg="StopPodSandbox for \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\"" Nov 1 04:36:39.101748 env[1200]: time="2025-11-01T04:36:39.101626536Z" level=info msg="StopPodSandbox for \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\"" Nov 1 04:36:39.104104 env[1200]: time="2025-11-01T04:36:39.103997128Z" level=info msg="StopPodSandbox for \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\"" Nov 1 04:36:39.103000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.120397 kernel: audit: type=1400 audit(1761971799.103:1034): avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.120555 kernel: audit: type=1300 audit(1761971799.103:1034): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fddddf837c8 items=0 ppid=2489 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:39.103000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fddddf837c8 items=0 ppid=2489 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:39.171746 kernel: audit: type=1327 audit(1761971799.103:1034): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343836366464326561633461326439653962646334306636363933 Nov 1 04:36:39.189194 kernel: audit: type=1400 audit(1761971799.103:1035): avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.189302 kernel: audit: type=1400 audit(1761971799.103:1035): avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.189351 kernel: audit: type=1400 audit(1761971799.103:1035): avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.189404 kernel: audit: type=1400 audit(1761971799.103:1035): avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343836366464326561633461326439653962646334306636363933 Nov 1 04:36:39.103000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.103000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.103000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.103000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.103000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.200533 kernel: audit: type=1400 audit(1761971799.103:1035): avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.200682 kernel: audit: type=1400 audit(1761971799.103:1035): avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.103000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.103000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.215237 kernel: audit: type=1400 audit(1761971799.103:1035): avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.103000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.103000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.103000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.103000 audit: BPF prog-id=136 op=LOAD Nov 1 04:36:39.103000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002afbd8 items=0 ppid=2489 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:39.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343836366464326561633461326439653962646334306636363933 Nov 1 04:36:39.117000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.117000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.117000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.117000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.117000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.117000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.117000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.117000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.117000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.117000 audit: BPF prog-id=137 op=LOAD Nov 1 04:36:39.117000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002afc28 items=0 ppid=2489 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:39.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343836366464326561633461326439653962646334306636363933 Nov 1 04:36:39.119000 audit: BPF prog-id=137 op=UNLOAD Nov 1 04:36:39.119000 audit: BPF prog-id=136 op=UNLOAD Nov 1 04:36:39.119000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.119000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.119000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.119000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.119000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.119000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.119000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.119000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.119000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.119000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:39.119000 audit: BPF prog-id=138 op=LOAD Nov 1 04:36:39.119000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002afcb8 items=0 ppid=2489 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:39.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539343836366464326561633461326439653962646334306636363933 Nov 1 04:36:39.253697 env[1200]: time="2025-11-01T04:36:39.253622217Z" level=info msg="StartContainer for \"e94866dd2eac4a2d9e9bdc40f6693a84a986f175738a6ef5840ae4839d9ad10c\" returns successfully" Nov 1 04:36:39.339986 env[1200]: time="2025-11-01T04:36:39.339850731Z" level=error msg="StopPodSandbox for \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\" failed" error="failed to destroy network for sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:39.340720 kubelet[2011]: E1101 04:36:39.340650 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:36:39.341314 kubelet[2011]: E1101 04:36:39.340739 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef"} Nov 1 04:36:39.341314 kubelet[2011]: E1101 04:36:39.340816 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2dc02a63-186f-4d13-a96f-fb0c7f4c930f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:39.341314 kubelet[2011]: E1101 04:36:39.340858 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2dc02a63-186f-4d13-a96f-fb0c7f4c930f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-pfkdh" podUID="2dc02a63-186f-4d13-a96f-fb0c7f4c930f" Nov 1 04:36:39.345189 env[1200]: time="2025-11-01T04:36:39.345067020Z" level=error msg="StopPodSandbox for \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\" failed" error="failed to destroy network for sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:39.346841 kubelet[2011]: E1101 04:36:39.346541 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:36:39.346841 kubelet[2011]: E1101 04:36:39.346680 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd"} Nov 1 04:36:39.346841 kubelet[2011]: E1101 04:36:39.346744 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25204a16-ec6d-4388-9ea1-9773f8c99782\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:39.346841 kubelet[2011]: E1101 04:36:39.346782 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25204a16-ec6d-4388-9ea1-9773f8c99782\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" podUID="25204a16-ec6d-4388-9ea1-9773f8c99782" Nov 1 04:36:39.358763 env[1200]: time="2025-11-01T04:36:39.355823860Z" level=error msg="StopPodSandbox for \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\" failed" error="failed to destroy network for sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Nov 1 04:36:39.358989 kubelet[2011]: E1101 04:36:39.356386 2011 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:39.358989 kubelet[2011]: E1101 04:36:39.356515 2011 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4"} Nov 1 04:36:39.358989 kubelet[2011]: E1101 04:36:39.356568 2011 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"930f616e-1417-4da3-9618-cb374f34ba9f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Nov 1 04:36:39.358989 kubelet[2011]: E1101 04:36:39.356633 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"930f616e-1417-4da3-9618-cb374f34ba9f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-7df74cf549-xc5dz" podUID="930f616e-1417-4da3-9618-cb374f34ba9f" Nov 1 04:36:39.521603 kubelet[2011]: I1101 04:36:39.517984 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-ppnfh" podStartSLOduration=1.308464498 podStartE2EDuration="29.514060815s" podCreationTimestamp="2025-11-01 04:36:10 +0000 UTC" firstStartedPulling="2025-11-01 04:36:10.697710728 +0000 UTC m=+23.966300131" lastFinishedPulling="2025-11-01 04:36:38.903307045 +0000 UTC m=+52.171896448" observedRunningTime="2025-11-01 04:36:39.513010183 +0000 UTC m=+52.781599598" watchObservedRunningTime="2025-11-01 04:36:39.514060815 +0000 UTC m=+52.782650231" Nov 1 04:36:39.851823 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Nov 1 04:36:39.852142 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Nov 1 04:36:40.094584 env[1200]: time="2025-11-01T04:36:40.094501520Z" level=info msg="StopPodSandbox for \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\"" Nov 1 04:36:40.267023 env[1200]: time="2025-11-01T04:36:40.266870962Z" level=info msg="StopPodSandbox for \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\"" Nov 1 04:36:40.560212 systemd[1]: run-containerd-runc-k8s.io-e94866dd2eac4a2d9e9bdc40f6693a84a986f175738a6ef5840ae4839d9ad10c-runc.aEFLm5.mount: Deactivated successfully. Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.263 [INFO][3258] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.264 [INFO][3258] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" iface="eth0" netns="/var/run/netns/cni-8cb602bf-b33b-6c2b-75f8-4f676bb97b55" Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.264 [INFO][3258] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" iface="eth0" netns="/var/run/netns/cni-8cb602bf-b33b-6c2b-75f8-4f676bb97b55" Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.268 [INFO][3258] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" iface="eth0" netns="/var/run/netns/cni-8cb602bf-b33b-6c2b-75f8-4f676bb97b55" Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.268 [INFO][3258] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.268 [INFO][3258] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.626 [INFO][3270] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" HandleID="k8s-pod-network.1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.629 [INFO][3270] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.630 [INFO][3270] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.653 [WARNING][3270] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" HandleID="k8s-pod-network.1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.654 [INFO][3270] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" HandleID="k8s-pod-network.1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.656 [INFO][3270] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:40.661237 env[1200]: 2025-11-01 04:36:40.659 [INFO][3258] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:40.665190 systemd[1]: run-netns-cni\x2d8cb602bf\x2db33b\x2d6c2b\x2d75f8\x2d4f676bb97b55.mount: Deactivated successfully. Nov 1 04:36:40.672076 env[1200]: time="2025-11-01T04:36:40.668034288Z" level=info msg="TearDown network for sandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\" successfully" Nov 1 04:36:40.672076 env[1200]: time="2025-11-01T04:36:40.668091819Z" level=info msg="StopPodSandbox for \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\" returns successfully" Nov 1 04:36:40.673853 env[1200]: time="2025-11-01T04:36:40.673808110Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6d9b84d64-gh6zn,Uid:a04c514c-f548-4854-abe7-a0adc995c889,Namespace:calico-system,Attempt:1,}" Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.455 [INFO][3281] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.455 [INFO][3281] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" iface="eth0" netns="/var/run/netns/cni-d6f100de-eccd-b7e4-bc35-26f4abe11caf" Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.455 [INFO][3281] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" iface="eth0" netns="/var/run/netns/cni-d6f100de-eccd-b7e4-bc35-26f4abe11caf" Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.456 [INFO][3281] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" iface="eth0" netns="/var/run/netns/cni-d6f100de-eccd-b7e4-bc35-26f4abe11caf" Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.456 [INFO][3281] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.456 [INFO][3281] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.626 [INFO][3293] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" HandleID="k8s-pod-network.41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Workload="srv--cigeh.gb1.brightbox.com-k8s-whisker--7df74cf549--xc5dz-eth0" Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.630 [INFO][3293] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.656 [INFO][3293] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.678 [WARNING][3293] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" HandleID="k8s-pod-network.41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Workload="srv--cigeh.gb1.brightbox.com-k8s-whisker--7df74cf549--xc5dz-eth0" Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.678 [INFO][3293] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" HandleID="k8s-pod-network.41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Workload="srv--cigeh.gb1.brightbox.com-k8s-whisker--7df74cf549--xc5dz-eth0" Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.681 [INFO][3293] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:40.687976 env[1200]: 2025-11-01 04:36:40.685 [INFO][3281] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:40.690546 env[1200]: time="2025-11-01T04:36:40.688432949Z" level=info msg="TearDown network for sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\" successfully" Nov 1 04:36:40.690546 env[1200]: time="2025-11-01T04:36:40.688484048Z" level=info msg="StopPodSandbox for \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\" returns successfully" Nov 1 04:36:40.782199 kubelet[2011]: I1101 04:36:40.782149 2011 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/930f616e-1417-4da3-9618-cb374f34ba9f-whisker-ca-bundle\") pod \"930f616e-1417-4da3-9618-cb374f34ba9f\" (UID: \"930f616e-1417-4da3-9618-cb374f34ba9f\") " Nov 1 04:36:40.782936 kubelet[2011]: I1101 04:36:40.782887 2011 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/930f616e-1417-4da3-9618-cb374f34ba9f-whisker-backend-key-pair\") pod \"930f616e-1417-4da3-9618-cb374f34ba9f\" (UID: \"930f616e-1417-4da3-9618-cb374f34ba9f\") " Nov 1 04:36:40.783138 kubelet[2011]: I1101 04:36:40.783084 2011 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-l4fcd\" (UniqueName: \"kubernetes.io/projected/930f616e-1417-4da3-9618-cb374f34ba9f-kube-api-access-l4fcd\") pod \"930f616e-1417-4da3-9618-cb374f34ba9f\" (UID: \"930f616e-1417-4da3-9618-cb374f34ba9f\") " Nov 1 04:36:40.801479 kubelet[2011]: I1101 04:36:40.800166 2011 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/930f616e-1417-4da3-9618-cb374f34ba9f-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "930f616e-1417-4da3-9618-cb374f34ba9f" (UID: "930f616e-1417-4da3-9618-cb374f34ba9f"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Nov 1 04:36:40.801837 kubelet[2011]: I1101 04:36:40.800329 2011 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/930f616e-1417-4da3-9618-cb374f34ba9f-kube-api-access-l4fcd" (OuterVolumeSpecName: "kube-api-access-l4fcd") pod "930f616e-1417-4da3-9618-cb374f34ba9f" (UID: "930f616e-1417-4da3-9618-cb374f34ba9f"). InnerVolumeSpecName "kube-api-access-l4fcd". PluginName "kubernetes.io/projected", VolumeGIDValue "" Nov 1 04:36:40.809153 kubelet[2011]: I1101 04:36:40.806314 2011 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/930f616e-1417-4da3-9618-cb374f34ba9f-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "930f616e-1417-4da3-9618-cb374f34ba9f" (UID: "930f616e-1417-4da3-9618-cb374f34ba9f"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Nov 1 04:36:40.838571 systemd[1]: run-netns-cni\x2dd6f100de\x2deccd\x2db7e4\x2dbc35\x2d26f4abe11caf.mount: Deactivated successfully. Nov 1 04:36:40.838748 systemd[1]: var-lib-kubelet-pods-930f616e\x2d1417\x2d4da3\x2d9618\x2dcb374f34ba9f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dl4fcd.mount: Deactivated successfully. Nov 1 04:36:40.838857 systemd[1]: var-lib-kubelet-pods-930f616e\x2d1417\x2d4da3\x2d9618\x2dcb374f34ba9f-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Nov 1 04:36:40.884517 kubelet[2011]: I1101 04:36:40.884457 2011 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/930f616e-1417-4da3-9618-cb374f34ba9f-whisker-ca-bundle\") on node \"srv-cigeh.gb1.brightbox.com\" DevicePath \"\"" Nov 1 04:36:40.884517 kubelet[2011]: I1101 04:36:40.884512 2011 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/930f616e-1417-4da3-9618-cb374f34ba9f-whisker-backend-key-pair\") on node \"srv-cigeh.gb1.brightbox.com\" DevicePath \"\"" Nov 1 04:36:40.884823 kubelet[2011]: I1101 04:36:40.884534 2011 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-l4fcd\" (UniqueName: \"kubernetes.io/projected/930f616e-1417-4da3-9618-cb374f34ba9f-kube-api-access-l4fcd\") on node \"srv-cigeh.gb1.brightbox.com\" DevicePath \"\"" Nov 1 04:36:41.039058 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 04:36:41.039395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali760ee39b091: link becomes ready Nov 1 04:36:41.041103 systemd-networkd[1027]: cali760ee39b091: Link UP Nov 1 04:36:41.041446 systemd-networkd[1027]: cali760ee39b091: Gained carrier Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.779 [INFO][3312] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.813 [INFO][3312] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0 calico-kube-controllers-6d9b84d64- calico-system a04c514c-f548-4854-abe7-a0adc995c889 938 0 2025-11-01 04:36:10 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6d9b84d64 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-cigeh.gb1.brightbox.com calico-kube-controllers-6d9b84d64-gh6zn eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali760ee39b091 [] [] }} ContainerID="f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" Namespace="calico-system" Pod="calico-kube-controllers-6d9b84d64-gh6zn" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-" Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.813 [INFO][3312] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" Namespace="calico-system" Pod="calico-kube-controllers-6d9b84d64-gh6zn" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.886 [INFO][3333] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" HandleID="k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.886 [INFO][3333] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" HandleID="k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4fe0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-cigeh.gb1.brightbox.com", "pod":"calico-kube-controllers-6d9b84d64-gh6zn", "timestamp":"2025-11-01 04:36:40.886529886 +0000 UTC"}, Hostname:"srv-cigeh.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.887 [INFO][3333] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.887 [INFO][3333] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.887 [INFO][3333] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cigeh.gb1.brightbox.com' Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.904 [INFO][3333] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.922 [INFO][3333] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.940 [INFO][3333] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.947 [INFO][3333] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.950 [INFO][3333] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.950 [INFO][3333] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.953 [INFO][3333] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4 Nov 1 04:36:41.068466 env[1200]: 2025-11-01 04:36:40.959 [INFO][3333] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:41.069911 env[1200]: 2025-11-01 04:36:40.964 [ERROR][3333] ipam/customresource.go 184: Error updating resource Key=IPAMBlock(192-168-75-192-26) Name="192-168-75-192-26" Resource="IPAMBlocks" Value=&v3.IPAMBlock{TypeMeta:v1.TypeMeta{Kind:"IPAMBlock", APIVersion:"crd.projectcalico.org/v1"}, ObjectMeta:v1.ObjectMeta{Name:"192-168-75-192-26", GenerateName:"", Namespace:"", SelfLink:"", UID:"", ResourceVersion:"950", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.IPAMBlockSpec{CIDR:"192.168.75.192/26", Affinity:(*string)(0xc000332530), Allocations:[]*int{(*int)(0xc0006647f8), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil), (*int)(nil)}, Unallocated:[]int{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63}, Attributes:[]v3.AllocationAttribute{v3.AllocationAttribute{AttrPrimary:(*string)(0xc0002d4fe0), AttrSecondary:map[string]string{"namespace":"calico-system", "node":"srv-cigeh.gb1.brightbox.com", "pod":"calico-kube-controllers-6d9b84d64-gh6zn", "timestamp":"2025-11-01 04:36:40.886529886 +0000 UTC"}}}, SequenceNumber:0x1873c8047f304052, SequenceNumberForAllocation:map[string]uint64{"0":0x1873c8047f304051}, Deleted:false, DeprecatedStrictAffinity:false}} error=Operation cannot be fulfilled on ipamblocks.crd.projectcalico.org "192-168-75-192-26": the object has been modified; please apply your changes to the latest version and try again Nov 1 04:36:41.069911 env[1200]: 2025-11-01 04:36:40.964 [INFO][3333] ipam/ipam.go 1250: Failed to update block block=192.168.75.192/26 error=update conflict: IPAMBlock(192-168-75-192-26) handle="k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:41.069911 env[1200]: 2025-11-01 04:36:40.989 [INFO][3333] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:41.069911 env[1200]: 2025-11-01 04:36:40.991 [INFO][3333] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4 Nov 1 04:36:41.069911 env[1200]: 2025-11-01 04:36:40.998 [INFO][3333] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:41.069911 env[1200]: 2025-11-01 04:36:41.007 [INFO][3333] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.75.193/26] block=192.168.75.192/26 handle="k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:41.069911 env[1200]: 2025-11-01 04:36:41.008 [INFO][3333] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.193/26] handle="k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:41.069911 env[1200]: 2025-11-01 04:36:41.008 [INFO][3333] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:41.069911 env[1200]: 2025-11-01 04:36:41.008 [INFO][3333] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.75.193/26] IPv6=[] ContainerID="f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" HandleID="k8s-pod-network.f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:41.070578 env[1200]: 2025-11-01 04:36:41.010 [INFO][3312] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" Namespace="calico-system" Pod="calico-kube-controllers-6d9b84d64-gh6zn" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0", GenerateName:"calico-kube-controllers-6d9b84d64-", Namespace:"calico-system", SelfLink:"", UID:"a04c514c-f548-4854-abe7-a0adc995c889", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6d9b84d64", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-6d9b84d64-gh6zn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali760ee39b091", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:41.070578 env[1200]: 2025-11-01 04:36:41.011 [INFO][3312] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.193/32] ContainerID="f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" Namespace="calico-system" Pod="calico-kube-controllers-6d9b84d64-gh6zn" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:41.070578 env[1200]: 2025-11-01 04:36:41.011 [INFO][3312] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali760ee39b091 ContainerID="f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" Namespace="calico-system" Pod="calico-kube-controllers-6d9b84d64-gh6zn" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:41.070578 env[1200]: 2025-11-01 04:36:41.044 [INFO][3312] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" Namespace="calico-system" Pod="calico-kube-controllers-6d9b84d64-gh6zn" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:41.070578 env[1200]: 2025-11-01 04:36:41.049 [INFO][3312] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" Namespace="calico-system" Pod="calico-kube-controllers-6d9b84d64-gh6zn" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0", GenerateName:"calico-kube-controllers-6d9b84d64-", Namespace:"calico-system", SelfLink:"", UID:"a04c514c-f548-4854-abe7-a0adc995c889", ResourceVersion:"938", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6d9b84d64", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4", Pod:"calico-kube-controllers-6d9b84d64-gh6zn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali760ee39b091", MAC:"4a:ad:17:c0:a2:79", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:41.070578 env[1200]: 2025-11-01 04:36:41.065 [INFO][3312] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4" Namespace="calico-system" Pod="calico-kube-controllers-6d9b84d64-gh6zn" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:41.121248 env[1200]: time="2025-11-01T04:36:41.119521227Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:36:41.121527 env[1200]: time="2025-11-01T04:36:41.121470395Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:36:41.121774 env[1200]: time="2025-11-01T04:36:41.121729613Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:36:41.122245 env[1200]: time="2025-11-01T04:36:41.122194832Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4 pid=3363 runtime=io.containerd.runc.v2 Nov 1 04:36:41.124793 systemd[1]: Removed slice kubepods-besteffort-pod930f616e_1417_4da3_9618_cb374f34ba9f.slice. Nov 1 04:36:41.153765 systemd[1]: Started cri-containerd-f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4.scope. Nov 1 04:36:41.170083 systemd[1]: run-containerd-runc-k8s.io-f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4-runc.ws6u9z.mount: Deactivated successfully. Nov 1 04:36:41.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.195000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:36:41.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.195000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0006be3c0 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:36:41.195000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:36:41.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.195000 audit: BPF prog-id=139 op=LOAD Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3363 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:41.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634663334663764353336323131366634346435393939393365373733 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3363 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:41.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634663334663764353336323131366634346435393939393365373733 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit: BPF prog-id=140 op=LOAD Nov 1 04:36:41.196000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000290a50 items=0 ppid=3363 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:41.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634663334663764353336323131366634346435393939393365373733 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit: BPF prog-id=141 op=LOAD Nov 1 04:36:41.196000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000290a98 items=0 ppid=3363 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:41.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634663334663764353336323131366634346435393939393365373733 Nov 1 04:36:41.196000 audit: BPF prog-id=141 op=UNLOAD Nov 1 04:36:41.196000 audit: BPF prog-id=140 op=UNLOAD Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { perfmon } for pid=3374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit[3374]: AVC avc: denied { bpf } for pid=3374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:41.196000 audit: BPF prog-id=142 op=LOAD Nov 1 04:36:41.196000 audit[3374]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000290ea8 items=0 ppid=3363 pid=3374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:41.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634663334663764353336323131366634346435393939393365373733 Nov 1 04:36:41.201000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:36:41.201000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002561dc0 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:36:41.201000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:36:41.252723 env[1200]: time="2025-11-01T04:36:41.252655967Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6d9b84d64-gh6zn,Uid:a04c514c-f548-4854-abe7-a0adc995c889,Namespace:calico-system,Attempt:1,} returns sandbox id \"f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4\"" Nov 1 04:36:41.255498 env[1200]: time="2025-11-01T04:36:41.255449259Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Nov 1 04:36:41.570659 env[1200]: time="2025-11-01T04:36:41.570305411Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:36:41.572498 env[1200]: time="2025-11-01T04:36:41.572196562Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Nov 1 04:36:41.573318 kubelet[2011]: E1101 04:36:41.573238 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 04:36:41.573547 kubelet[2011]: E1101 04:36:41.573504 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 04:36:41.577658 kubelet[2011]: E1101 04:36:41.577521 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-s2gct,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-6d9b84d64-gh6zn_calico-system(a04c514c-f548-4854-abe7-a0adc995c889): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Nov 1 04:36:41.579192 kubelet[2011]: E1101 04:36:41.579095 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" podUID="a04c514c-f548-4854-abe7-a0adc995c889" Nov 1 04:36:41.645666 systemd[1]: Created slice kubepods-besteffort-pod1f970c1e_fc1f_4851_ac5c_128a20d86234.slice. Nov 1 04:36:41.693520 kubelet[2011]: I1101 04:36:41.693463 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1f970c1e-fc1f-4851-ac5c-128a20d86234-whisker-ca-bundle\") pod \"whisker-6cbc5bd78f-jgqrs\" (UID: \"1f970c1e-fc1f-4851-ac5c-128a20d86234\") " pod="calico-system/whisker-6cbc5bd78f-jgqrs" Nov 1 04:36:41.693883 kubelet[2011]: I1101 04:36:41.693850 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/1f970c1e-fc1f-4851-ac5c-128a20d86234-whisker-backend-key-pair\") pod \"whisker-6cbc5bd78f-jgqrs\" (UID: \"1f970c1e-fc1f-4851-ac5c-128a20d86234\") " pod="calico-system/whisker-6cbc5bd78f-jgqrs" Nov 1 04:36:41.694141 kubelet[2011]: I1101 04:36:41.694075 2011 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bw556\" (UniqueName: \"kubernetes.io/projected/1f970c1e-fc1f-4851-ac5c-128a20d86234-kube-api-access-bw556\") pod \"whisker-6cbc5bd78f-jgqrs\" (UID: \"1f970c1e-fc1f-4851-ac5c-128a20d86234\") " pod="calico-system/whisker-6cbc5bd78f-jgqrs" Nov 1 04:36:41.957489 env[1200]: time="2025-11-01T04:36:41.956702626Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6cbc5bd78f-jgqrs,Uid:1f970c1e-fc1f-4851-ac5c-128a20d86234,Namespace:calico-system,Attempt:0,}" Nov 1 04:36:42.094492 env[1200]: time="2025-11-01T04:36:42.094432624Z" level=info msg="StopPodSandbox for \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\"" Nov 1 04:36:42.176024 systemd-networkd[1027]: calic6e89b0ac05: Link UP Nov 1 04:36:42.182502 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 04:36:42.182624 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic6e89b0ac05: link becomes ready Nov 1 04:36:42.182653 systemd-networkd[1027]: calic6e89b0ac05: Gained carrier Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.020 [INFO][3403] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.047 [INFO][3403] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0 whisker-6cbc5bd78f- calico-system 1f970c1e-fc1f-4851-ac5c-128a20d86234 981 0 2025-11-01 04:36:41 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:6cbc5bd78f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s srv-cigeh.gb1.brightbox.com whisker-6cbc5bd78f-jgqrs eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calic6e89b0ac05 [] [] }} ContainerID="ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" Namespace="calico-system" Pod="whisker-6cbc5bd78f-jgqrs" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-" Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.047 [INFO][3403] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" Namespace="calico-system" Pod="whisker-6cbc5bd78f-jgqrs" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0" Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.101 [INFO][3416] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" HandleID="k8s-pod-network.ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" Workload="srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0" Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.101 [INFO][3416] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" HandleID="k8s-pod-network.ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" Workload="srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00026e050), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-cigeh.gb1.brightbox.com", "pod":"whisker-6cbc5bd78f-jgqrs", "timestamp":"2025-11-01 04:36:42.101699464 +0000 UTC"}, Hostname:"srv-cigeh.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.102 [INFO][3416] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.102 [INFO][3416] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.102 [INFO][3416] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cigeh.gb1.brightbox.com' Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.114 [INFO][3416] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.124 [INFO][3416] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.131 [INFO][3416] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.134 [INFO][3416] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.137 [INFO][3416] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.137 [INFO][3416] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.140 [INFO][3416] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.151 [INFO][3416] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.167 [INFO][3416] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.75.194/26] block=192.168.75.192/26 handle="k8s-pod-network.ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.167 [INFO][3416] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.194/26] handle="k8s-pod-network.ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.167 [INFO][3416] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:42.225527 env[1200]: 2025-11-01 04:36:42.168 [INFO][3416] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.75.194/26] IPv6=[] ContainerID="ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" HandleID="k8s-pod-network.ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" Workload="srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0" Nov 1 04:36:42.227000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:36:42.227000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c005f59680 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:36:42.227000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:36:42.233000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:36:42.233000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0076c8060 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:36:42.233000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:36:42.236674 env[1200]: 2025-11-01 04:36:42.171 [INFO][3403] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" Namespace="calico-system" Pod="whisker-6cbc5bd78f-jgqrs" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0", GenerateName:"whisker-6cbc5bd78f-", Namespace:"calico-system", SelfLink:"", UID:"1f970c1e-fc1f-4851-ac5c-128a20d86234", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6cbc5bd78f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"", Pod:"whisker-6cbc5bd78f-jgqrs", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calic6e89b0ac05", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:42.236674 env[1200]: 2025-11-01 04:36:42.171 [INFO][3403] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.194/32] ContainerID="ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" Namespace="calico-system" Pod="whisker-6cbc5bd78f-jgqrs" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0" Nov 1 04:36:42.236674 env[1200]: 2025-11-01 04:36:42.171 [INFO][3403] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic6e89b0ac05 ContainerID="ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" Namespace="calico-system" Pod="whisker-6cbc5bd78f-jgqrs" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0" Nov 1 04:36:42.236674 env[1200]: 2025-11-01 04:36:42.185 [INFO][3403] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" Namespace="calico-system" Pod="whisker-6cbc5bd78f-jgqrs" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0" Nov 1 04:36:42.236674 env[1200]: 2025-11-01 04:36:42.191 [INFO][3403] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" Namespace="calico-system" Pod="whisker-6cbc5bd78f-jgqrs" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0", GenerateName:"whisker-6cbc5bd78f-", Namespace:"calico-system", SelfLink:"", UID:"1f970c1e-fc1f-4851-ac5c-128a20d86234", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6cbc5bd78f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a", Pod:"whisker-6cbc5bd78f-jgqrs", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.75.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calic6e89b0ac05", MAC:"5e:48:ae:cf:02:ae", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:42.236674 env[1200]: 2025-11-01 04:36:42.223 [INFO][3403] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a" Namespace="calico-system" Pod="whisker-6cbc5bd78f-jgqrs" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-whisker--6cbc5bd78f--jgqrs-eth0" Nov 1 04:36:42.241000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:36:42.241000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00844ce60 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:36:42.241000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:36:42.267000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525845 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:36:42.267000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0076c8300 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:36:42.267000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:36:42.285320 env[1200]: time="2025-11-01T04:36:42.285187938Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:36:42.289185 env[1200]: time="2025-11-01T04:36:42.285339767Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:36:42.289292 env[1200]: time="2025-11-01T04:36:42.289218760Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:36:42.290295 env[1200]: time="2025-11-01T04:36:42.289835883Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a pid=3487 runtime=io.containerd.runc.v2 Nov 1 04:36:42.334000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:36:42.334000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c008bc8040 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:36:42.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:36:42.334000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:36:42.334000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00a520960 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:36:42.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:36:42.336000 audit[3489]: AVC avc: denied { write } for pid=3489 comm="tee" name="fd" dev="proc" ino=29586 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 04:36:42.336000 audit[3489]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3d0627cd a2=241 a3=1b6 items=1 ppid=3452 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:42.336000 audit: CWD cwd="/etc/service/enabled/confd/log" Nov 1 04:36:42.336000 audit: PATH item=0 name="/dev/fd/63" inode=29557 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:36:42.336000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 04:36:42.369455 systemd[1]: Started cri-containerd-ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a.scope. Nov 1 04:36:42.380000 audit[3522]: AVC avc: denied { write } for pid=3522 comm="tee" name="fd" dev="proc" ino=29605 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 04:36:42.380000 audit[3522]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc70747bd a2=241 a3=1b6 items=1 ppid=3446 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:42.380000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Nov 1 04:36:42.380000 audit: PATH item=0 name="/dev/fd/63" inode=30238 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:36:42.380000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 04:36:42.408000 audit[3524]: AVC avc: denied { write } for pid=3524 comm="tee" name="fd" dev="proc" ino=30258 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 04:36:42.409000 audit[3510]: AVC avc: denied { write } for pid=3510 comm="tee" name="fd" dev="proc" ino=30261 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 04:36:42.409000 audit[3510]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd30e797cd a2=241 a3=1b6 items=1 ppid=3450 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:42.409000 audit: CWD cwd="/etc/service/enabled/bird6/log" Nov 1 04:36:42.409000 audit: PATH item=0 name="/dev/fd/63" inode=29566 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:36:42.409000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 04:36:42.408000 audit[3524]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb02967ce a2=241 a3=1b6 items=1 ppid=3458 pid=3524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:42.408000 audit: CWD cwd="/etc/service/enabled/bird/log" Nov 1 04:36:42.408000 audit: PATH item=0 name="/dev/fd/63" inode=30241 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:36:42.408000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 04:36:42.435000 audit[3529]: AVC avc: denied { write } for pid=3529 comm="tee" name="fd" dev="proc" ino=29625 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 04:36:42.435000 audit[3529]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc6cb87be a2=241 a3=1b6 items=1 ppid=3461 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:42.435000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Nov 1 04:36:42.435000 audit: PATH item=0 name="/dev/fd/63" inode=30244 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:36:42.435000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 04:36:42.438000 audit[3545]: AVC avc: denied { write } for pid=3545 comm="tee" name="fd" dev="proc" ino=29629 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 04:36:42.438000 audit[3545]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff3540f7cd a2=241 a3=1b6 items=1 ppid=3447 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:42.438000 audit: CWD cwd="/etc/service/enabled/felix/log" Nov 1 04:36:42.438000 audit: PATH item=0 name="/dev/fd/63" inode=30254 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:36:42.438000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 04:36:42.466000 audit[3556]: AVC avc: denied { write } for pid=3556 comm="tee" name="fd" dev="proc" ino=29638 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Nov 1 04:36:42.466000 audit[3556]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc993967cf a2=241 a3=1b6 items=1 ppid=3462 pid=3556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:42.466000 audit: CWD cwd="/etc/service/enabled/cni/log" Nov 1 04:36:42.466000 audit: PATH item=0 name="/dev/fd/63" inode=29618 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Nov 1 04:36:42.466000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Nov 1 04:36:42.441617 systemd-networkd[1027]: cali760ee39b091: Gained IPv6LL Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.306 [INFO][3433] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.306 [INFO][3433] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" iface="eth0" netns="/var/run/netns/cni-17f0fb1e-f7cd-48dd-d727-2c8d1710606f" Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.306 [INFO][3433] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" iface="eth0" netns="/var/run/netns/cni-17f0fb1e-f7cd-48dd-d727-2c8d1710606f" Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.307 [INFO][3433] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" iface="eth0" netns="/var/run/netns/cni-17f0fb1e-f7cd-48dd-d727-2c8d1710606f" Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.307 [INFO][3433] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.307 [INFO][3433] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.411 [INFO][3508] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" HandleID="k8s-pod-network.cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.411 [INFO][3508] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.411 [INFO][3508] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.429 [WARNING][3508] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" HandleID="k8s-pod-network.cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.429 [INFO][3508] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" HandleID="k8s-pod-network.cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.433 [INFO][3508] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:42.471940 env[1200]: 2025-11-01 04:36:42.440 [INFO][3433] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:42.471940 env[1200]: time="2025-11-01T04:36:42.462345539Z" level=info msg="TearDown network for sandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\" successfully" Nov 1 04:36:42.471940 env[1200]: time="2025-11-01T04:36:42.462611681Z" level=info msg="StopPodSandbox for \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\" returns successfully" Nov 1 04:36:42.471940 env[1200]: time="2025-11-01T04:36:42.471902830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-p9bjl,Uid:657f9ac9-0c7d-43e1-abaf-a7867906be5a,Namespace:kube-system,Attempt:1,}" Nov 1 04:36:42.522005 kubelet[2011]: E1101 04:36:42.521947 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" podUID="a04c514c-f548-4854-abe7-a0adc995c889" Nov 1 04:36:42.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.527000 audit: BPF prog-id=143 op=LOAD Nov 1 04:36:42.534000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.534000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3487 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:42.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365386134613734333133623161376464643831663232616239366633 Nov 1 04:36:42.534000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.534000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3487 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:42.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365386134613734333133623161376464643831663232616239366633 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit: BPF prog-id=144 op=LOAD Nov 1 04:36:42.535000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00024bf80 items=0 ppid=3487 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:42.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365386134613734333133623161376464643831663232616239366633 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit: BPF prog-id=145 op=LOAD Nov 1 04:36:42.535000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00024bfc8 items=0 ppid=3487 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:42.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365386134613734333133623161376464643831663232616239366633 Nov 1 04:36:42.535000 audit: BPF prog-id=145 op=UNLOAD Nov 1 04:36:42.535000 audit: BPF prog-id=144 op=UNLOAD Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:42.535000 audit: BPF prog-id=146 op=LOAD Nov 1 04:36:42.535000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c23d8 items=0 ppid=3487 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:42.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365386134613734333133623161376464643831663232616239366633 Nov 1 04:36:42.763221 env[1200]: time="2025-11-01T04:36:42.763100542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6cbc5bd78f-jgqrs,Uid:1f970c1e-fc1f-4851-ac5c-128a20d86234,Namespace:calico-system,Attempt:0,} returns sandbox id \"ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a\"" Nov 1 04:36:42.766153 env[1200]: time="2025-11-01T04:36:42.765944132Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Nov 1 04:36:42.829854 systemd-networkd[1027]: cali05a63c3b4c1: Link UP Nov 1 04:36:42.841154 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali05a63c3b4c1: link becomes ready Nov 1 04:36:42.839422 systemd[1]: run-containerd-runc-k8s.io-ce8a4a74313b1a7ddd81f22ab96f327124e0474add2608a9def8adddd8cc689a-runc.laJ1Rt.mount: Deactivated successfully. Nov 1 04:36:42.839610 systemd[1]: run-netns-cni\x2d17f0fb1e\x2df7cd\x2d48dd\x2dd727\x2d2c8d1710606f.mount: Deactivated successfully. Nov 1 04:36:42.842779 systemd-networkd[1027]: cali05a63c3b4c1: Gained carrier Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.630 [INFO][3562] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.655 [INFO][3562] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0 coredns-674b8bbfcf- kube-system 657f9ac9-0c7d-43e1-abaf-a7867906be5a 987 0 2025-11-01 04:35:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-cigeh.gb1.brightbox.com coredns-674b8bbfcf-p9bjl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali05a63c3b4c1 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-p9bjl" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-" Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.656 [INFO][3562] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-p9bjl" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.740 [INFO][3582] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" HandleID="k8s-pod-network.c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.740 [INFO][3582] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" HandleID="k8s-pod-network.c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003aead0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-cigeh.gb1.brightbox.com", "pod":"coredns-674b8bbfcf-p9bjl", "timestamp":"2025-11-01 04:36:42.740463958 +0000 UTC"}, Hostname:"srv-cigeh.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.740 [INFO][3582] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.740 [INFO][3582] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.740 [INFO][3582] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cigeh.gb1.brightbox.com' Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.768 [INFO][3582] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.782 [INFO][3582] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.791 [INFO][3582] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.795 [INFO][3582] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.799 [INFO][3582] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.799 [INFO][3582] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.801 [INFO][3582] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.807 [INFO][3582] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.817 [INFO][3582] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.75.195/26] block=192.168.75.192/26 handle="k8s-pod-network.c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.817 [INFO][3582] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.195/26] handle="k8s-pod-network.c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.817 [INFO][3582] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:42.877962 env[1200]: 2025-11-01 04:36:42.817 [INFO][3582] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.75.195/26] IPv6=[] ContainerID="c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" HandleID="k8s-pod-network.c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:42.879314 env[1200]: 2025-11-01 04:36:42.819 [INFO][3562] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-p9bjl" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"657f9ac9-0c7d-43e1-abaf-a7867906be5a", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 35, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"", Pod:"coredns-674b8bbfcf-p9bjl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05a63c3b4c1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:42.879314 env[1200]: 2025-11-01 04:36:42.820 [INFO][3562] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.195/32] ContainerID="c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-p9bjl" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:42.879314 env[1200]: 2025-11-01 04:36:42.820 [INFO][3562] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali05a63c3b4c1 ContainerID="c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-p9bjl" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:42.879314 env[1200]: 2025-11-01 04:36:42.848 [INFO][3562] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-p9bjl" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:42.879314 env[1200]: 2025-11-01 04:36:42.850 [INFO][3562] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-p9bjl" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"657f9ac9-0c7d-43e1-abaf-a7867906be5a", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 35, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc", Pod:"coredns-674b8bbfcf-p9bjl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05a63c3b4c1", MAC:"0a:50:71:60:0a:0e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:42.879314 env[1200]: 2025-11-01 04:36:42.874 [INFO][3562] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc" Namespace="kube-system" Pod="coredns-674b8bbfcf-p9bjl" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:42.906195 env[1200]: time="2025-11-01T04:36:42.905105124Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:36:42.906195 env[1200]: time="2025-11-01T04:36:42.905229020Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:36:42.906195 env[1200]: time="2025-11-01T04:36:42.905247425Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:36:42.907549 env[1200]: time="2025-11-01T04:36:42.906668802Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc pid=3610 runtime=io.containerd.runc.v2 Nov 1 04:36:42.962081 systemd[1]: run-containerd-runc-k8s.io-c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc-runc.luYCEx.mount: Deactivated successfully. Nov 1 04:36:42.968342 systemd[1]: Started cri-containerd-c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc.scope. Nov 1 04:36:43.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.004000 audit: BPF prog-id=147 op=LOAD Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=3610 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338393561383232656562343835353332333730626365353765323132 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=3610 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338393561383232656562343835353332333730626365353765323132 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit: BPF prog-id=148 op=LOAD Nov 1 04:36:43.005000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c00021d6c0 items=0 ppid=3610 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338393561383232656562343835353332333730626365353765323132 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit: BPF prog-id=149 op=LOAD Nov 1 04:36:43.005000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c00021d708 items=0 ppid=3610 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338393561383232656562343835353332333730626365353765323132 Nov 1 04:36:43.005000 audit: BPF prog-id=149 op=UNLOAD Nov 1 04:36:43.005000 audit: BPF prog-id=148 op=UNLOAD Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { perfmon } for pid=3619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit[3619]: AVC avc: denied { bpf } for pid=3619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.005000 audit: BPF prog-id=150 op=LOAD Nov 1 04:36:43.005000 audit[3619]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c00021db18 items=0 ppid=3610 pid=3619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338393561383232656562343835353332333730626365353765323132 Nov 1 04:36:43.074320 env[1200]: time="2025-11-01T04:36:43.074201995Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:36:43.075471 env[1200]: time="2025-11-01T04:36:43.075427962Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-p9bjl,Uid:657f9ac9-0c7d-43e1-abaf-a7867906be5a,Namespace:kube-system,Attempt:1,} returns sandbox id \"c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc\"" Nov 1 04:36:43.087872 env[1200]: time="2025-11-01T04:36:43.087706128Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Nov 1 04:36:43.089788 kubelet[2011]: E1101 04:36:43.089085 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 04:36:43.090136 kubelet[2011]: E1101 04:36:43.090086 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 04:36:43.093004 kubelet[2011]: E1101 04:36:43.092930 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:ee5615a3b1d44da0ac00b8c4d31c8559,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-bw556,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6cbc5bd78f-jgqrs_calico-system(1f970c1e-fc1f-4851-ac5c-128a20d86234): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Nov 1 04:36:43.112026 env[1200]: time="2025-11-01T04:36:43.111969686Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Nov 1 04:36:43.113989 env[1200]: time="2025-11-01T04:36:43.113945521Z" level=info msg="CreateContainer within sandbox \"c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Nov 1 04:36:43.121150 kubelet[2011]: I1101 04:36:43.119210 2011 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="930f616e-1417-4da3-9618-cb374f34ba9f" path="/var/lib/kubelet/pods/930f616e-1417-4da3-9618-cb374f34ba9f/volumes" Nov 1 04:36:43.141367 env[1200]: time="2025-11-01T04:36:43.141298470Z" level=info msg="CreateContainer within sandbox \"c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f0a2f0b328156679f966db15901b94ab0a08fda6b232a4cd4cc46d2cc6a0738f\"" Nov 1 04:36:43.144629 env[1200]: time="2025-11-01T04:36:43.144586328Z" level=info msg="StartContainer for \"f0a2f0b328156679f966db15901b94ab0a08fda6b232a4cd4cc46d2cc6a0738f\"" Nov 1 04:36:43.172192 systemd[1]: Started cri-containerd-f0a2f0b328156679f966db15901b94ab0a08fda6b232a4cd4cc46d2cc6a0738f.scope. Nov 1 04:36:43.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.235000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.235000 audit: BPF prog-id=151 op=LOAD Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3610 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630613266306233323831353636373966393636646231353930316239 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3610 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630613266306233323831353636373966393636646231353930316239 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit: BPF prog-id=152 op=LOAD Nov 1 04:36:43.236000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002c5d20 items=0 ppid=3610 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630613266306233323831353636373966393636646231353930316239 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.236000 audit: BPF prog-id=153 op=LOAD Nov 1 04:36:43.236000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002c5d68 items=0 ppid=3610 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630613266306233323831353636373966393636646231353930316239 Nov 1 04:36:43.237000 audit: BPF prog-id=153 op=UNLOAD Nov 1 04:36:43.237000 audit: BPF prog-id=152 op=UNLOAD Nov 1 04:36:43.237000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.237000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.237000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.237000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.237000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.237000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.237000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.237000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.237000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.237000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.237000 audit: BPF prog-id=154 op=LOAD Nov 1 04:36:43.237000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00031e178 items=0 ppid=3610 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630613266306233323831353636373966393636646231353930316239 Nov 1 04:36:43.270389 env[1200]: time="2025-11-01T04:36:43.270311015Z" level=info msg="StartContainer for \"f0a2f0b328156679f966db15901b94ab0a08fda6b232a4cd4cc46d2cc6a0738f\" returns successfully" Nov 1 04:36:43.418396 env[1200]: time="2025-11-01T04:36:43.418236401Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:36:43.420832 env[1200]: time="2025-11-01T04:36:43.420763781Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Nov 1 04:36:43.421547 kubelet[2011]: E1101 04:36:43.421438 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 04:36:43.421690 kubelet[2011]: E1101 04:36:43.421611 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 04:36:43.422665 kubelet[2011]: E1101 04:36:43.422478 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-bw556,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6cbc5bd78f-jgqrs_calico-system(1f970c1e-fc1f-4851-ac5c-128a20d86234): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Nov 1 04:36:43.423970 kubelet[2011]: E1101 04:36:43.423858 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6cbc5bd78f-jgqrs" podUID="1f970c1e-fc1f-4851-ac5c-128a20d86234" Nov 1 04:36:43.474000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.474000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.474000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.474000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.474000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.474000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.474000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.474000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.474000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.474000 audit: BPF prog-id=155 op=LOAD Nov 1 04:36:43.474000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9b82dc20 a2=98 a3=1fffffffffffffff items=0 ppid=3448 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.474000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 04:36:43.476000 audit: BPF prog-id=155 op=UNLOAD Nov 1 04:36:43.480000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.480000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.480000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.480000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.480000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.480000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.480000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.480000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.480000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.480000 audit: BPF prog-id=156 op=LOAD Nov 1 04:36:43.480000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9b82db00 a2=94 a3=3 items=0 ppid=3448 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.480000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 04:36:43.483000 audit: BPF prog-id=156 op=UNLOAD Nov 1 04:36:43.483000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.483000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.483000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.483000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.483000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.483000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.483000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.483000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.483000 audit[3697]: AVC avc: denied { bpf } for pid=3697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.483000 audit: BPF prog-id=157 op=LOAD Nov 1 04:36:43.483000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9b82db40 a2=94 a3=7ffe9b82dd20 items=0 ppid=3448 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.483000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 04:36:43.484000 audit: BPF prog-id=157 op=UNLOAD Nov 1 04:36:43.484000 audit[3697]: AVC avc: denied { perfmon } for pid=3697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.484000 audit[3697]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe9b82dc10 a2=50 a3=a000000085 items=0 ppid=3448 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.484000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Nov 1 04:36:43.492000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.492000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.492000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.492000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.492000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.492000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.492000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.492000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.492000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.492000 audit: BPF prog-id=158 op=LOAD Nov 1 04:36:43.492000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffdaa8fcc0 a2=98 a3=3 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.492000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.493000 audit: BPF prog-id=158 op=UNLOAD Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit: BPF prog-id=159 op=LOAD Nov 1 04:36:43.494000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffdaa8fab0 a2=94 a3=54428f items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.494000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.494000 audit: BPF prog-id=159 op=UNLOAD Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.494000 audit: BPF prog-id=160 op=LOAD Nov 1 04:36:43.494000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffdaa8fae0 a2=94 a3=2 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.494000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.496000 audit: BPF prog-id=160 op=UNLOAD Nov 1 04:36:43.534460 kubelet[2011]: E1101 04:36:43.534332 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6cbc5bd78f-jgqrs" podUID="1f970c1e-fc1f-4851-ac5c-128a20d86234" Nov 1 04:36:43.544000 audit[3663]: AVC avc: denied { getattr } for pid=3663 comm="coredns" path="cgroup:[4026532858]" dev="nsfs" ino=4026532858 scontext=system_u:system_r:svirt_lxc_net_t:s0:c149,c981 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Nov 1 04:36:43.544000 audit[3663]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c0001265d0 a2=c00014f218 a3=0 items=0 ppid=3610 pid=3663 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c149,c981 key=(null) Nov 1 04:36:43.544000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Nov 1 04:36:43.556696 kubelet[2011]: I1101 04:36:43.556558 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-p9bjl" podStartSLOduration=51.552371747 podStartE2EDuration="51.552371747s" podCreationTimestamp="2025-11-01 04:35:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-11-01 04:36:43.548991714 +0000 UTC m=+56.817581126" watchObservedRunningTime="2025-11-01 04:36:43.552371747 +0000 UTC m=+56.820961162" Nov 1 04:36:43.664000 audit[3717]: NETFILTER_CFG table=filter:105 family=2 entries=20 op=nft_register_rule pid=3717 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:43.664000 audit[3717]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff6924b760 a2=0 a3=7fff6924b74c items=0 ppid=2119 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:43.671000 audit[3717]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3717 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:43.671000 audit[3717]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff6924b760 a2=0 a3=0 items=0 ppid=2119 pid=3717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:43.736000 audit[3720]: NETFILTER_CFG table=filter:107 family=2 entries=20 op=nft_register_rule pid=3720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:43.736000 audit[3720]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffe285a6c60 a2=0 a3=7ffe285a6c4c items=0 ppid=2119 pid=3720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.736000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:43.743000 audit[3720]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=3720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:43.743000 audit[3720]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe285a6c60 a2=0 a3=0 items=0 ppid=2119 pid=3720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.743000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:43.811000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.811000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.811000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.811000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.811000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.811000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.811000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.811000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.811000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.811000 audit: BPF prog-id=161 op=LOAD Nov 1 04:36:43.811000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffdaa8f9a0 a2=94 a3=1 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.811000 audit: BPF prog-id=161 op=UNLOAD Nov 1 04:36:43.811000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.811000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffdaa8fa70 a2=50 a3=7fffdaa8fb50 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffdaa8f9b0 a2=28 a3=0 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdaa8f9e0 a2=28 a3=0 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdaa8f8f0 a2=28 a3=0 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffdaa8fa00 a2=28 a3=0 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffdaa8f9e0 a2=28 a3=0 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffdaa8f9d0 a2=28 a3=0 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffdaa8fa00 a2=28 a3=0 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdaa8f9e0 a2=28 a3=0 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdaa8fa00 a2=28 a3=0 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffdaa8f9d0 a2=28 a3=0 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffdaa8fa40 a2=28 a3=0 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffdaa8f7f0 a2=50 a3=1 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.825000 audit: BPF prog-id=162 op=LOAD Nov 1 04:36:43.825000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffdaa8f7f0 a2=94 a3=5 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.825000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.826000 audit: BPF prog-id=162 op=UNLOAD Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffdaa8f8a0 a2=50 a3=1 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.826000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffdaa8f9c0 a2=4 a3=38 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.826000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { confidentiality } for pid=3698 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 04:36:43.826000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffdaa8fa10 a2=94 a3=6 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.826000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.826000 audit[3698]: AVC avc: denied { confidentiality } for pid=3698 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 04:36:43.826000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffdaa8f1c0 a2=94 a3=88 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.826000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.827000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.827000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.827000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.827000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.827000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.827000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.827000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.827000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.827000 audit[3698]: AVC avc: denied { perfmon } for pid=3698 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.827000 audit[3698]: AVC avc: denied { bpf } for pid=3698 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.827000 audit[3698]: AVC avc: denied { confidentiality } for pid=3698 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 04:36:43.827000 audit[3698]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffdaa8f1c0 a2=94 a3=88 items=0 ppid=3448 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Nov 1 04:36:43.838674 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3833900510.mount: Deactivated successfully. Nov 1 04:36:43.865000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.865000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.865000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.865000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.865000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.865000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.865000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.865000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.865000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.865000 audit: BPF prog-id=163 op=LOAD Nov 1 04:36:43.865000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffca7863d0 a2=98 a3=1999999999999999 items=0 ppid=3448 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.865000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 04:36:43.866000 audit: BPF prog-id=163 op=UNLOAD Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit: BPF prog-id=164 op=LOAD Nov 1 04:36:43.866000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffca7862b0 a2=94 a3=ffff items=0 ppid=3448 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.866000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 04:36:43.866000 audit: BPF prog-id=164 op=UNLOAD Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:43.866000 audit: BPF prog-id=165 op=LOAD Nov 1 04:36:43.866000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffca7862f0 a2=94 a3=7fffca7864d0 items=0 ppid=3448 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:43.866000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Nov 1 04:36:43.866000 audit: BPF prog-id=165 op=UNLOAD Nov 1 04:36:43.977508 systemd-networkd[1027]: calic6e89b0ac05: Gained IPv6LL Nov 1 04:36:44.021771 systemd-networkd[1027]: vxlan.calico: Link UP Nov 1 04:36:44.022100 systemd-networkd[1027]: vxlan.calico: Gained carrier Nov 1 04:36:44.085000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.085000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.085000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.085000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.085000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.085000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.085000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.085000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.085000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.085000 audit: BPF prog-id=166 op=LOAD Nov 1 04:36:44.085000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb077eaa0 a2=98 a3=20 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.085000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.088000 audit: BPF prog-id=166 op=UNLOAD Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit: BPF prog-id=167 op=LOAD Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb077e8b0 a2=94 a3=54428f items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit: BPF prog-id=167 op=UNLOAD Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit: BPF prog-id=168 op=LOAD Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb077e8e0 a2=94 a3=2 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit: BPF prog-id=168 op=UNLOAD Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb077e7b0 a2=28 a3=0 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb077e7e0 a2=28 a3=0 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb077e6f0 a2=28 a3=0 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb077e800 a2=28 a3=0 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb077e7e0 a2=28 a3=0 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb077e7d0 a2=28 a3=0 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb077e800 a2=28 a3=0 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb077e7e0 a2=28 a3=0 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb077e800 a2=28 a3=0 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb077e7d0 a2=28 a3=0 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb077e840 a2=28 a3=0 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.090000 audit: BPF prog-id=169 op=LOAD Nov 1 04:36:44.090000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb077e6b0 a2=94 a3=0 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.090000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.090000 audit: BPF prog-id=169 op=UNLOAD Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffb077e6a0 a2=50 a3=2800 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.091000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffb077e6a0 a2=50 a3=2800 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.091000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit: BPF prog-id=170 op=LOAD Nov 1 04:36:44.091000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb077dec0 a2=94 a3=2 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.091000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.091000 audit: BPF prog-id=170 op=UNLOAD Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.128020 kernel: kauditd_printk_skb: 683 callbacks suppressed Nov 1 04:36:44.130250 kernel: audit: type=1400 audit(1761971804.106:1197): avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.130611 kernel: audit: type=1400 audit(1761971804.106:1197): avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.130677 kernel: audit: type=1400 audit(1761971804.106:1197): avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.091000 audit: BPF prog-id=171 op=LOAD Nov 1 04:36:44.091000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb077dfc0 a2=94 a3=30 items=0 ppid=3448 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.091000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Nov 1 04:36:44.106000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.106000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.106000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.139181 kernel: audit: type=1400 audit(1761971804.106:1197): avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.106000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.106377 systemd-networkd[1027]: cali05a63c3b4c1: Gained IPv6LL Nov 1 04:36:44.106000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.146166 kernel: audit: type=1400 audit(1761971804.106:1197): avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.106000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.152299 kernel: audit: type=1400 audit(1761971804.106:1197): avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.106000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.172277 kernel: audit: type=1400 audit(1761971804.106:1197): avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.106000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.180294 kernel: audit: type=1400 audit(1761971804.106:1197): avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.185929 kernel: audit: type=1400 audit(1761971804.106:1197): avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.106000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.106000 audit: BPF prog-id=172 op=LOAD Nov 1 04:36:44.188324 kernel: audit: type=1334 audit(1761971804.106:1197): prog-id=172 op=LOAD Nov 1 04:36:44.106000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe497a42a0 a2=98 a3=0 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.106000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.114000 audit: BPF prog-id=172 op=UNLOAD Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit: BPF prog-id=173 op=LOAD Nov 1 04:36:44.114000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe497a4090 a2=94 a3=54428f items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.114000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.114000 audit: BPF prog-id=173 op=UNLOAD Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.114000 audit: BPF prog-id=174 op=LOAD Nov 1 04:36:44.114000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe497a40c0 a2=94 a3=2 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.114000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.114000 audit: BPF prog-id=174 op=UNLOAD Nov 1 04:36:44.344000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.344000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.344000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.344000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.344000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.344000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.344000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.344000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.344000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.344000 audit: BPF prog-id=175 op=LOAD Nov 1 04:36:44.344000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe497a3f80 a2=94 a3=1 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.344000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.344000 audit: BPF prog-id=175 op=UNLOAD Nov 1 04:36:44.344000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.344000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe497a4050 a2=50 a3=7ffe497a4130 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.344000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.357000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.357000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe497a3f90 a2=28 a3=0 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.357000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.357000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe497a3fc0 a2=28 a3=0 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.357000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.357000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe497a3ed0 a2=28 a3=0 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.357000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.357000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe497a3fe0 a2=28 a3=0 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.357000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.357000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe497a3fc0 a2=28 a3=0 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.357000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.357000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe497a3fb0 a2=28 a3=0 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.357000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.357000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe497a3fe0 a2=28 a3=0 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.357000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.357000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe497a3fc0 a2=28 a3=0 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.357000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.357000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe497a3fe0 a2=28 a3=0 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.357000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.357000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe497a3fb0 a2=28 a3=0 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.357000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.357000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe497a4020 a2=28 a3=0 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe497a3dd0 a2=50 a3=1 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.358000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit: BPF prog-id=176 op=LOAD Nov 1 04:36:44.358000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe497a3dd0 a2=94 a3=5 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.358000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.358000 audit: BPF prog-id=176 op=UNLOAD Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe497a3e80 a2=50 a3=1 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.358000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe497a3fa0 a2=4 a3=38 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.358000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.358000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe497a3ff0 a2=94 a3=6 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.358000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 04:36:44.359000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe497a37a0 a2=94 a3=88 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.359000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { perfmon } for pid=3756 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { confidentiality } for pid=3756 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Nov 1 04:36:44.359000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe497a37a0 a2=94 a3=88 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.359000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.359000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.359000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe497a51d0 a2=10 a3=f8f00800 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.359000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.360000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.360000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe497a5070 a2=10 a3=3 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.360000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.360000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.360000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe497a5010 a2=10 a3=3 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.360000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.360000 audit[3756]: AVC avc: denied { bpf } for pid=3756 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:44.360000 audit[3756]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe497a5010 a2=10 a3=7 items=0 ppid=3448 pid=3756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.360000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Nov 1 04:36:44.368000 audit: BPF prog-id=171 op=UNLOAD Nov 1 04:36:44.487000 audit[3793]: NETFILTER_CFG table=mangle:109 family=2 entries=16 op=nft_register_chain pid=3793 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 04:36:44.487000 audit[3793]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffdb4c7750 a2=0 a3=7fffdb4c773c items=0 ppid=3448 pid=3793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.487000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 04:36:44.501000 audit[3795]: NETFILTER_CFG table=nat:110 family=2 entries=15 op=nft_register_chain pid=3795 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 04:36:44.501000 audit[3795]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd90949c90 a2=0 a3=7ffd90949c7c items=0 ppid=3448 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.501000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 04:36:44.510000 audit[3794]: NETFILTER_CFG table=raw:111 family=2 entries=21 op=nft_register_chain pid=3794 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 04:36:44.510000 audit[3794]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdf44f5050 a2=0 a3=7ffdf44f503c items=0 ppid=3448 pid=3794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.510000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 04:36:44.538795 kubelet[2011]: E1101 04:36:44.538609 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6cbc5bd78f-jgqrs" podUID="1f970c1e-fc1f-4851-ac5c-128a20d86234" Nov 1 04:36:44.525000 audit[3797]: NETFILTER_CFG table=filter:112 family=2 entries=156 op=nft_register_chain pid=3797 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 04:36:44.525000 audit[3797]: SYSCALL arch=c000003e syscall=46 success=yes exit=89444 a0=3 a1=7ffc234547d0 a2=0 a3=7ffc234547bc items=0 ppid=3448 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.525000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 04:36:44.763000 audit[3811]: NETFILTER_CFG table=filter:113 family=2 entries=17 op=nft_register_rule pid=3811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:44.763000 audit[3811]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe17ec5b20 a2=0 a3=7ffe17ec5b0c items=0 ppid=2119 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.763000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:44.768000 audit[3811]: NETFILTER_CFG table=nat:114 family=2 entries=35 op=nft_register_chain pid=3811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:44.768000 audit[3811]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe17ec5b20 a2=0 a3=7ffe17ec5b0c items=0 ppid=2119 pid=3811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:44.768000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:45.385393 systemd-networkd[1027]: vxlan.calico: Gained IPv6LL Nov 1 04:36:46.190000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:36:46.190000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ee79e0 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:36:46.190000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:36:46.192000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:36:46.192000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ee7a20 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:36:46.192000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:36:46.204000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:36:46.204000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:36:46.204000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ee7da0 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:36:46.204000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:36:46.204000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d1cb60 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:36:46.204000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:36:47.062589 env[1200]: time="2025-11-01T04:36:47.062516479Z" level=info msg="StopPodSandbox for \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\"" Nov 1 04:36:47.287950 env[1200]: 2025-11-01 04:36:47.207 [WARNING][3822] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0", GenerateName:"calico-kube-controllers-6d9b84d64-", Namespace:"calico-system", SelfLink:"", UID:"a04c514c-f548-4854-abe7-a0adc995c889", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6d9b84d64", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4", Pod:"calico-kube-controllers-6d9b84d64-gh6zn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali760ee39b091", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:47.287950 env[1200]: 2025-11-01 04:36:47.207 [INFO][3822] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:47.287950 env[1200]: 2025-11-01 04:36:47.208 [INFO][3822] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" iface="eth0" netns="" Nov 1 04:36:47.287950 env[1200]: 2025-11-01 04:36:47.208 [INFO][3822] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:47.287950 env[1200]: 2025-11-01 04:36:47.208 [INFO][3822] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:47.287950 env[1200]: 2025-11-01 04:36:47.265 [INFO][3831] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" HandleID="k8s-pod-network.1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:47.287950 env[1200]: 2025-11-01 04:36:47.265 [INFO][3831] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:47.287950 env[1200]: 2025-11-01 04:36:47.266 [INFO][3831] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:47.287950 env[1200]: 2025-11-01 04:36:47.278 [WARNING][3831] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" HandleID="k8s-pod-network.1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:47.287950 env[1200]: 2025-11-01 04:36:47.278 [INFO][3831] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" HandleID="k8s-pod-network.1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:47.287950 env[1200]: 2025-11-01 04:36:47.280 [INFO][3831] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:47.287950 env[1200]: 2025-11-01 04:36:47.284 [INFO][3822] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:47.289296 env[1200]: time="2025-11-01T04:36:47.289241870Z" level=info msg="TearDown network for sandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\" successfully" Nov 1 04:36:47.289480 env[1200]: time="2025-11-01T04:36:47.289443563Z" level=info msg="StopPodSandbox for \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\" returns successfully" Nov 1 04:36:47.293943 env[1200]: time="2025-11-01T04:36:47.293887796Z" level=info msg="RemovePodSandbox for \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\"" Nov 1 04:36:47.294071 env[1200]: time="2025-11-01T04:36:47.293958270Z" level=info msg="Forcibly stopping sandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\"" Nov 1 04:36:47.392979 env[1200]: 2025-11-01 04:36:47.343 [WARNING][3846] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0", GenerateName:"calico-kube-controllers-6d9b84d64-", Namespace:"calico-system", SelfLink:"", UID:"a04c514c-f548-4854-abe7-a0adc995c889", ResourceVersion:"990", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6d9b84d64", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"f4f34f7d5362116f44d599993e77383f2ccc13c41249bd397c3b044b57360ba4", Pod:"calico-kube-controllers-6d9b84d64-gh6zn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.75.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali760ee39b091", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:47.392979 env[1200]: 2025-11-01 04:36:47.343 [INFO][3846] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:47.392979 env[1200]: 2025-11-01 04:36:47.343 [INFO][3846] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" iface="eth0" netns="" Nov 1 04:36:47.392979 env[1200]: 2025-11-01 04:36:47.343 [INFO][3846] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:47.392979 env[1200]: 2025-11-01 04:36:47.343 [INFO][3846] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:47.392979 env[1200]: 2025-11-01 04:36:47.373 [INFO][3854] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" HandleID="k8s-pod-network.1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:47.392979 env[1200]: 2025-11-01 04:36:47.374 [INFO][3854] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:47.392979 env[1200]: 2025-11-01 04:36:47.374 [INFO][3854] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:47.392979 env[1200]: 2025-11-01 04:36:47.384 [WARNING][3854] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" HandleID="k8s-pod-network.1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:47.392979 env[1200]: 2025-11-01 04:36:47.384 [INFO][3854] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" HandleID="k8s-pod-network.1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--kube--controllers--6d9b84d64--gh6zn-eth0" Nov 1 04:36:47.392979 env[1200]: 2025-11-01 04:36:47.386 [INFO][3854] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:47.392979 env[1200]: 2025-11-01 04:36:47.388 [INFO][3846] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d" Nov 1 04:36:47.392979 env[1200]: time="2025-11-01T04:36:47.391711569Z" level=info msg="TearDown network for sandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\" successfully" Nov 1 04:36:47.398086 env[1200]: time="2025-11-01T04:36:47.398032019Z" level=info msg="RemovePodSandbox \"1fa04da69808c6a2c32e814006f34b3d1a0b4bd0c0c6d207d7377718ee8c300d\" returns successfully" Nov 1 04:36:47.404967 env[1200]: time="2025-11-01T04:36:47.404863365Z" level=info msg="StopPodSandbox for \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\"" Nov 1 04:36:47.540240 env[1200]: 2025-11-01 04:36:47.460 [WARNING][3869] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-whisker--7df74cf549--xc5dz-eth0" Nov 1 04:36:47.540240 env[1200]: 2025-11-01 04:36:47.460 [INFO][3869] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:47.540240 env[1200]: 2025-11-01 04:36:47.460 [INFO][3869] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" iface="eth0" netns="" Nov 1 04:36:47.540240 env[1200]: 2025-11-01 04:36:47.460 [INFO][3869] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:47.540240 env[1200]: 2025-11-01 04:36:47.461 [INFO][3869] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:47.540240 env[1200]: 2025-11-01 04:36:47.509 [INFO][3876] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" HandleID="k8s-pod-network.41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Workload="srv--cigeh.gb1.brightbox.com-k8s-whisker--7df74cf549--xc5dz-eth0" Nov 1 04:36:47.540240 env[1200]: 2025-11-01 04:36:47.509 [INFO][3876] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:47.540240 env[1200]: 2025-11-01 04:36:47.509 [INFO][3876] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:47.540240 env[1200]: 2025-11-01 04:36:47.521 [WARNING][3876] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" HandleID="k8s-pod-network.41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Workload="srv--cigeh.gb1.brightbox.com-k8s-whisker--7df74cf549--xc5dz-eth0" Nov 1 04:36:47.540240 env[1200]: 2025-11-01 04:36:47.522 [INFO][3876] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" HandleID="k8s-pod-network.41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Workload="srv--cigeh.gb1.brightbox.com-k8s-whisker--7df74cf549--xc5dz-eth0" Nov 1 04:36:47.540240 env[1200]: 2025-11-01 04:36:47.528 [INFO][3876] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:47.540240 env[1200]: 2025-11-01 04:36:47.535 [INFO][3869] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:47.542847 env[1200]: time="2025-11-01T04:36:47.540259151Z" level=info msg="TearDown network for sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\" successfully" Nov 1 04:36:47.542847 env[1200]: time="2025-11-01T04:36:47.540309254Z" level=info msg="StopPodSandbox for \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\" returns successfully" Nov 1 04:36:47.542847 env[1200]: time="2025-11-01T04:36:47.542218126Z" level=info msg="RemovePodSandbox for \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\"" Nov 1 04:36:47.544996 env[1200]: time="2025-11-01T04:36:47.542297559Z" level=info msg="Forcibly stopping sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\"" Nov 1 04:36:47.699528 env[1200]: 2025-11-01 04:36:47.620 [WARNING][3892] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-whisker--7df74cf549--xc5dz-eth0" Nov 1 04:36:47.699528 env[1200]: 2025-11-01 04:36:47.620 [INFO][3892] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:47.699528 env[1200]: 2025-11-01 04:36:47.620 [INFO][3892] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" iface="eth0" netns="" Nov 1 04:36:47.699528 env[1200]: 2025-11-01 04:36:47.620 [INFO][3892] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:47.699528 env[1200]: 2025-11-01 04:36:47.620 [INFO][3892] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:47.699528 env[1200]: 2025-11-01 04:36:47.677 [INFO][3899] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" HandleID="k8s-pod-network.41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Workload="srv--cigeh.gb1.brightbox.com-k8s-whisker--7df74cf549--xc5dz-eth0" Nov 1 04:36:47.699528 env[1200]: 2025-11-01 04:36:47.679 [INFO][3899] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:47.699528 env[1200]: 2025-11-01 04:36:47.679 [INFO][3899] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:47.699528 env[1200]: 2025-11-01 04:36:47.689 [WARNING][3899] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" HandleID="k8s-pod-network.41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Workload="srv--cigeh.gb1.brightbox.com-k8s-whisker--7df74cf549--xc5dz-eth0" Nov 1 04:36:47.699528 env[1200]: 2025-11-01 04:36:47.689 [INFO][3899] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" HandleID="k8s-pod-network.41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Workload="srv--cigeh.gb1.brightbox.com-k8s-whisker--7df74cf549--xc5dz-eth0" Nov 1 04:36:47.699528 env[1200]: 2025-11-01 04:36:47.692 [INFO][3899] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:47.699528 env[1200]: 2025-11-01 04:36:47.694 [INFO][3892] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4" Nov 1 04:36:47.699528 env[1200]: time="2025-11-01T04:36:47.696680594Z" level=info msg="TearDown network for sandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\" successfully" Nov 1 04:36:47.702066 env[1200]: time="2025-11-01T04:36:47.702025639Z" level=info msg="RemovePodSandbox \"41b26d4aa1fae4d3d7a28d2771aafea10fe044915f748ab7d0e06636b357f2b4\" returns successfully" Nov 1 04:36:47.703047 env[1200]: time="2025-11-01T04:36:47.702994097Z" level=info msg="StopPodSandbox for \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\"" Nov 1 04:36:47.825096 env[1200]: 2025-11-01 04:36:47.757 [WARNING][3913] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"657f9ac9-0c7d-43e1-abaf-a7867906be5a", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 35, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc", Pod:"coredns-674b8bbfcf-p9bjl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05a63c3b4c1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:47.825096 env[1200]: 2025-11-01 04:36:47.758 [INFO][3913] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:47.825096 env[1200]: 2025-11-01 04:36:47.758 [INFO][3913] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" iface="eth0" netns="" Nov 1 04:36:47.825096 env[1200]: 2025-11-01 04:36:47.758 [INFO][3913] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:47.825096 env[1200]: 2025-11-01 04:36:47.758 [INFO][3913] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:47.825096 env[1200]: 2025-11-01 04:36:47.807 [INFO][3920] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" HandleID="k8s-pod-network.cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:47.825096 env[1200]: 2025-11-01 04:36:47.808 [INFO][3920] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:47.825096 env[1200]: 2025-11-01 04:36:47.808 [INFO][3920] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:47.825096 env[1200]: 2025-11-01 04:36:47.818 [WARNING][3920] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" HandleID="k8s-pod-network.cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:47.825096 env[1200]: 2025-11-01 04:36:47.818 [INFO][3920] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" HandleID="k8s-pod-network.cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:47.825096 env[1200]: 2025-11-01 04:36:47.820 [INFO][3920] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:47.825096 env[1200]: 2025-11-01 04:36:47.822 [INFO][3913] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:47.827330 env[1200]: time="2025-11-01T04:36:47.825171031Z" level=info msg="TearDown network for sandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\" successfully" Nov 1 04:36:47.827330 env[1200]: time="2025-11-01T04:36:47.825219833Z" level=info msg="StopPodSandbox for \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\" returns successfully" Nov 1 04:36:47.827511 env[1200]: time="2025-11-01T04:36:47.827471303Z" level=info msg="RemovePodSandbox for \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\"" Nov 1 04:36:47.827716 env[1200]: time="2025-11-01T04:36:47.827647393Z" level=info msg="Forcibly stopping sandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\"" Nov 1 04:36:47.937872 env[1200]: 2025-11-01 04:36:47.880 [WARNING][3934] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"657f9ac9-0c7d-43e1-abaf-a7867906be5a", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 35, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"c895a822eeb485532370bce57e21202a4165fb8b3c9d2c12bfd4104d6f7920cc", Pod:"coredns-674b8bbfcf-p9bjl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05a63c3b4c1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:47.937872 env[1200]: 2025-11-01 04:36:47.880 [INFO][3934] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:47.937872 env[1200]: 2025-11-01 04:36:47.880 [INFO][3934] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" iface="eth0" netns="" Nov 1 04:36:47.937872 env[1200]: 2025-11-01 04:36:47.880 [INFO][3934] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:47.937872 env[1200]: 2025-11-01 04:36:47.880 [INFO][3934] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:47.937872 env[1200]: 2025-11-01 04:36:47.917 [INFO][3941] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" HandleID="k8s-pod-network.cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:47.937872 env[1200]: 2025-11-01 04:36:47.917 [INFO][3941] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:47.937872 env[1200]: 2025-11-01 04:36:47.917 [INFO][3941] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:47.937872 env[1200]: 2025-11-01 04:36:47.929 [WARNING][3941] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" HandleID="k8s-pod-network.cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:47.937872 env[1200]: 2025-11-01 04:36:47.929 [INFO][3941] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" HandleID="k8s-pod-network.cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--p9bjl-eth0" Nov 1 04:36:47.937872 env[1200]: 2025-11-01 04:36:47.932 [INFO][3941] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:47.937872 env[1200]: 2025-11-01 04:36:47.935 [INFO][3934] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a" Nov 1 04:36:47.937872 env[1200]: time="2025-11-01T04:36:47.937501040Z" level=info msg="TearDown network for sandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\" successfully" Nov 1 04:36:47.941824 env[1200]: time="2025-11-01T04:36:47.941715623Z" level=info msg="RemovePodSandbox \"cc3cca8af7eeb61ecaae234ca68a73265222737fa092a71a1603e4ddeeda1e7a\" returns successfully" Nov 1 04:36:51.098558 env[1200]: time="2025-11-01T04:36:51.097509670Z" level=info msg="StopPodSandbox for \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\"" Nov 1 04:36:51.098558 env[1200]: time="2025-11-01T04:36:51.097968421Z" level=info msg="StopPodSandbox for \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\"" Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.197 [INFO][3976] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.197 [INFO][3976] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" iface="eth0" netns="/var/run/netns/cni-67e7c19f-a867-612f-78f9-7edec92d2a78" Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.198 [INFO][3976] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" iface="eth0" netns="/var/run/netns/cni-67e7c19f-a867-612f-78f9-7edec92d2a78" Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.198 [INFO][3976] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" iface="eth0" netns="/var/run/netns/cni-67e7c19f-a867-612f-78f9-7edec92d2a78" Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.198 [INFO][3976] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.198 [INFO][3976] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.273 [INFO][3989] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" HandleID="k8s-pod-network.1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.273 [INFO][3989] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.273 [INFO][3989] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.283 [WARNING][3989] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" HandleID="k8s-pod-network.1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.284 [INFO][3989] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" HandleID="k8s-pod-network.1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.287 [INFO][3989] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:51.293908 env[1200]: 2025-11-01 04:36:51.291 [INFO][3976] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:36:51.302565 systemd[1]: run-netns-cni\x2d67e7c19f\x2da867\x2d612f\x2d78f9\x2d7edec92d2a78.mount: Deactivated successfully. Nov 1 04:36:51.306679 env[1200]: time="2025-11-01T04:36:51.306615678Z" level=info msg="TearDown network for sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\" successfully" Nov 1 04:36:51.306810 env[1200]: time="2025-11-01T04:36:51.306776551Z" level=info msg="StopPodSandbox for \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\" returns successfully" Nov 1 04:36:51.308344 env[1200]: time="2025-11-01T04:36:51.308305501Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d5d4c457c-d2k4h,Uid:a466af82-23ad-4581-8753-4ea82dbddbf8,Namespace:calico-apiserver,Attempt:1,}" Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.227 [INFO][3977] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.227 [INFO][3977] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" iface="eth0" netns="/var/run/netns/cni-68234ae0-782a-2d3a-9204-2ce5e41f8198" Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.228 [INFO][3977] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" iface="eth0" netns="/var/run/netns/cni-68234ae0-782a-2d3a-9204-2ce5e41f8198" Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.230 [INFO][3977] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" iface="eth0" netns="/var/run/netns/cni-68234ae0-782a-2d3a-9204-2ce5e41f8198" Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.230 [INFO][3977] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.230 [INFO][3977] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.313 [INFO][3994] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" HandleID="k8s-pod-network.9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.314 [INFO][3994] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.314 [INFO][3994] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.338 [WARNING][3994] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" HandleID="k8s-pod-network.9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.338 [INFO][3994] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" HandleID="k8s-pod-network.9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.343 [INFO][3994] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:51.347625 env[1200]: 2025-11-01 04:36:51.345 [INFO][3977] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:36:51.355458 systemd[1]: run-netns-cni\x2d68234ae0\x2d782a\x2d2d3a\x2d9204\x2d2ce5e41f8198.mount: Deactivated successfully. Nov 1 04:36:51.357215 env[1200]: time="2025-11-01T04:36:51.357160467Z" level=info msg="TearDown network for sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\" successfully" Nov 1 04:36:51.357396 env[1200]: time="2025-11-01T04:36:51.357353831Z" level=info msg="StopPodSandbox for \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\" returns successfully" Nov 1 04:36:51.360075 env[1200]: time="2025-11-01T04:36:51.360024100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-pfkdh,Uid:2dc02a63-186f-4d13-a96f-fb0c7f4c930f,Namespace:kube-system,Attempt:1,}" Nov 1 04:36:51.599207 systemd-networkd[1027]: cali1e15f3d12bf: Link UP Nov 1 04:36:51.604631 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 04:36:51.604791 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1e15f3d12bf: link becomes ready Nov 1 04:36:51.606400 systemd-networkd[1027]: cali1e15f3d12bf: Gained carrier Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.417 [INFO][4004] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0 calico-apiserver-d5d4c457c- calico-apiserver a466af82-23ad-4581-8753-4ea82dbddbf8 1045 0 2025-11-01 04:36:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:d5d4c457c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-cigeh.gb1.brightbox.com calico-apiserver-d5d4c457c-d2k4h eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1e15f3d12bf [] [] }} ContainerID="2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-d2k4h" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-" Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.417 [INFO][4004] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-d2k4h" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.480 [INFO][4026] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" HandleID="k8s-pod-network.2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.482 [INFO][4026] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" HandleID="k8s-pod-network.2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025d030), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-cigeh.gb1.brightbox.com", "pod":"calico-apiserver-d5d4c457c-d2k4h", "timestamp":"2025-11-01 04:36:51.480853309 +0000 UTC"}, Hostname:"srv-cigeh.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.483 [INFO][4026] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.483 [INFO][4026] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.483 [INFO][4026] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cigeh.gb1.brightbox.com' Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.494 [INFO][4026] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.511 [INFO][4026] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.535 [INFO][4026] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.539 [INFO][4026] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.549 [INFO][4026] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.549 [INFO][4026] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.552 [INFO][4026] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7 Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.564 [INFO][4026] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.580 [INFO][4026] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.75.196/26] block=192.168.75.192/26 handle="k8s-pod-network.2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.580 [INFO][4026] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.196/26] handle="k8s-pod-network.2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.580 [INFO][4026] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:51.643885 env[1200]: 2025-11-01 04:36:51.580 [INFO][4026] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.75.196/26] IPv6=[] ContainerID="2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" HandleID="k8s-pod-network.2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:36:51.646537 env[1200]: 2025-11-01 04:36:51.584 [INFO][4004] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-d2k4h" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0", GenerateName:"calico-apiserver-d5d4c457c-", Namespace:"calico-apiserver", SelfLink:"", UID:"a466af82-23ad-4581-8753-4ea82dbddbf8", ResourceVersion:"1045", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d5d4c457c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-d5d4c457c-d2k4h", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.75.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1e15f3d12bf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:51.646537 env[1200]: 2025-11-01 04:36:51.584 [INFO][4004] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.196/32] ContainerID="2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-d2k4h" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:36:51.646537 env[1200]: 2025-11-01 04:36:51.585 [INFO][4004] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1e15f3d12bf ContainerID="2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-d2k4h" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:36:51.646537 env[1200]: 2025-11-01 04:36:51.609 [INFO][4004] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-d2k4h" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:36:51.646537 env[1200]: 2025-11-01 04:36:51.609 [INFO][4004] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-d2k4h" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0", GenerateName:"calico-apiserver-d5d4c457c-", Namespace:"calico-apiserver", SelfLink:"", UID:"a466af82-23ad-4581-8753-4ea82dbddbf8", ResourceVersion:"1045", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d5d4c457c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7", Pod:"calico-apiserver-d5d4c457c-d2k4h", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.75.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1e15f3d12bf", MAC:"22:60:4d:fd:1d:87", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:51.646537 env[1200]: 2025-11-01 04:36:51.633 [INFO][4004] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-d2k4h" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:36:51.720846 kernel: kauditd_printk_skb: 196 callbacks suppressed Nov 1 04:36:51.721057 kernel: audit: type=1325 audit(1761971811.700:1240): table=filter:115 family=2 entries=58 op=nft_register_chain pid=4059 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 04:36:51.721162 kernel: audit: type=1300 audit(1761971811.700:1240): arch=c000003e syscall=46 success=yes exit=30584 a0=3 a1=7ffec90370b0 a2=0 a3=7ffec903709c items=0 ppid=3448 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.700000 audit[4059]: NETFILTER_CFG table=filter:115 family=2 entries=58 op=nft_register_chain pid=4059 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 04:36:51.700000 audit[4059]: SYSCALL arch=c000003e syscall=46 success=yes exit=30584 a0=3 a1=7ffec90370b0 a2=0 a3=7ffec903709c items=0 ppid=3448 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.723110 env[1200]: time="2025-11-01T04:36:51.694395723Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:36:51.723110 env[1200]: time="2025-11-01T04:36:51.694489879Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:36:51.723110 env[1200]: time="2025-11-01T04:36:51.694508687Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:36:51.723110 env[1200]: time="2025-11-01T04:36:51.694813837Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7 pid=4057 runtime=io.containerd.runc.v2 Nov 1 04:36:51.700000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 04:36:51.735546 kernel: audit: type=1327 audit(1761971811.700:1240): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 04:36:51.734671 systemd[1]: Started cri-containerd-2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7.scope. Nov 1 04:36:51.756466 systemd-networkd[1027]: calidc28ba35aa0: Link UP Nov 1 04:36:51.760155 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidc28ba35aa0: link becomes ready Nov 1 04:36:51.760182 systemd-networkd[1027]: calidc28ba35aa0: Gained carrier Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.466 [INFO][4014] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0 coredns-674b8bbfcf- kube-system 2dc02a63-186f-4d13-a96f-fb0c7f4c930f 1047 0 2025-11-01 04:35:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-cigeh.gb1.brightbox.com coredns-674b8bbfcf-pfkdh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calidc28ba35aa0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" Namespace="kube-system" Pod="coredns-674b8bbfcf-pfkdh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-" Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.467 [INFO][4014] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" Namespace="kube-system" Pod="coredns-674b8bbfcf-pfkdh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.562 [INFO][4034] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" HandleID="k8s-pod-network.a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.562 [INFO][4034] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" HandleID="k8s-pod-network.a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d55a0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-cigeh.gb1.brightbox.com", "pod":"coredns-674b8bbfcf-pfkdh", "timestamp":"2025-11-01 04:36:51.562497699 +0000 UTC"}, Hostname:"srv-cigeh.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.563 [INFO][4034] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.580 [INFO][4034] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.581 [INFO][4034] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cigeh.gb1.brightbox.com' Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.606 [INFO][4034] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.621 [INFO][4034] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.648 [INFO][4034] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.652 [INFO][4034] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.655 [INFO][4034] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.656 [INFO][4034] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.661 [INFO][4034] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1 Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.670 [INFO][4034] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.683 [INFO][4034] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.75.197/26] block=192.168.75.192/26 handle="k8s-pod-network.a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.683 [INFO][4034] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.197/26] handle="k8s-pod-network.a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.683 [INFO][4034] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:51.781896 env[1200]: 2025-11-01 04:36:51.684 [INFO][4034] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.75.197/26] IPv6=[] ContainerID="a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" HandleID="k8s-pod-network.a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:36:51.783248 env[1200]: 2025-11-01 04:36:51.687 [INFO][4014] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" Namespace="kube-system" Pod="coredns-674b8bbfcf-pfkdh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"2dc02a63-186f-4d13-a96f-fb0c7f4c930f", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 35, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"", Pod:"coredns-674b8bbfcf-pfkdh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidc28ba35aa0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:51.783248 env[1200]: 2025-11-01 04:36:51.687 [INFO][4014] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.197/32] ContainerID="a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" Namespace="kube-system" Pod="coredns-674b8bbfcf-pfkdh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:36:51.783248 env[1200]: 2025-11-01 04:36:51.687 [INFO][4014] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidc28ba35aa0 ContainerID="a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" Namespace="kube-system" Pod="coredns-674b8bbfcf-pfkdh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:36:51.783248 env[1200]: 2025-11-01 04:36:51.762 [INFO][4014] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" Namespace="kube-system" Pod="coredns-674b8bbfcf-pfkdh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:36:51.783248 env[1200]: 2025-11-01 04:36:51.762 [INFO][4014] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" Namespace="kube-system" Pod="coredns-674b8bbfcf-pfkdh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"2dc02a63-186f-4d13-a96f-fb0c7f4c930f", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 35, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1", Pod:"coredns-674b8bbfcf-pfkdh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidc28ba35aa0", MAC:"32:90:1b:5e:1e:b3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:51.783248 env[1200]: 2025-11-01 04:36:51.779 [INFO][4014] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1" Namespace="kube-system" Pod="coredns-674b8bbfcf-pfkdh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:36:51.814996 env[1200]: time="2025-11-01T04:36:51.812150343Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:36:51.814996 env[1200]: time="2025-11-01T04:36:51.812292918Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:36:51.814996 env[1200]: time="2025-11-01T04:36:51.812366189Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:36:51.815746 env[1200]: time="2025-11-01T04:36:51.815474290Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1 pid=4104 runtime=io.containerd.runc.v2 Nov 1 04:36:51.833592 kernel: audit: type=1400 audit(1761971811.822:1241): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833792 kernel: audit: type=1400 audit(1761971811.822:1242): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.842807 kernel: audit: type=1400 audit(1761971811.822:1243): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.853818 kernel: audit: type=1400 audit(1761971811.822:1244): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.853911 kernel: audit: type=1400 audit(1761971811.822:1245): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.861245 kernel: audit: type=1400 audit(1761971811.822:1246): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.866561 systemd[1]: Started cri-containerd-a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1.scope. Nov 1 04:36:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.873238 kernel: audit: type=1400 audit(1761971811.822:1247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit: BPF prog-id=177 op=LOAD Nov 1 04:36:51.823000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit[4071]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4057 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356635326466616430313339366539643534623063393038303139 Nov 1 04:36:51.823000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit[4071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4057 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356635326466616430313339366539643534623063393038303139 Nov 1 04:36:51.823000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.823000 audit: BPF prog-id=178 op=LOAD Nov 1 04:36:51.823000 audit[4071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ccd70 items=0 ppid=4057 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356635326466616430313339366539643534623063393038303139 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit: BPF prog-id=179 op=LOAD Nov 1 04:36:51.833000 audit[4071]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ccdb8 items=0 ppid=4057 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356635326466616430313339366539643534623063393038303139 Nov 1 04:36:51.833000 audit: BPF prog-id=179 op=UNLOAD Nov 1 04:36:51.833000 audit: BPF prog-id=178 op=UNLOAD Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { perfmon } for pid=4071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit[4071]: AVC avc: denied { bpf } for pid=4071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.833000 audit: BPF prog-id=180 op=LOAD Nov 1 04:36:51.833000 audit[4071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cd1c8 items=0 ppid=4057 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262356635326466616430313339366539643534623063393038303139 Nov 1 04:36:51.854000 audit[4123]: NETFILTER_CFG table=filter:116 family=2 entries=44 op=nft_register_chain pid=4123 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 04:36:51.854000 audit[4123]: SYSCALL arch=c000003e syscall=46 success=yes exit=21532 a0=3 a1=7ffdc2aedae0 a2=0 a3=7ffdc2aedacc items=0 ppid=3448 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.854000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 04:36:51.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.895000 audit: BPF prog-id=181 op=LOAD Nov 1 04:36:51.896000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.896000 audit[4117]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4104 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135653965313838343037393364373934613237643761393736353066 Nov 1 04:36:51.896000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.896000 audit[4117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4104 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135653965313838343037393364373934613237643761393736353066 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit: BPF prog-id=182 op=LOAD Nov 1 04:36:51.899000 audit[4117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00026dea0 items=0 ppid=4104 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135653965313838343037393364373934613237643761393736353066 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit: BPF prog-id=183 op=LOAD Nov 1 04:36:51.899000 audit[4117]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00026dee8 items=0 ppid=4104 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135653965313838343037393364373934613237643761393736353066 Nov 1 04:36:51.899000 audit: BPF prog-id=183 op=UNLOAD Nov 1 04:36:51.899000 audit: BPF prog-id=182 op=UNLOAD Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:51.899000 audit: BPF prog-id=184 op=LOAD Nov 1 04:36:51.899000 audit[4117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e42f8 items=0 ppid=4104 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:51.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135653965313838343037393364373934613237643761393736353066 Nov 1 04:36:51.961190 env[1200]: time="2025-11-01T04:36:51.960991464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d5d4c457c-d2k4h,Uid:a466af82-23ad-4581-8753-4ea82dbddbf8,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7\"" Nov 1 04:36:51.963549 env[1200]: time="2025-11-01T04:36:51.961418265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-pfkdh,Uid:2dc02a63-186f-4d13-a96f-fb0c7f4c930f,Namespace:kube-system,Attempt:1,} returns sandbox id \"a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1\"" Nov 1 04:36:52.004255 env[1200]: time="2025-11-01T04:36:52.001439117Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 04:36:52.028371 env[1200]: time="2025-11-01T04:36:52.028096031Z" level=info msg="CreateContainer within sandbox \"a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Nov 1 04:36:52.052895 env[1200]: time="2025-11-01T04:36:52.052827365Z" level=info msg="CreateContainer within sandbox \"a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"5c7eef9419ba38bfb1cc0c1e413aad4935e33ddfc657bdfcdda002f69060d55e\"" Nov 1 04:36:52.062684 env[1200]: time="2025-11-01T04:36:52.060694315Z" level=info msg="StartContainer for \"5c7eef9419ba38bfb1cc0c1e413aad4935e33ddfc657bdfcdda002f69060d55e\"" Nov 1 04:36:52.087905 systemd[1]: Started cri-containerd-5c7eef9419ba38bfb1cc0c1e413aad4935e33ddfc657bdfcdda002f69060d55e.scope. Nov 1 04:36:52.095900 env[1200]: time="2025-11-01T04:36:52.095848566Z" level=info msg="StopPodSandbox for \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\"" Nov 1 04:36:52.097056 env[1200]: time="2025-11-01T04:36:52.097015382Z" level=info msg="StopPodSandbox for \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\"" Nov 1 04:36:52.105020 env[1200]: time="2025-11-01T04:36:52.097557855Z" level=info msg="StopPodSandbox for \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\"" Nov 1 04:36:52.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.149000 audit: BPF prog-id=185 op=LOAD Nov 1 04:36:52.150000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.150000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4104 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:52.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376565663934313962613338626662316363306331653431336161 Nov 1 04:36:52.150000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.150000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4104 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:52.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376565663934313962613338626662316363306331653431336161 Nov 1 04:36:52.150000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.150000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.150000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.150000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.150000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.150000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.150000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.150000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.150000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.150000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.150000 audit: BPF prog-id=186 op=LOAD Nov 1 04:36:52.150000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000298150 items=0 ppid=4104 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:52.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376565663934313962613338626662316363306331653431336161 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit: BPF prog-id=187 op=LOAD Nov 1 04:36:52.151000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000298198 items=0 ppid=4104 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:52.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376565663934313962613338626662316363306331653431336161 Nov 1 04:36:52.151000 audit: BPF prog-id=187 op=UNLOAD Nov 1 04:36:52.151000 audit: BPF prog-id=186 op=UNLOAD Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { perfmon } for pid=4154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit[4154]: AVC avc: denied { bpf } for pid=4154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:52.151000 audit: BPF prog-id=188 op=LOAD Nov 1 04:36:52.151000 audit[4154]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002985a8 items=0 ppid=4104 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:52.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563376565663934313962613338626662316363306331653431336161 Nov 1 04:36:52.292865 env[1200]: time="2025-11-01T04:36:52.292572170Z" level=info msg="StartContainer for \"5c7eef9419ba38bfb1cc0c1e413aad4935e33ddfc657bdfcdda002f69060d55e\" returns successfully" Nov 1 04:36:52.316017 env[1200]: time="2025-11-01T04:36:52.315517465Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:36:52.317014 env[1200]: time="2025-11-01T04:36:52.316956690Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 04:36:52.321779 kubelet[2011]: E1101 04:36:52.319133 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:36:52.322906 kubelet[2011]: E1101 04:36:52.322690 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:36:52.330130 kubelet[2011]: E1101 04:36:52.325784 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-m4ggz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d5d4c457c-d2k4h_calico-apiserver(a466af82-23ad-4581-8753-4ea82dbddbf8): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 04:36:52.330130 kubelet[2011]: E1101 04:36:52.327021 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8" Nov 1 04:36:52.368000 audit[4193]: AVC avc: denied { getattr } for pid=4193 comm="coredns" path="cgroup:[4026532883]" dev="nsfs" ino=4026532883 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c474 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Nov 1 04:36:52.368000 audit[4193]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a3d8 a2=c00012a038 a3=0 items=0 ppid=4104 pid=4193 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c474 key=(null) Nov 1 04:36:52.368000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.275 [INFO][4196] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.276 [INFO][4196] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" iface="eth0" netns="/var/run/netns/cni-66a619b7-2cca-f7bf-856d-025b1d194b66" Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.276 [INFO][4196] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" iface="eth0" netns="/var/run/netns/cni-66a619b7-2cca-f7bf-856d-025b1d194b66" Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.277 [INFO][4196] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" iface="eth0" netns="/var/run/netns/cni-66a619b7-2cca-f7bf-856d-025b1d194b66" Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.281 [INFO][4196] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.281 [INFO][4196] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.470 [INFO][4222] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" HandleID="k8s-pod-network.87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Workload="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.470 [INFO][4222] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.471 [INFO][4222] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.514 [WARNING][4222] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" HandleID="k8s-pod-network.87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Workload="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.514 [INFO][4222] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" HandleID="k8s-pod-network.87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Workload="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.520 [INFO][4222] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:52.530787 env[1200]: 2025-11-01 04:36:52.528 [INFO][4196] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:36:52.534693 systemd[1]: run-netns-cni\x2d66a619b7\x2d2cca\x2df7bf\x2d856d\x2d025b1d194b66.mount: Deactivated successfully. Nov 1 04:36:52.536757 env[1200]: time="2025-11-01T04:36:52.536678620Z" level=info msg="TearDown network for sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\" successfully" Nov 1 04:36:52.536878 env[1200]: time="2025-11-01T04:36:52.536756217Z" level=info msg="StopPodSandbox for \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\" returns successfully" Nov 1 04:36:52.540103 env[1200]: time="2025-11-01T04:36:52.540060243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-klqkh,Uid:9a35816c-1be0-4aa2-bf66-79617ab8330f,Namespace:calico-system,Attempt:1,}" Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.379 [INFO][4197] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.379 [INFO][4197] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" iface="eth0" netns="/var/run/netns/cni-d8f8ed9c-f1bb-5863-c2b0-a68bd2cdd798" Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.379 [INFO][4197] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" iface="eth0" netns="/var/run/netns/cni-d8f8ed9c-f1bb-5863-c2b0-a68bd2cdd798" Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.379 [INFO][4197] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" iface="eth0" netns="/var/run/netns/cni-d8f8ed9c-f1bb-5863-c2b0-a68bd2cdd798" Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.379 [INFO][4197] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.379 [INFO][4197] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.471 [INFO][4235] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" HandleID="k8s-pod-network.e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Workload="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.471 [INFO][4235] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.520 [INFO][4235] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.540 [WARNING][4235] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" HandleID="k8s-pod-network.e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Workload="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.540 [INFO][4235] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" HandleID="k8s-pod-network.e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Workload="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.547 [INFO][4235] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:52.555999 env[1200]: 2025-11-01 04:36:52.550 [INFO][4197] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:36:52.561250 systemd[1]: run-netns-cni\x2dd8f8ed9c\x2df1bb\x2d5863\x2dc2b0\x2da68bd2cdd798.mount: Deactivated successfully. Nov 1 04:36:52.561876 env[1200]: time="2025-11-01T04:36:52.561816801Z" level=info msg="TearDown network for sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\" successfully" Nov 1 04:36:52.562090 env[1200]: time="2025-11-01T04:36:52.562045865Z" level=info msg="StopPodSandbox for \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\" returns successfully" Nov 1 04:36:52.564257 env[1200]: time="2025-11-01T04:36:52.564219389Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xqtpq,Uid:ccda356b-9c43-49d4-bc40-aea58a266a51,Namespace:calico-system,Attempt:1,}" Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.401 [INFO][4198] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.401 [INFO][4198] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" iface="eth0" netns="/var/run/netns/cni-01d390e6-b75e-2446-883d-e5212f2931d3" Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.401 [INFO][4198] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" iface="eth0" netns="/var/run/netns/cni-01d390e6-b75e-2446-883d-e5212f2931d3" Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.402 [INFO][4198] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" iface="eth0" netns="/var/run/netns/cni-01d390e6-b75e-2446-883d-e5212f2931d3" Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.402 [INFO][4198] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.402 [INFO][4198] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.484 [INFO][4240] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" HandleID="k8s-pod-network.1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.485 [INFO][4240] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.549 [INFO][4240] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.567 [WARNING][4240] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" HandleID="k8s-pod-network.1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.568 [INFO][4240] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" HandleID="k8s-pod-network.1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.576 [INFO][4240] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:52.591447 env[1200]: 2025-11-01 04:36:52.583 [INFO][4198] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:36:52.595841 systemd[1]: run-netns-cni\x2d01d390e6\x2db75e\x2d2446\x2d883d\x2de5212f2931d3.mount: Deactivated successfully. Nov 1 04:36:52.601228 env[1200]: time="2025-11-01T04:36:52.600644023Z" level=info msg="TearDown network for sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\" successfully" Nov 1 04:36:52.601228 env[1200]: time="2025-11-01T04:36:52.600728800Z" level=info msg="StopPodSandbox for \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\" returns successfully" Nov 1 04:36:52.605533 env[1200]: time="2025-11-01T04:36:52.605492513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d5d4c457c-bzssw,Uid:25204a16-ec6d-4388-9ea1-9773f8c99782,Namespace:calico-apiserver,Attempt:1,}" Nov 1 04:36:52.617012 kubelet[2011]: E1101 04:36:52.614982 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8" Nov 1 04:36:52.692142 kubelet[2011]: I1101 04:36:52.682025 2011 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-pfkdh" podStartSLOduration=60.680176933 podStartE2EDuration="1m0.680176933s" podCreationTimestamp="2025-11-01 04:35:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-11-01 04:36:52.675520046 +0000 UTC m=+65.944109462" watchObservedRunningTime="2025-11-01 04:36:52.680176933 +0000 UTC m=+65.948766336" Nov 1 04:36:52.764000 audit[4285]: NETFILTER_CFG table=filter:117 family=2 entries=14 op=nft_register_rule pid=4285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:52.764000 audit[4285]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc4923f6e0 a2=0 a3=7ffc4923f6cc items=0 ppid=2119 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:52.764000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:52.772000 audit[4285]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:52.772000 audit[4285]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc4923f6e0 a2=0 a3=7ffc4923f6cc items=0 ppid=2119 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:52.772000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:52.808000 audit[4289]: NETFILTER_CFG table=filter:119 family=2 entries=14 op=nft_register_rule pid=4289 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:52.808000 audit[4289]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff7425b510 a2=0 a3=7fff7425b4fc items=0 ppid=2119 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:52.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:52.851000 audit[4289]: NETFILTER_CFG table=nat:120 family=2 entries=56 op=nft_register_chain pid=4289 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:52.851000 audit[4289]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff7425b510 a2=0 a3=7fff7425b4fc items=0 ppid=2119 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:52.851000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:52.967224 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Nov 1 04:36:52.967506 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali20620852a90: link becomes ready Nov 1 04:36:52.969730 systemd-networkd[1027]: cali20620852a90: Link UP Nov 1 04:36:52.972396 systemd-networkd[1027]: cali20620852a90: Gained carrier Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.763 [INFO][4253] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0 goldmane-666569f655- calico-system 9a35816c-1be0-4aa2-bf66-79617ab8330f 1061 0 2025-11-01 04:36:08 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:666569f655 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s srv-cigeh.gb1.brightbox.com goldmane-666569f655-klqkh eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali20620852a90 [] [] }} ContainerID="2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" Namespace="calico-system" Pod="goldmane-666569f655-klqkh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-" Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.763 [INFO][4253] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" Namespace="calico-system" Pod="goldmane-666569f655-klqkh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.868 [INFO][4290] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" HandleID="k8s-pod-network.2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" Workload="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.877 [INFO][4290] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" HandleID="k8s-pod-network.2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" Workload="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cd960), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-cigeh.gb1.brightbox.com", "pod":"goldmane-666569f655-klqkh", "timestamp":"2025-11-01 04:36:52.868214133 +0000 UTC"}, Hostname:"srv-cigeh.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.879 [INFO][4290] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.879 [INFO][4290] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.879 [INFO][4290] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cigeh.gb1.brightbox.com' Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.891 [INFO][4290] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.898 [INFO][4290] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.907 [INFO][4290] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.912 [INFO][4290] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.919 [INFO][4290] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.919 [INFO][4290] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.924 [INFO][4290] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7 Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.932 [INFO][4290] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.943 [INFO][4290] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.75.198/26] block=192.168.75.192/26 handle="k8s-pod-network.2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.943 [INFO][4290] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.198/26] handle="k8s-pod-network.2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.943 [INFO][4290] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:53.012514 env[1200]: 2025-11-01 04:36:52.945 [INFO][4290] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.75.198/26] IPv6=[] ContainerID="2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" HandleID="k8s-pod-network.2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" Workload="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:36:53.014049 env[1200]: 2025-11-01 04:36:52.948 [INFO][4253] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" Namespace="calico-system" Pod="goldmane-666569f655-klqkh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"9a35816c-1be0-4aa2-bf66-79617ab8330f", ResourceVersion:"1061", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"", Pod:"goldmane-666569f655-klqkh", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.75.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali20620852a90", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:53.014049 env[1200]: 2025-11-01 04:36:52.949 [INFO][4253] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.198/32] ContainerID="2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" Namespace="calico-system" Pod="goldmane-666569f655-klqkh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:36:53.014049 env[1200]: 2025-11-01 04:36:52.949 [INFO][4253] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali20620852a90 ContainerID="2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" Namespace="calico-system" Pod="goldmane-666569f655-klqkh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:36:53.014049 env[1200]: 2025-11-01 04:36:52.974 [INFO][4253] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" Namespace="calico-system" Pod="goldmane-666569f655-klqkh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:36:53.014049 env[1200]: 2025-11-01 04:36:52.977 [INFO][4253] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" Namespace="calico-system" Pod="goldmane-666569f655-klqkh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"9a35816c-1be0-4aa2-bf66-79617ab8330f", ResourceVersion:"1061", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7", Pod:"goldmane-666569f655-klqkh", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.75.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali20620852a90", MAC:"9e:aa:28:23:b6:c3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:53.014049 env[1200]: 2025-11-01 04:36:53.005 [INFO][4253] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7" Namespace="calico-system" Pod="goldmane-666569f655-klqkh" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:36:53.046598 env[1200]: time="2025-11-01T04:36:53.046479403Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:36:53.046947 env[1200]: time="2025-11-01T04:36:53.046573668Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:36:53.046947 env[1200]: time="2025-11-01T04:36:53.046897474Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:36:53.047481 env[1200]: time="2025-11-01T04:36:53.047399985Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7 pid=4335 runtime=io.containerd.runc.v2 Nov 1 04:36:53.063901 systemd-networkd[1027]: cali8f0b874de3b: Link UP Nov 1 04:36:53.070140 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8f0b874de3b: link becomes ready Nov 1 04:36:53.070071 systemd-networkd[1027]: cali8f0b874de3b: Gained carrier Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:52.812 [INFO][4275] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0 calico-apiserver-d5d4c457c- calico-apiserver 25204a16-ec6d-4388-9ea1-9773f8c99782 1066 0 2025-11-01 04:36:04 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:d5d4c457c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-cigeh.gb1.brightbox.com calico-apiserver-d5d4c457c-bzssw eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8f0b874de3b [] [] }} ContainerID="aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-bzssw" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-" Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:52.813 [INFO][4275] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-bzssw" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:52.902 [INFO][4300] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" HandleID="k8s-pod-network.aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:52.903 [INFO][4300] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" HandleID="k8s-pod-network.aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5030), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-cigeh.gb1.brightbox.com", "pod":"calico-apiserver-d5d4c457c-bzssw", "timestamp":"2025-11-01 04:36:52.90289783 +0000 UTC"}, Hostname:"srv-cigeh.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:52.903 [INFO][4300] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:52.943 [INFO][4300] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:52.943 [INFO][4300] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cigeh.gb1.brightbox.com' Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:52.993 [INFO][4300] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:53.006 [INFO][4300] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:53.016 [INFO][4300] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:53.020 [INFO][4300] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:53.024 [INFO][4300] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:53.024 [INFO][4300] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:53.026 [INFO][4300] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752 Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:53.035 [INFO][4300] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:53.050 [INFO][4300] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.75.199/26] block=192.168.75.192/26 handle="k8s-pod-network.aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:53.050 [INFO][4300] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.199/26] handle="k8s-pod-network.aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:53.050 [INFO][4300] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:53.106371 env[1200]: 2025-11-01 04:36:53.050 [INFO][4300] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.75.199/26] IPv6=[] ContainerID="aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" HandleID="k8s-pod-network.aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:36:53.108722 env[1200]: 2025-11-01 04:36:53.054 [INFO][4275] cni-plugin/k8s.go 418: Populated endpoint ContainerID="aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-bzssw" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0", GenerateName:"calico-apiserver-d5d4c457c-", Namespace:"calico-apiserver", SelfLink:"", UID:"25204a16-ec6d-4388-9ea1-9773f8c99782", ResourceVersion:"1066", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d5d4c457c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-d5d4c457c-bzssw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.75.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8f0b874de3b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:53.108722 env[1200]: 2025-11-01 04:36:53.054 [INFO][4275] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.199/32] ContainerID="aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-bzssw" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:36:53.108722 env[1200]: 2025-11-01 04:36:53.054 [INFO][4275] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8f0b874de3b ContainerID="aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-bzssw" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:36:53.108722 env[1200]: 2025-11-01 04:36:53.072 [INFO][4275] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-bzssw" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:36:53.108722 env[1200]: 2025-11-01 04:36:53.073 [INFO][4275] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-bzssw" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0", GenerateName:"calico-apiserver-d5d4c457c-", Namespace:"calico-apiserver", SelfLink:"", UID:"25204a16-ec6d-4388-9ea1-9773f8c99782", ResourceVersion:"1066", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d5d4c457c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752", Pod:"calico-apiserver-d5d4c457c-bzssw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.75.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8f0b874de3b", MAC:"ea:1a:84:7c:c5:7d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:53.108722 env[1200]: 2025-11-01 04:36:53.099 [INFO][4275] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752" Namespace="calico-apiserver" Pod="calico-apiserver-d5d4c457c-bzssw" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:36:53.136267 systemd[1]: Started cri-containerd-2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7.scope. Nov 1 04:36:53.150000 audit[4365]: NETFILTER_CFG table=filter:121 family=2 entries=60 op=nft_register_chain pid=4365 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 04:36:53.154895 env[1200]: time="2025-11-01T04:36:53.154762014Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:36:53.155213 env[1200]: time="2025-11-01T04:36:53.155155619Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:36:53.155432 env[1200]: time="2025-11-01T04:36:53.155377484Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:36:53.156635 env[1200]: time="2025-11-01T04:36:53.156579884Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752 pid=4374 runtime=io.containerd.runc.v2 Nov 1 04:36:53.150000 audit[4365]: SYSCALL arch=c000003e syscall=46 success=yes exit=29932 a0=3 a1=7ffe8a798c40 a2=0 a3=7ffe8a798c2c items=0 ppid=3448 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.150000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 04:36:53.205381 systemd-networkd[1027]: cali1ef044cd8da: Link UP Nov 1 04:36:53.209278 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1ef044cd8da: link becomes ready Nov 1 04:36:53.209257 systemd-networkd[1027]: cali1ef044cd8da: Gained carrier Nov 1 04:36:53.239644 systemd[1]: Started cri-containerd-aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752.scope. Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:52.833 [INFO][4263] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0 csi-node-driver- calico-system ccda356b-9c43-49d4-bc40-aea58a266a51 1065 0 2025-11-01 04:36:10 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-cigeh.gb1.brightbox.com csi-node-driver-xqtpq eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali1ef044cd8da [] [] }} ContainerID="857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" Namespace="calico-system" Pod="csi-node-driver-xqtpq" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-" Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:52.833 [INFO][4263] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" Namespace="calico-system" Pod="csi-node-driver-xqtpq" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:52.940 [INFO][4305] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" HandleID="k8s-pod-network.857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" Workload="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:52.940 [INFO][4305] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" HandleID="k8s-pod-network.857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" Workload="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002516a0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-cigeh.gb1.brightbox.com", "pod":"csi-node-driver-xqtpq", "timestamp":"2025-11-01 04:36:52.940135639 +0000 UTC"}, Hostname:"srv-cigeh.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:52.940 [INFO][4305] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.050 [INFO][4305] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.050 [INFO][4305] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-cigeh.gb1.brightbox.com' Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.103 [INFO][4305] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.122 [INFO][4305] ipam/ipam.go 394: Looking up existing affinities for host host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.146 [INFO][4305] ipam/ipam.go 511: Trying affinity for 192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.156 [INFO][4305] ipam/ipam.go 158: Attempting to load block cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.163 [INFO][4305] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.75.192/26 host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.163 [INFO][4305] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.75.192/26 handle="k8s-pod-network.857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.175 [INFO][4305] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7 Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.184 [INFO][4305] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.75.192/26 handle="k8s-pod-network.857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.196 [INFO][4305] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.75.200/26] block=192.168.75.192/26 handle="k8s-pod-network.857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.196 [INFO][4305] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.75.200/26] handle="k8s-pod-network.857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" host="srv-cigeh.gb1.brightbox.com" Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.196 [INFO][4305] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:36:53.247375 env[1200]: 2025-11-01 04:36:53.196 [INFO][4305] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.75.200/26] IPv6=[] ContainerID="857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" HandleID="k8s-pod-network.857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" Workload="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:36:53.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit: BPF prog-id=189 op=LOAD Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4335 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633864333434623432346338616532666633326531326266376433 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4335 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633864333434623432346338616532666633326531326266376433 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit: BPF prog-id=190 op=LOAD Nov 1 04:36:53.248000 audit[4349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c80c0 items=0 ppid=4335 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633864333434623432346338616532666633326531326266376433 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.248000 audit: BPF prog-id=191 op=LOAD Nov 1 04:36:53.248000 audit[4349]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8108 items=0 ppid=4335 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633864333434623432346338616532666633326531326266376433 Nov 1 04:36:53.249000 audit: BPF prog-id=191 op=UNLOAD Nov 1 04:36:53.249000 audit: BPF prog-id=190 op=UNLOAD Nov 1 04:36:53.249000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.249000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.249000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.249000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.249000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.249000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.249000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.249000 audit[4349]: AVC avc: denied { perfmon } for pid=4349 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.249000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.249000 audit[4349]: AVC avc: denied { bpf } for pid=4349 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.249000 audit: BPF prog-id=192 op=LOAD Nov 1 04:36:53.249000 audit[4349]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c8518 items=0 ppid=4335 pid=4349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633864333434623432346338616532666633326531326266376433 Nov 1 04:36:53.261300 env[1200]: 2025-11-01 04:36:53.200 [INFO][4263] cni-plugin/k8s.go 418: Populated endpoint ContainerID="857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" Namespace="calico-system" Pod="csi-node-driver-xqtpq" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ccda356b-9c43-49d4-bc40-aea58a266a51", ResourceVersion:"1065", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-xqtpq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1ef044cd8da", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:53.261300 env[1200]: 2025-11-01 04:36:53.200 [INFO][4263] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.75.200/32] ContainerID="857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" Namespace="calico-system" Pod="csi-node-driver-xqtpq" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:36:53.261300 env[1200]: 2025-11-01 04:36:53.200 [INFO][4263] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1ef044cd8da ContainerID="857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" Namespace="calico-system" Pod="csi-node-driver-xqtpq" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:36:53.261300 env[1200]: 2025-11-01 04:36:53.210 [INFO][4263] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" Namespace="calico-system" Pod="csi-node-driver-xqtpq" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:36:53.261300 env[1200]: 2025-11-01 04:36:53.210 [INFO][4263] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" Namespace="calico-system" Pod="csi-node-driver-xqtpq" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ccda356b-9c43-49d4-bc40-aea58a266a51", ResourceVersion:"1065", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7", Pod:"csi-node-driver-xqtpq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1ef044cd8da", MAC:"d2:22:cf:86:8a:2c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:36:53.261300 env[1200]: 2025-11-01 04:36:53.243 [INFO][4263] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7" Namespace="calico-system" Pod="csi-node-driver-xqtpq" WorkloadEndpoint="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:36:53.288571 env[1200]: time="2025-11-01T04:36:53.288081690Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Nov 1 04:36:53.288571 env[1200]: time="2025-11-01T04:36:53.288167666Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Nov 1 04:36:53.288571 env[1200]: time="2025-11-01T04:36:53.288186795Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Nov 1 04:36:53.289760 env[1200]: time="2025-11-01T04:36:53.289683036Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7 pid=4417 runtime=io.containerd.runc.v2 Nov 1 04:36:53.347572 systemd[1]: Started cri-containerd-857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7.scope. Nov 1 04:36:53.368762 systemd[1]: run-containerd-runc-k8s.io-857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7-runc.cG1fTA.mount: Deactivated successfully. Nov 1 04:36:53.385477 systemd-networkd[1027]: cali1e15f3d12bf: Gained IPv6LL Nov 1 04:36:53.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.411000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.412000 audit: BPF prog-id=193 op=LOAD Nov 1 04:36:53.413000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.413000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4374 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161336362636135336236326537366338356138646133393664326639 Nov 1 04:36:53.416000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.416000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4374 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161336362636135336236326537366338356138646133393664326639 Nov 1 04:36:53.416000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.416000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.416000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.416000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.416000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.416000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.416000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.416000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.416000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.416000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.416000 audit: BPF prog-id=194 op=LOAD Nov 1 04:36:53.416000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e4420 items=0 ppid=4374 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161336362636135336236326537366338356138646133393664326639 Nov 1 04:36:53.417000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.417000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.417000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.417000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.417000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.417000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.417000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.417000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.417000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.417000 audit: BPF prog-id=195 op=LOAD Nov 1 04:36:53.417000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e4468 items=0 ppid=4374 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161336362636135336236326537366338356138646133393664326639 Nov 1 04:36:53.418000 audit: BPF prog-id=195 op=UNLOAD Nov 1 04:36:53.418000 audit: BPF prog-id=194 op=UNLOAD Nov 1 04:36:53.418000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.418000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.418000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.418000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.418000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.418000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.418000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.418000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.418000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.418000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.418000 audit: BPF prog-id=196 op=LOAD Nov 1 04:36:53.418000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e4878 items=0 ppid=4374 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161336362636135336236326537366338356138646133393664326639 Nov 1 04:36:53.437000 audit[4449]: NETFILTER_CFG table=filter:122 family=2 entries=57 op=nft_register_chain pid=4449 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 04:36:53.437000 audit[4449]: SYSCALL arch=c000003e syscall=46 success=yes exit=27828 a0=3 a1=7ffd058d1910 a2=0 a3=7ffd058d18fc items=0 ppid=3448 pid=4449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.437000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 04:36:53.441673 env[1200]: time="2025-11-01T04:36:53.441489311Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-klqkh,Uid:9a35816c-1be0-4aa2-bf66-79617ab8330f,Namespace:calico-system,Attempt:1,} returns sandbox id \"2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7\"" Nov 1 04:36:53.448875 env[1200]: time="2025-11-01T04:36:53.448816547Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Nov 1 04:36:53.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit: BPF prog-id=197 op=LOAD Nov 1 04:36:53.474000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4417 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835376630343733396664333864636364663730346530663039623932 Nov 1 04:36:53.474000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4417 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835376630343733396664333864636364663730346530663039623932 Nov 1 04:36:53.474000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.474000 audit: BPF prog-id=198 op=LOAD Nov 1 04:36:53.474000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001852e0 items=0 ppid=4417 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835376630343733396664333864636364663730346530663039623932 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit: BPF prog-id=199 op=LOAD Nov 1 04:36:53.475000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185328 items=0 ppid=4417 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835376630343733396664333864636364663730346530663039623932 Nov 1 04:36:53.475000 audit: BPF prog-id=199 op=UNLOAD Nov 1 04:36:53.475000 audit: BPF prog-id=198 op=UNLOAD Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Nov 1 04:36:53.475000 audit: BPF prog-id=200 op=LOAD Nov 1 04:36:53.475000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185738 items=0 ppid=4417 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835376630343733396664333864636364663730346530663039623932 Nov 1 04:36:53.503032 env[1200]: time="2025-11-01T04:36:53.502959707Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xqtpq,Uid:ccda356b-9c43-49d4-bc40-aea58a266a51,Namespace:calico-system,Attempt:1,} returns sandbox id \"857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7\"" Nov 1 04:36:53.513000 audit[4465]: NETFILTER_CFG table=filter:123 family=2 entries=66 op=nft_register_chain pid=4465 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Nov 1 04:36:53.513000 audit[4465]: SYSCALL arch=c000003e syscall=46 success=yes exit=29556 a0=3 a1=7ffd7858fbe0 a2=0 a3=7ffd7858fbcc items=0 ppid=3448 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:53.513000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Nov 1 04:36:53.533444 env[1200]: time="2025-11-01T04:36:53.533386786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-d5d4c457c-bzssw,Uid:25204a16-ec6d-4388-9ea1-9773f8c99782,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752\"" Nov 1 04:36:53.648566 kubelet[2011]: E1101 04:36:53.646728 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8" Nov 1 04:36:53.705461 systemd-networkd[1027]: calidc28ba35aa0: Gained IPv6LL Nov 1 04:36:53.768850 env[1200]: time="2025-11-01T04:36:53.768763032Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:36:53.769875 env[1200]: time="2025-11-01T04:36:53.769810583Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Nov 1 04:36:53.770385 kubelet[2011]: E1101 04:36:53.770272 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 04:36:53.774605 kubelet[2011]: E1101 04:36:53.774555 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 04:36:53.775622 env[1200]: time="2025-11-01T04:36:53.775275407Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 04:36:53.775738 kubelet[2011]: E1101 04:36:53.775570 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fl4cq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-klqkh_calico-system(9a35816c-1be0-4aa2-bf66-79617ab8330f): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Nov 1 04:36:53.777152 kubelet[2011]: E1101 04:36:53.776846 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-klqkh" podUID="9a35816c-1be0-4aa2-bf66-79617ab8330f" Nov 1 04:36:54.085911 env[1200]: time="2025-11-01T04:36:54.085797662Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:36:54.087060 env[1200]: time="2025-11-01T04:36:54.086987677Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 04:36:54.087441 kubelet[2011]: E1101 04:36:54.087387 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 04:36:54.087589 kubelet[2011]: E1101 04:36:54.087468 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 04:36:54.088554 env[1200]: time="2025-11-01T04:36:54.088189493Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 04:36:54.090277 kubelet[2011]: E1101 04:36:54.090201 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9dpjt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xqtpq_calico-system(ccda356b-9c43-49d4-bc40-aea58a266a51): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 04:36:54.345433 systemd-networkd[1027]: cali20620852a90: Gained IPv6LL Nov 1 04:36:54.409263 env[1200]: time="2025-11-01T04:36:54.409049882Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:36:54.410683 env[1200]: time="2025-11-01T04:36:54.410391333Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 04:36:54.412962 kubelet[2011]: E1101 04:36:54.411359 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:36:54.412962 kubelet[2011]: E1101 04:36:54.411496 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:36:54.412962 kubelet[2011]: E1101 04:36:54.411989 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vsjht,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d5d4c457c-bzssw_calico-apiserver(25204a16-ec6d-4388-9ea1-9773f8c99782): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 04:36:54.413436 env[1200]: time="2025-11-01T04:36:54.412841710Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 04:36:54.413850 kubelet[2011]: E1101 04:36:54.413723 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" podUID="25204a16-ec6d-4388-9ea1-9773f8c99782" Nov 1 04:36:54.642078 kubelet[2011]: E1101 04:36:54.641863 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" podUID="25204a16-ec6d-4388-9ea1-9773f8c99782" Nov 1 04:36:54.642994 kubelet[2011]: E1101 04:36:54.642934 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-klqkh" podUID="9a35816c-1be0-4aa2-bf66-79617ab8330f" Nov 1 04:36:54.665437 systemd-networkd[1027]: cali8f0b874de3b: Gained IPv6LL Nov 1 04:36:54.713000 audit[4485]: NETFILTER_CFG table=filter:124 family=2 entries=14 op=nft_register_rule pid=4485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:54.713000 audit[4485]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe32e0c890 a2=0 a3=7ffe32e0c87c items=0 ppid=2119 pid=4485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:54.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:54.718000 audit[4485]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:54.718000 audit[4485]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe32e0c890 a2=0 a3=7ffe32e0c87c items=0 ppid=2119 pid=4485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:54.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:54.723018 env[1200]: time="2025-11-01T04:36:54.722849815Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:36:54.724505 env[1200]: time="2025-11-01T04:36:54.724426737Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 04:36:54.724983 kubelet[2011]: E1101 04:36:54.724896 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 04:36:54.725620 kubelet[2011]: E1101 04:36:54.725583 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 04:36:54.726063 kubelet[2011]: E1101 04:36:54.725993 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9dpjt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xqtpq_calico-system(ccda356b-9c43-49d4-bc40-aea58a266a51): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 04:36:54.731945 kubelet[2011]: E1101 04:36:54.731855 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:54.745000 audit[4487]: NETFILTER_CFG table=filter:126 family=2 entries=14 op=nft_register_rule pid=4487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:54.745000 audit[4487]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffeeb054a70 a2=0 a3=7ffeeb054a5c items=0 ppid=2119 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:54.745000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:54.751000 audit[4487]: NETFILTER_CFG table=nat:127 family=2 entries=20 op=nft_register_rule pid=4487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:36:54.751000 audit[4487]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffeeb054a70 a2=0 a3=7ffeeb054a5c items=0 ppid=2119 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:36:54.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:36:54.793591 systemd-networkd[1027]: cali1ef044cd8da: Gained IPv6LL Nov 1 04:36:55.645416 kubelet[2011]: E1101 04:36:55.645268 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:36:56.099101 env[1200]: time="2025-11-01T04:36:56.098696443Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Nov 1 04:36:56.405779 env[1200]: time="2025-11-01T04:36:56.405439252Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:36:56.407248 env[1200]: time="2025-11-01T04:36:56.407068428Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Nov 1 04:36:56.407603 kubelet[2011]: E1101 04:36:56.407530 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 04:36:56.408143 kubelet[2011]: E1101 04:36:56.407617 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 04:36:56.408263 env[1200]: time="2025-11-01T04:36:56.408196397Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Nov 1 04:36:56.408569 kubelet[2011]: E1101 04:36:56.408510 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:ee5615a3b1d44da0ac00b8c4d31c8559,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-bw556,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6cbc5bd78f-jgqrs_calico-system(1f970c1e-fc1f-4851-ac5c-128a20d86234): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Nov 1 04:36:56.721598 env[1200]: time="2025-11-01T04:36:56.721043290Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:36:56.722717 env[1200]: time="2025-11-01T04:36:56.722546663Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Nov 1 04:36:56.723273 kubelet[2011]: E1101 04:36:56.723176 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 04:36:56.723528 kubelet[2011]: E1101 04:36:56.723484 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 04:36:56.724729 env[1200]: time="2025-11-01T04:36:56.724451653Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Nov 1 04:36:56.724975 kubelet[2011]: E1101 04:36:56.724179 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-s2gct,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-6d9b84d64-gh6zn_calico-system(a04c514c-f548-4854-abe7-a0adc995c889): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Nov 1 04:36:56.726885 kubelet[2011]: E1101 04:36:56.726800 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" podUID="a04c514c-f548-4854-abe7-a0adc995c889" Nov 1 04:36:57.029712 env[1200]: time="2025-11-01T04:36:57.029449794Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:36:57.030863 env[1200]: time="2025-11-01T04:36:57.030710949Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Nov 1 04:36:57.031347 kubelet[2011]: E1101 04:36:57.031294 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 04:36:57.031587 kubelet[2011]: E1101 04:36:57.031543 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 04:36:57.032342 kubelet[2011]: E1101 04:36:57.032177 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-bw556,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6cbc5bd78f-jgqrs_calico-system(1f970c1e-fc1f-4851-ac5c-128a20d86234): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Nov 1 04:36:57.033868 kubelet[2011]: E1101 04:36:57.033801 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6cbc5bd78f-jgqrs" podUID="1f970c1e-fc1f-4851-ac5c-128a20d86234" Nov 1 04:37:07.097341 env[1200]: time="2025-11-01T04:37:07.096668401Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 04:37:07.411462 env[1200]: time="2025-11-01T04:37:07.411212605Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:07.413180 env[1200]: time="2025-11-01T04:37:07.413007486Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 04:37:07.413660 kubelet[2011]: E1101 04:37:07.413582 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 04:37:07.414458 kubelet[2011]: E1101 04:37:07.414420 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 04:37:07.415011 env[1200]: time="2025-11-01T04:37:07.414975366Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 04:37:07.415518 kubelet[2011]: E1101 04:37:07.415051 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9dpjt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xqtpq_calico-system(ccda356b-9c43-49d4-bc40-aea58a266a51): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:07.719274 env[1200]: time="2025-11-01T04:37:07.718241703Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:07.719629 env[1200]: time="2025-11-01T04:37:07.719533038Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 04:37:07.719914 kubelet[2011]: E1101 04:37:07.719846 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:37:07.720012 kubelet[2011]: E1101 04:37:07.719925 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:37:07.720520 kubelet[2011]: E1101 04:37:07.720231 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vsjht,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d5d4c457c-bzssw_calico-apiserver(25204a16-ec6d-4388-9ea1-9773f8c99782): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:07.721686 env[1200]: time="2025-11-01T04:37:07.721229664Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 04:37:07.721986 kubelet[2011]: E1101 04:37:07.721895 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" podUID="25204a16-ec6d-4388-9ea1-9773f8c99782" Nov 1 04:37:08.029142 env[1200]: time="2025-11-01T04:37:08.029014209Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:08.035169 env[1200]: time="2025-11-01T04:37:08.035027195Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 04:37:08.035806 kubelet[2011]: E1101 04:37:08.035732 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:37:08.036000 kubelet[2011]: E1101 04:37:08.035966 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:37:08.036537 kubelet[2011]: E1101 04:37:08.036474 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-m4ggz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d5d4c457c-d2k4h_calico-apiserver(a466af82-23ad-4581-8753-4ea82dbddbf8): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:08.037561 env[1200]: time="2025-11-01T04:37:08.037474563Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Nov 1 04:37:08.038452 kubelet[2011]: E1101 04:37:08.038413 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8" Nov 1 04:37:08.358148 env[1200]: time="2025-11-01T04:37:08.357327416Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:08.364862 env[1200]: time="2025-11-01T04:37:08.364748997Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Nov 1 04:37:08.366054 kubelet[2011]: E1101 04:37:08.365558 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 04:37:08.366054 kubelet[2011]: E1101 04:37:08.365645 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 04:37:08.367371 env[1200]: time="2025-11-01T04:37:08.367331440Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 04:37:08.369623 kubelet[2011]: E1101 04:37:08.369363 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fl4cq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-klqkh_calico-system(9a35816c-1be0-4aa2-bf66-79617ab8330f): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:08.371195 kubelet[2011]: E1101 04:37:08.371110 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-klqkh" podUID="9a35816c-1be0-4aa2-bf66-79617ab8330f" Nov 1 04:37:08.747332 env[1200]: time="2025-11-01T04:37:08.747161551Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:08.749748 env[1200]: time="2025-11-01T04:37:08.749683788Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 04:37:08.750425 kubelet[2011]: E1101 04:37:08.750238 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 04:37:08.750425 kubelet[2011]: E1101 04:37:08.750327 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 04:37:08.751132 kubelet[2011]: E1101 04:37:08.751023 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9dpjt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xqtpq_calico-system(ccda356b-9c43-49d4-bc40-aea58a266a51): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:08.752688 kubelet[2011]: E1101 04:37:08.752631 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:37:10.093251 kubelet[2011]: E1101 04:37:10.093181 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" podUID="a04c514c-f548-4854-abe7-a0adc995c889" Nov 1 04:37:10.535266 systemd[1]: run-containerd-runc-k8s.io-e94866dd2eac4a2d9e9bdc40f6693a84a986f175738a6ef5840ae4839d9ad10c-runc.9N5tlE.mount: Deactivated successfully. Nov 1 04:37:11.100456 kubelet[2011]: E1101 04:37:11.100361 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6cbc5bd78f-jgqrs" podUID="1f970c1e-fc1f-4851-ac5c-128a20d86234" Nov 1 04:37:19.112741 kubelet[2011]: E1101 04:37:19.112508 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8" Nov 1 04:37:19.589011 systemd[1]: Started sshd@7-10.244.11.230:22-139.178.89.65:59486.service. Nov 1 04:37:19.600537 kernel: kauditd_printk_skb: 374 callbacks suppressed Nov 1 04:37:19.601153 kernel: audit: type=1130 audit(1761971839.589:1362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.11.230:22-139.178.89.65:59486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:19.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.11.230:22-139.178.89.65:59486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:20.094792 kubelet[2011]: E1101 04:37:20.094720 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:37:20.560000 audit[4527]: USER_ACCT pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:20.562573 sshd[4527]: Accepted publickey for core from 139.178.89.65 port 59486 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:37:20.568172 kernel: audit: type=1101 audit(1761971840.560:1363): pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:20.569000 audit[4527]: CRED_ACQ pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:20.580134 kernel: audit: type=1103 audit(1761971840.569:1364): pid=4527 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:20.580270 kernel: audit: type=1006 audit(1761971840.569:1365): pid=4527 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Nov 1 04:37:20.569000 audit[4527]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a640280 a2=3 a3=0 items=0 ppid=1 pid=4527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:37:20.569000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:37:20.587896 sshd[4527]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:37:20.589980 kernel: audit: type=1300 audit(1761971840.569:1365): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a640280 a2=3 a3=0 items=0 ppid=1 pid=4527 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:37:20.591479 kernel: audit: type=1327 audit(1761971840.569:1365): proctitle=737368643A20636F7265205B707269765D Nov 1 04:37:20.612735 systemd-logind[1191]: New session 8 of user core. Nov 1 04:37:20.616617 systemd[1]: Started session-8.scope. Nov 1 04:37:20.625000 audit[4527]: USER_START pid=4527 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:20.635152 kernel: audit: type=1105 audit(1761971840.625:1366): pid=4527 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:20.635000 audit[4529]: CRED_ACQ pid=4529 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:20.644156 kernel: audit: type=1103 audit(1761971840.635:1367): pid=4529 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:21.106819 kubelet[2011]: E1101 04:37:21.106729 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" podUID="25204a16-ec6d-4388-9ea1-9773f8c99782" Nov 1 04:37:22.025406 sshd[4527]: pam_unix(sshd:session): session closed for user core Nov 1 04:37:22.026000 audit[4527]: USER_END pid=4527 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:22.037150 kernel: audit: type=1106 audit(1761971842.026:1368): pid=4527 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:22.037528 systemd[1]: sshd@7-10.244.11.230:22-139.178.89.65:59486.service: Deactivated successfully. Nov 1 04:37:22.038879 systemd[1]: session-8.scope: Deactivated successfully. Nov 1 04:37:22.027000 audit[4527]: CRED_DISP pid=4527 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:22.046070 systemd-logind[1191]: Session 8 logged out. Waiting for processes to exit. Nov 1 04:37:22.047909 kernel: audit: type=1104 audit(1761971842.027:1369): pid=4527 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:22.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.244.11.230:22-139.178.89.65:59486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:22.048869 systemd-logind[1191]: Removed session 8. Nov 1 04:37:22.111645 kubelet[2011]: E1101 04:37:22.111541 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-klqkh" podUID="9a35816c-1be0-4aa2-bf66-79617ab8330f" Nov 1 04:37:23.109238 env[1200]: time="2025-11-01T04:37:23.109070557Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Nov 1 04:37:23.434668 env[1200]: time="2025-11-01T04:37:23.434100026Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:23.437190 env[1200]: time="2025-11-01T04:37:23.436945359Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Nov 1 04:37:23.439607 kubelet[2011]: E1101 04:37:23.439491 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 04:37:23.442098 kubelet[2011]: E1101 04:37:23.442058 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 04:37:23.443427 env[1200]: time="2025-11-01T04:37:23.443042823Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Nov 1 04:37:23.447674 kubelet[2011]: E1101 04:37:23.447482 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:ee5615a3b1d44da0ac00b8c4d31c8559,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-bw556,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6cbc5bd78f-jgqrs_calico-system(1f970c1e-fc1f-4851-ac5c-128a20d86234): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:23.764083 env[1200]: time="2025-11-01T04:37:23.763674738Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:23.765363 env[1200]: time="2025-11-01T04:37:23.765085346Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Nov 1 04:37:23.765555 kubelet[2011]: E1101 04:37:23.765474 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 04:37:23.765690 kubelet[2011]: E1101 04:37:23.765569 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 04:37:23.766012 kubelet[2011]: E1101 04:37:23.765924 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-s2gct,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-6d9b84d64-gh6zn_calico-system(a04c514c-f548-4854-abe7-a0adc995c889): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:23.767237 env[1200]: time="2025-11-01T04:37:23.766903251Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Nov 1 04:37:23.767534 kubelet[2011]: E1101 04:37:23.767478 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" podUID="a04c514c-f548-4854-abe7-a0adc995c889" Nov 1 04:37:24.067587 env[1200]: time="2025-11-01T04:37:24.067241576Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:24.068973 env[1200]: time="2025-11-01T04:37:24.068737764Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Nov 1 04:37:24.069380 kubelet[2011]: E1101 04:37:24.069320 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 04:37:24.069587 kubelet[2011]: E1101 04:37:24.069540 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 04:37:24.070002 kubelet[2011]: E1101 04:37:24.069922 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-bw556,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6cbc5bd78f-jgqrs_calico-system(1f970c1e-fc1f-4851-ac5c-128a20d86234): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:24.071462 kubelet[2011]: E1101 04:37:24.071407 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6cbc5bd78f-jgqrs" podUID="1f970c1e-fc1f-4851-ac5c-128a20d86234" Nov 1 04:37:27.186101 systemd[1]: Started sshd@8-10.244.11.230:22-139.178.89.65:39530.service. Nov 1 04:37:27.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.11.230:22-139.178.89.65:39530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:27.192624 kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 1 04:37:27.192761 kernel: audit: type=1130 audit(1761971847.188:1371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.11.230:22-139.178.89.65:39530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:28.144000 audit[4549]: USER_ACCT pid=4549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:28.145923 sshd[4549]: Accepted publickey for core from 139.178.89.65 port 39530 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:37:28.153164 kernel: audit: type=1101 audit(1761971848.144:1372): pid=4549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:28.153000 audit[4549]: CRED_ACQ pid=4549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:28.164577 sshd[4549]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:37:28.166103 kernel: audit: type=1103 audit(1761971848.153:1373): pid=4549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:28.166252 kernel: audit: type=1006 audit(1761971848.160:1374): pid=4549 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Nov 1 04:37:28.166332 kernel: audit: type=1300 audit(1761971848.160:1374): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedcd88dd0 a2=3 a3=0 items=0 ppid=1 pid=4549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:37:28.160000 audit[4549]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedcd88dd0 a2=3 a3=0 items=0 ppid=1 pid=4549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:37:28.160000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:37:28.176138 kernel: audit: type=1327 audit(1761971848.160:1374): proctitle=737368643A20636F7265205B707269765D Nov 1 04:37:28.183380 systemd[1]: Started session-9.scope. Nov 1 04:37:28.183985 systemd-logind[1191]: New session 9 of user core. Nov 1 04:37:28.195000 audit[4549]: USER_START pid=4549 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:28.203000 audit[4551]: CRED_ACQ pid=4551 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:28.210994 kernel: audit: type=1105 audit(1761971848.195:1375): pid=4549 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:28.211165 kernel: audit: type=1103 audit(1761971848.203:1376): pid=4551 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:29.034437 sshd[4549]: pam_unix(sshd:session): session closed for user core Nov 1 04:37:29.036000 audit[4549]: USER_END pid=4549 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:29.045160 kernel: audit: type=1106 audit(1761971849.036:1377): pid=4549 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:29.045917 systemd[1]: sshd@8-10.244.11.230:22-139.178.89.65:39530.service: Deactivated successfully. Nov 1 04:37:29.054187 kernel: audit: type=1104 audit(1761971849.036:1378): pid=4549 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:29.036000 audit[4549]: CRED_DISP pid=4549 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:29.048012 systemd[1]: session-9.scope: Deactivated successfully. Nov 1 04:37:29.053927 systemd-logind[1191]: Session 9 logged out. Waiting for processes to exit. Nov 1 04:37:29.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.244.11.230:22-139.178.89.65:39530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:29.057842 systemd-logind[1191]: Removed session 9. Nov 1 04:37:34.097788 env[1200]: time="2025-11-01T04:37:34.097543491Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 04:37:34.191711 systemd[1]: Started sshd@9-10.244.11.230:22-139.178.89.65:39542.service. Nov 1 04:37:34.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.11.230:22-139.178.89.65:39542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:34.198192 kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 1 04:37:34.198379 kernel: audit: type=1130 audit(1761971854.194:1380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.11.230:22-139.178.89.65:39542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:34.416873 env[1200]: time="2025-11-01T04:37:34.416142457Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:34.418268 env[1200]: time="2025-11-01T04:37:34.418038535Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 04:37:34.418807 kubelet[2011]: E1101 04:37:34.418648 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 04:37:34.420072 kubelet[2011]: E1101 04:37:34.419589 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 04:37:34.420896 kubelet[2011]: E1101 04:37:34.420803 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9dpjt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xqtpq_calico-system(ccda356b-9c43-49d4-bc40-aea58a266a51): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:34.424250 env[1200]: time="2025-11-01T04:37:34.423900287Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 04:37:34.736643 env[1200]: time="2025-11-01T04:37:34.735421076Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:34.736988 env[1200]: time="2025-11-01T04:37:34.736741629Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 04:37:34.737392 kubelet[2011]: E1101 04:37:34.737163 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:37:34.737392 kubelet[2011]: E1101 04:37:34.737350 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:37:34.738224 kubelet[2011]: E1101 04:37:34.738025 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-m4ggz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d5d4c457c-d2k4h_calico-apiserver(a466af82-23ad-4581-8753-4ea82dbddbf8): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:34.739342 env[1200]: time="2025-11-01T04:37:34.739295860Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 04:37:34.740346 kubelet[2011]: E1101 04:37:34.740177 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8" Nov 1 04:37:35.041478 env[1200]: time="2025-11-01T04:37:35.041381858Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:35.043460 env[1200]: time="2025-11-01T04:37:35.043394013Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 04:37:35.044145 kubelet[2011]: E1101 04:37:35.044029 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 04:37:35.044552 kubelet[2011]: E1101 04:37:35.044196 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 04:37:35.044872 kubelet[2011]: E1101 04:37:35.044484 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9dpjt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xqtpq_calico-system(ccda356b-9c43-49d4-bc40-aea58a266a51): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:35.046104 kubelet[2011]: E1101 04:37:35.046040 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:37:35.095169 kubelet[2011]: E1101 04:37:35.095078 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" podUID="a04c514c-f548-4854-abe7-a0adc995c889" Nov 1 04:37:35.128000 audit[4564]: USER_ACCT pid=4564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:35.133549 sshd[4564]: Accepted publickey for core from 139.178.89.65 port 39542 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:37:35.139157 kernel: audit: type=1101 audit(1761971855.128:1381): pid=4564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:35.140000 audit[4564]: CRED_ACQ pid=4564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:35.143328 sshd[4564]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:37:35.153217 kernel: audit: type=1103 audit(1761971855.140:1382): pid=4564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:35.154987 kernel: audit: type=1006 audit(1761971855.141:1383): pid=4564 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Nov 1 04:37:35.141000 audit[4564]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc42029970 a2=3 a3=0 items=0 ppid=1 pid=4564 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:37:35.166855 systemd-logind[1191]: New session 10 of user core. Nov 1 04:37:35.175909 kernel: audit: type=1300 audit(1761971855.141:1383): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc42029970 a2=3 a3=0 items=0 ppid=1 pid=4564 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:37:35.176012 kernel: audit: type=1327 audit(1761971855.141:1383): proctitle=737368643A20636F7265205B707269765D Nov 1 04:37:35.141000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:37:35.168750 systemd[1]: Started session-10.scope. Nov 1 04:37:35.184000 audit[4564]: USER_START pid=4564 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:35.194142 kernel: audit: type=1105 audit(1761971855.184:1384): pid=4564 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:35.193000 audit[4566]: CRED_ACQ pid=4566 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:35.203151 kernel: audit: type=1103 audit(1761971855.193:1385): pid=4566 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:35.941373 sshd[4564]: pam_unix(sshd:session): session closed for user core Nov 1 04:37:35.942000 audit[4564]: USER_END pid=4564 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:35.946836 systemd-logind[1191]: Session 10 logged out. Waiting for processes to exit. Nov 1 04:37:35.949476 systemd[1]: sshd@9-10.244.11.230:22-139.178.89.65:39542.service: Deactivated successfully. Nov 1 04:37:35.951060 systemd[1]: session-10.scope: Deactivated successfully. Nov 1 04:37:35.952180 kernel: audit: type=1106 audit(1761971855.942:1386): pid=4564 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:35.942000 audit[4564]: CRED_DISP pid=4564 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:35.956611 systemd-logind[1191]: Removed session 10. Nov 1 04:37:35.961478 kernel: audit: type=1104 audit(1761971855.942:1387): pid=4564 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:35.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.244.11.230:22-139.178.89.65:39542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:36.089975 systemd[1]: Started sshd@10-10.244.11.230:22-139.178.89.65:39550.service. Nov 1 04:37:36.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.11.230:22-139.178.89.65:39550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:36.097935 env[1200]: time="2025-11-01T04:37:36.097433738Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 04:37:36.417463 env[1200]: time="2025-11-01T04:37:36.417303814Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:36.420340 env[1200]: time="2025-11-01T04:37:36.420252316Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 04:37:36.421076 kubelet[2011]: E1101 04:37:36.420938 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:37:36.421692 kubelet[2011]: E1101 04:37:36.421178 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:37:36.422101 kubelet[2011]: E1101 04:37:36.422018 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vsjht,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d5d4c457c-bzssw_calico-apiserver(25204a16-ec6d-4388-9ea1-9773f8c99782): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:36.424010 kubelet[2011]: E1101 04:37:36.423415 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" podUID="25204a16-ec6d-4388-9ea1-9773f8c99782" Nov 1 04:37:36.424177 env[1200]: time="2025-11-01T04:37:36.423559371Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Nov 1 04:37:36.731924 env[1200]: time="2025-11-01T04:37:36.731673090Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:37:36.733860 env[1200]: time="2025-11-01T04:37:36.733771553Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Nov 1 04:37:36.734407 kubelet[2011]: E1101 04:37:36.734307 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 04:37:36.734610 kubelet[2011]: E1101 04:37:36.734443 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 04:37:36.734992 kubelet[2011]: E1101 04:37:36.734875 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fl4cq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-klqkh_calico-system(9a35816c-1be0-4aa2-bf66-79617ab8330f): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Nov 1 04:37:36.736324 kubelet[2011]: E1101 04:37:36.736194 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-klqkh" podUID="9a35816c-1be0-4aa2-bf66-79617ab8330f" Nov 1 04:37:37.015000 audit[4576]: USER_ACCT pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:37.016977 sshd[4576]: Accepted publickey for core from 139.178.89.65 port 39550 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:37:37.018000 audit[4576]: CRED_ACQ pid=4576 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:37.018000 audit[4576]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1a6b62e0 a2=3 a3=0 items=0 ppid=1 pid=4576 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:37:37.018000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:37:37.020658 sshd[4576]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:37:37.030195 systemd-logind[1191]: New session 11 of user core. Nov 1 04:37:37.032098 systemd[1]: Started session-11.scope. Nov 1 04:37:37.041000 audit[4576]: USER_START pid=4576 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:37.043000 audit[4578]: CRED_ACQ pid=4578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:37.924677 sshd[4576]: pam_unix(sshd:session): session closed for user core Nov 1 04:37:37.927000 audit[4576]: USER_END pid=4576 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:37.928000 audit[4576]: CRED_DISP pid=4576 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:37.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.11.230:22-139.178.89.65:39550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:37.931406 systemd[1]: sshd@10-10.244.11.230:22-139.178.89.65:39550.service: Deactivated successfully. Nov 1 04:37:37.932777 systemd[1]: session-11.scope: Deactivated successfully. Nov 1 04:37:37.935578 systemd-logind[1191]: Session 11 logged out. Waiting for processes to exit. Nov 1 04:37:37.937208 systemd-logind[1191]: Removed session 11. Nov 1 04:37:38.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.11.230:22-139.178.89.65:54128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:38.076470 systemd[1]: Started sshd@11-10.244.11.230:22-139.178.89.65:54128.service. Nov 1 04:37:38.098281 kubelet[2011]: E1101 04:37:38.098164 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6cbc5bd78f-jgqrs" podUID="1f970c1e-fc1f-4851-ac5c-128a20d86234" Nov 1 04:37:38.992000 audit[4587]: USER_ACCT pid=4587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:38.994219 sshd[4587]: Accepted publickey for core from 139.178.89.65 port 54128 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:37:38.994000 audit[4587]: CRED_ACQ pid=4587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:38.994000 audit[4587]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc829508b0 a2=3 a3=0 items=0 ppid=1 pid=4587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:37:38.994000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:37:38.996826 sshd[4587]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:37:39.004926 systemd[1]: Started session-12.scope. Nov 1 04:37:39.006192 systemd-logind[1191]: New session 12 of user core. Nov 1 04:37:39.015000 audit[4587]: USER_START pid=4587 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:39.018000 audit[4589]: CRED_ACQ pid=4589 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:39.788703 sshd[4587]: pam_unix(sshd:session): session closed for user core Nov 1 04:37:39.791000 audit[4587]: USER_END pid=4587 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:39.796744 kernel: kauditd_printk_skb: 20 callbacks suppressed Nov 1 04:37:39.796890 kernel: audit: type=1106 audit(1761971859.791:1404): pid=4587 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:39.799331 systemd-logind[1191]: Session 12 logged out. Waiting for processes to exit. Nov 1 04:37:39.802469 systemd[1]: sshd@11-10.244.11.230:22-139.178.89.65:54128.service: Deactivated successfully. Nov 1 04:37:39.804068 systemd[1]: session-12.scope: Deactivated successfully. Nov 1 04:37:39.808729 systemd-logind[1191]: Removed session 12. Nov 1 04:37:39.795000 audit[4587]: CRED_DISP pid=4587 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:39.835154 kernel: audit: type=1104 audit(1761971859.795:1405): pid=4587 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:39.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.11.230:22-139.178.89.65:54128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:39.842216 kernel: audit: type=1131 audit(1761971859.801:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.11.230:22-139.178.89.65:54128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:41.210000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:41.221148 kernel: audit: type=1400 audit(1761971861.210:1407): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:41.210000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00263fb20 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:37:41.233158 kernel: audit: type=1300 audit(1761971861.210:1407): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00263fb20 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:37:41.210000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:37:41.246139 kernel: audit: type=1327 audit(1761971861.210:1407): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:37:41.231000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:41.258145 kernel: audit: type=1400 audit(1761971861.231:1408): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:41.231000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002e31ce0 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:37:41.268150 kernel: audit: type=1300 audit(1761971861.231:1408): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002e31ce0 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:37:41.231000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:37:41.279162 kernel: audit: type=1327 audit(1761971861.231:1408): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:37:42.236000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:42.244155 kernel: audit: type=1400 audit(1761971862.236:1409): avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=525839 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:42.236000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c012412030 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:37:42.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:37:42.237000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:42.237000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c012412060 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:37:42.237000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:37:42.245000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:42.245000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00f9af620 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:37:42.245000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:37:42.282000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=525845 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:42.282000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0113bba40 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:37:42.282000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:37:42.347000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:42.347000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c011ae8700 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:37:42.347000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:37:42.349000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=525843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:42.349000 audit[1855]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0113bbd10 a2=fc6 a3=0 items=0 ppid=1701 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c207,c290 key=(null) Nov 1 04:37:42.349000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E31312E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Nov 1 04:37:44.948317 systemd[1]: Started sshd@12-10.244.11.230:22-139.178.89.65:54142.service. Nov 1 04:37:44.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.11.230:22-139.178.89.65:54142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:44.951279 kernel: kauditd_printk_skb: 17 callbacks suppressed Nov 1 04:37:44.951406 kernel: audit: type=1130 audit(1761971864.947:1415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.11.230:22-139.178.89.65:54142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:45.927000 audit[4618]: USER_ACCT pid=4618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:45.930043 sshd[4618]: Accepted publickey for core from 139.178.89.65 port 54142 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:37:45.936151 kernel: audit: type=1101 audit(1761971865.927:1416): pid=4618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:45.934000 audit[4618]: CRED_ACQ pid=4618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:45.943142 kernel: audit: type=1103 audit(1761971865.934:1417): pid=4618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:45.948160 kernel: audit: type=1006 audit(1761971865.934:1418): pid=4618 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Nov 1 04:37:45.934000 audit[4618]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe3528620 a2=3 a3=0 items=0 ppid=1 pid=4618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:37:45.955938 sshd[4618]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:37:45.956555 kernel: audit: type=1300 audit(1761971865.934:1418): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe3528620 a2=3 a3=0 items=0 ppid=1 pid=4618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:37:45.956642 kernel: audit: type=1327 audit(1761971865.934:1418): proctitle=737368643A20636F7265205B707269765D Nov 1 04:37:45.934000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:37:45.969270 systemd-logind[1191]: New session 13 of user core. Nov 1 04:37:45.970992 systemd[1]: Started session-13.scope. Nov 1 04:37:45.990249 kernel: audit: type=1105 audit(1761971865.980:1419): pid=4618 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:45.980000 audit[4618]: USER_START pid=4618 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:45.991000 audit[4620]: CRED_ACQ pid=4620 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:46.000140 kernel: audit: type=1103 audit(1761971865.991:1420): pid=4620 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:46.096663 kubelet[2011]: E1101 04:37:46.096536 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" podUID="a04c514c-f548-4854-abe7-a0adc995c889" Nov 1 04:37:46.098509 kubelet[2011]: E1101 04:37:46.098458 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:37:46.191000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:46.201144 kernel: audit: type=1400 audit(1761971866.191:1421): avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:46.191000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0021b2820 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:37:46.211161 kernel: audit: type=1300 audit(1761971866.191:1421): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0021b2820 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:37:46.191000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:37:46.191000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:46.191000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0021b2840 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:37:46.191000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:37:46.201000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:46.201000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0021b2a40 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:37:46.201000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:37:46.201000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=525837 scontext=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Nov 1 04:37:46.201000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002560560 a2=fc6 a3=0 items=0 ppid=1721 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c154,c694 key=(null) Nov 1 04:37:46.201000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Nov 1 04:37:46.777226 sshd[4618]: pam_unix(sshd:session): session closed for user core Nov 1 04:37:46.778000 audit[4618]: USER_END pid=4618 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:46.778000 audit[4618]: CRED_DISP pid=4618 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:46.782229 systemd-logind[1191]: Session 13 logged out. Waiting for processes to exit. Nov 1 04:37:46.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.11.230:22-139.178.89.65:54142 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:46.783018 systemd[1]: sshd@12-10.244.11.230:22-139.178.89.65:54142.service: Deactivated successfully. Nov 1 04:37:46.784619 systemd[1]: session-13.scope: Deactivated successfully. Nov 1 04:37:46.786091 systemd-logind[1191]: Removed session 13. Nov 1 04:37:47.950605 env[1200]: time="2025-11-01T04:37:47.950451153Z" level=info msg="StopPodSandbox for \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\"" Nov 1 04:37:48.575933 env[1200]: 2025-11-01 04:37:48.307 [WARNING][4646] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0", GenerateName:"calico-apiserver-d5d4c457c-", Namespace:"calico-apiserver", SelfLink:"", UID:"a466af82-23ad-4581-8753-4ea82dbddbf8", ResourceVersion:"1342", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d5d4c457c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7", Pod:"calico-apiserver-d5d4c457c-d2k4h", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.75.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1e15f3d12bf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:37:48.575933 env[1200]: 2025-11-01 04:37:48.310 [INFO][4646] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:37:48.575933 env[1200]: 2025-11-01 04:37:48.310 [INFO][4646] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" iface="eth0" netns="" Nov 1 04:37:48.575933 env[1200]: 2025-11-01 04:37:48.311 [INFO][4646] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:37:48.575933 env[1200]: 2025-11-01 04:37:48.311 [INFO][4646] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:37:48.575933 env[1200]: 2025-11-01 04:37:48.547 [INFO][4654] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" HandleID="k8s-pod-network.1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:37:48.575933 env[1200]: 2025-11-01 04:37:48.550 [INFO][4654] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:37:48.575933 env[1200]: 2025-11-01 04:37:48.550 [INFO][4654] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:37:48.575933 env[1200]: 2025-11-01 04:37:48.568 [WARNING][4654] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" HandleID="k8s-pod-network.1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:37:48.575933 env[1200]: 2025-11-01 04:37:48.568 [INFO][4654] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" HandleID="k8s-pod-network.1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:37:48.575933 env[1200]: 2025-11-01 04:37:48.571 [INFO][4654] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:37:48.575933 env[1200]: 2025-11-01 04:37:48.573 [INFO][4646] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:37:48.585554 env[1200]: time="2025-11-01T04:37:48.575990884Z" level=info msg="TearDown network for sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\" successfully" Nov 1 04:37:48.585554 env[1200]: time="2025-11-01T04:37:48.576057204Z" level=info msg="StopPodSandbox for \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\" returns successfully" Nov 1 04:37:48.592988 env[1200]: time="2025-11-01T04:37:48.592935310Z" level=info msg="RemovePodSandbox for \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\"" Nov 1 04:37:48.593141 env[1200]: time="2025-11-01T04:37:48.593026293Z" level=info msg="Forcibly stopping sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\"" Nov 1 04:37:48.768893 env[1200]: 2025-11-01 04:37:48.686 [WARNING][4669] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0", GenerateName:"calico-apiserver-d5d4c457c-", Namespace:"calico-apiserver", SelfLink:"", UID:"a466af82-23ad-4581-8753-4ea82dbddbf8", ResourceVersion:"1342", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d5d4c457c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"2b5f52dfad01396e9d54b0c9080197d3a8c8fd0eaceecfabefbf450f6affbcc7", Pod:"calico-apiserver-d5d4c457c-d2k4h", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.75.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1e15f3d12bf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:37:48.768893 env[1200]: 2025-11-01 04:37:48.687 [INFO][4669] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:37:48.768893 env[1200]: 2025-11-01 04:37:48.687 [INFO][4669] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" iface="eth0" netns="" Nov 1 04:37:48.768893 env[1200]: 2025-11-01 04:37:48.687 [INFO][4669] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:37:48.768893 env[1200]: 2025-11-01 04:37:48.687 [INFO][4669] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:37:48.768893 env[1200]: 2025-11-01 04:37:48.746 [INFO][4676] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" HandleID="k8s-pod-network.1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:37:48.768893 env[1200]: 2025-11-01 04:37:48.747 [INFO][4676] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:37:48.768893 env[1200]: 2025-11-01 04:37:48.747 [INFO][4676] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:37:48.768893 env[1200]: 2025-11-01 04:37:48.760 [WARNING][4676] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" HandleID="k8s-pod-network.1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:37:48.768893 env[1200]: 2025-11-01 04:37:48.760 [INFO][4676] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" HandleID="k8s-pod-network.1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--d2k4h-eth0" Nov 1 04:37:48.768893 env[1200]: 2025-11-01 04:37:48.762 [INFO][4676] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:37:48.768893 env[1200]: 2025-11-01 04:37:48.766 [INFO][4669] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935" Nov 1 04:37:48.770715 env[1200]: time="2025-11-01T04:37:48.768936844Z" level=info msg="TearDown network for sandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\" successfully" Nov 1 04:37:48.775767 env[1200]: time="2025-11-01T04:37:48.775705974Z" level=info msg="RemovePodSandbox \"1a3ecdb7efb4007afe5187accd51d13446fb03d6cac33bd1324fac40e70f1935\" returns successfully" Nov 1 04:37:48.776575 env[1200]: time="2025-11-01T04:37:48.776527514Z" level=info msg="StopPodSandbox for \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\"" Nov 1 04:37:48.969886 env[1200]: 2025-11-01 04:37:48.861 [WARNING][4692] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ccda356b-9c43-49d4-bc40-aea58a266a51", ResourceVersion:"1415", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7", Pod:"csi-node-driver-xqtpq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1ef044cd8da", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:37:48.969886 env[1200]: 2025-11-01 04:37:48.862 [INFO][4692] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:37:48.969886 env[1200]: 2025-11-01 04:37:48.862 [INFO][4692] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" iface="eth0" netns="" Nov 1 04:37:48.969886 env[1200]: 2025-11-01 04:37:48.862 [INFO][4692] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:37:48.969886 env[1200]: 2025-11-01 04:37:48.862 [INFO][4692] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:37:48.969886 env[1200]: 2025-11-01 04:37:48.946 [INFO][4699] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" HandleID="k8s-pod-network.e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Workload="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:37:48.969886 env[1200]: 2025-11-01 04:37:48.946 [INFO][4699] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:37:48.969886 env[1200]: 2025-11-01 04:37:48.946 [INFO][4699] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:37:48.969886 env[1200]: 2025-11-01 04:37:48.961 [WARNING][4699] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" HandleID="k8s-pod-network.e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Workload="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:37:48.969886 env[1200]: 2025-11-01 04:37:48.961 [INFO][4699] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" HandleID="k8s-pod-network.e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Workload="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:37:48.969886 env[1200]: 2025-11-01 04:37:48.965 [INFO][4699] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:37:48.969886 env[1200]: 2025-11-01 04:37:48.967 [INFO][4692] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:37:48.976172 env[1200]: time="2025-11-01T04:37:48.970126286Z" level=info msg="TearDown network for sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\" successfully" Nov 1 04:37:48.976172 env[1200]: time="2025-11-01T04:37:48.970177762Z" level=info msg="StopPodSandbox for \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\" returns successfully" Nov 1 04:37:48.976172 env[1200]: time="2025-11-01T04:37:48.972464857Z" level=info msg="RemovePodSandbox for \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\"" Nov 1 04:37:48.976172 env[1200]: time="2025-11-01T04:37:48.972510344Z" level=info msg="Forcibly stopping sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\"" Nov 1 04:37:49.134363 env[1200]: 2025-11-01 04:37:49.054 [WARNING][4714] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ccda356b-9c43-49d4-bc40-aea58a266a51", ResourceVersion:"1415", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"857f04739fd38dccdf704e0f09b92b4e09d03fcb507a5ba82364f5ecf48368d7", Pod:"csi-node-driver-xqtpq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.75.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1ef044cd8da", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:37:49.134363 env[1200]: 2025-11-01 04:37:49.054 [INFO][4714] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:37:49.134363 env[1200]: 2025-11-01 04:37:49.054 [INFO][4714] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" iface="eth0" netns="" Nov 1 04:37:49.134363 env[1200]: 2025-11-01 04:37:49.055 [INFO][4714] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:37:49.134363 env[1200]: 2025-11-01 04:37:49.055 [INFO][4714] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:37:49.134363 env[1200]: 2025-11-01 04:37:49.105 [INFO][4721] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" HandleID="k8s-pod-network.e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Workload="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:37:49.134363 env[1200]: 2025-11-01 04:37:49.107 [INFO][4721] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:37:49.134363 env[1200]: 2025-11-01 04:37:49.107 [INFO][4721] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:37:49.134363 env[1200]: 2025-11-01 04:37:49.125 [WARNING][4721] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" HandleID="k8s-pod-network.e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Workload="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:37:49.134363 env[1200]: 2025-11-01 04:37:49.125 [INFO][4721] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" HandleID="k8s-pod-network.e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Workload="srv--cigeh.gb1.brightbox.com-k8s-csi--node--driver--xqtpq-eth0" Nov 1 04:37:49.134363 env[1200]: 2025-11-01 04:37:49.128 [INFO][4721] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:37:49.134363 env[1200]: 2025-11-01 04:37:49.130 [INFO][4714] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30" Nov 1 04:37:49.138003 env[1200]: time="2025-11-01T04:37:49.134573142Z" level=info msg="TearDown network for sandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\" successfully" Nov 1 04:37:49.145833 env[1200]: time="2025-11-01T04:37:49.145769551Z" level=info msg="RemovePodSandbox \"e4b71a23cd0d2fd160b662cd3f0d12baea37c43246ceaeed8127d0ea21846e30\" returns successfully" Nov 1 04:37:49.158087 env[1200]: time="2025-11-01T04:37:49.158027358Z" level=info msg="StopPodSandbox for \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\"" Nov 1 04:37:49.239625 kubelet[2011]: E1101 04:37:49.237916 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8" Nov 1 04:37:49.353086 env[1200]: 2025-11-01 04:37:49.282 [WARNING][4737] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"2dc02a63-186f-4d13-a96f-fb0c7f4c930f", ResourceVersion:"1073", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 35, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1", Pod:"coredns-674b8bbfcf-pfkdh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidc28ba35aa0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:37:49.353086 env[1200]: 2025-11-01 04:37:49.283 [INFO][4737] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:37:49.353086 env[1200]: 2025-11-01 04:37:49.283 [INFO][4737] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" iface="eth0" netns="" Nov 1 04:37:49.353086 env[1200]: 2025-11-01 04:37:49.283 [INFO][4737] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:37:49.353086 env[1200]: 2025-11-01 04:37:49.283 [INFO][4737] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:37:49.353086 env[1200]: 2025-11-01 04:37:49.330 [INFO][4744] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" HandleID="k8s-pod-network.9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:37:49.353086 env[1200]: 2025-11-01 04:37:49.331 [INFO][4744] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:37:49.353086 env[1200]: 2025-11-01 04:37:49.331 [INFO][4744] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:37:49.353086 env[1200]: 2025-11-01 04:37:49.343 [WARNING][4744] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" HandleID="k8s-pod-network.9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:37:49.353086 env[1200]: 2025-11-01 04:37:49.344 [INFO][4744] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" HandleID="k8s-pod-network.9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:37:49.353086 env[1200]: 2025-11-01 04:37:49.349 [INFO][4744] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:37:49.353086 env[1200]: 2025-11-01 04:37:49.351 [INFO][4737] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:37:49.354287 env[1200]: time="2025-11-01T04:37:49.354227802Z" level=info msg="TearDown network for sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\" successfully" Nov 1 04:37:49.354456 env[1200]: time="2025-11-01T04:37:49.354422183Z" level=info msg="StopPodSandbox for \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\" returns successfully" Nov 1 04:37:49.355348 env[1200]: time="2025-11-01T04:37:49.355312494Z" level=info msg="RemovePodSandbox for \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\"" Nov 1 04:37:49.355874 env[1200]: time="2025-11-01T04:37:49.355533772Z" level=info msg="Forcibly stopping sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\"" Nov 1 04:37:49.518141 env[1200]: 2025-11-01 04:37:49.418 [WARNING][4758] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"2dc02a63-186f-4d13-a96f-fb0c7f4c930f", ResourceVersion:"1073", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 35, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"a5e9e18840793d794a27d7a97650f9618eb9cd0242e6cb0bbcef7a1480778fa1", Pod:"coredns-674b8bbfcf-pfkdh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.75.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calidc28ba35aa0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:37:49.518141 env[1200]: 2025-11-01 04:37:49.418 [INFO][4758] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:37:49.518141 env[1200]: 2025-11-01 04:37:49.418 [INFO][4758] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" iface="eth0" netns="" Nov 1 04:37:49.518141 env[1200]: 2025-11-01 04:37:49.418 [INFO][4758] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:37:49.518141 env[1200]: 2025-11-01 04:37:49.418 [INFO][4758] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:37:49.518141 env[1200]: 2025-11-01 04:37:49.470 [INFO][4765] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" HandleID="k8s-pod-network.9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:37:49.518141 env[1200]: 2025-11-01 04:37:49.470 [INFO][4765] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:37:49.518141 env[1200]: 2025-11-01 04:37:49.470 [INFO][4765] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:37:49.518141 env[1200]: 2025-11-01 04:37:49.494 [WARNING][4765] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" HandleID="k8s-pod-network.9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:37:49.518141 env[1200]: 2025-11-01 04:37:49.495 [INFO][4765] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" HandleID="k8s-pod-network.9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Workload="srv--cigeh.gb1.brightbox.com-k8s-coredns--674b8bbfcf--pfkdh-eth0" Nov 1 04:37:49.518141 env[1200]: 2025-11-01 04:37:49.510 [INFO][4765] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:37:49.518141 env[1200]: 2025-11-01 04:37:49.512 [INFO][4758] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef" Nov 1 04:37:49.520737 env[1200]: time="2025-11-01T04:37:49.520669158Z" level=info msg="TearDown network for sandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\" successfully" Nov 1 04:37:49.535737 env[1200]: time="2025-11-01T04:37:49.535622643Z" level=info msg="RemovePodSandbox \"9bd7a97e93ba8d01f94c33c59b0edfb240d79880e0e07604a8d4c484da0632ef\" returns successfully" Nov 1 04:37:49.537288 env[1200]: time="2025-11-01T04:37:49.537212844Z" level=info msg="StopPodSandbox for \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\"" Nov 1 04:37:49.702978 env[1200]: 2025-11-01 04:37:49.611 [WARNING][4780] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0", GenerateName:"calico-apiserver-d5d4c457c-", Namespace:"calico-apiserver", SelfLink:"", UID:"25204a16-ec6d-4388-9ea1-9773f8c99782", ResourceVersion:"1365", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d5d4c457c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752", Pod:"calico-apiserver-d5d4c457c-bzssw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.75.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8f0b874de3b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:37:49.702978 env[1200]: 2025-11-01 04:37:49.612 [INFO][4780] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:37:49.702978 env[1200]: 2025-11-01 04:37:49.612 [INFO][4780] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" iface="eth0" netns="" Nov 1 04:37:49.702978 env[1200]: 2025-11-01 04:37:49.612 [INFO][4780] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:37:49.702978 env[1200]: 2025-11-01 04:37:49.612 [INFO][4780] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:37:49.702978 env[1200]: 2025-11-01 04:37:49.664 [INFO][4787] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" HandleID="k8s-pod-network.1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:37:49.702978 env[1200]: 2025-11-01 04:37:49.665 [INFO][4787] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:37:49.702978 env[1200]: 2025-11-01 04:37:49.665 [INFO][4787] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:37:49.702978 env[1200]: 2025-11-01 04:37:49.695 [WARNING][4787] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" HandleID="k8s-pod-network.1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:37:49.702978 env[1200]: 2025-11-01 04:37:49.696 [INFO][4787] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" HandleID="k8s-pod-network.1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:37:49.702978 env[1200]: 2025-11-01 04:37:49.699 [INFO][4787] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:37:49.702978 env[1200]: 2025-11-01 04:37:49.701 [INFO][4780] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:37:49.704956 env[1200]: time="2025-11-01T04:37:49.703018055Z" level=info msg="TearDown network for sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\" successfully" Nov 1 04:37:49.704956 env[1200]: time="2025-11-01T04:37:49.703063960Z" level=info msg="StopPodSandbox for \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\" returns successfully" Nov 1 04:37:49.704956 env[1200]: time="2025-11-01T04:37:49.704333761Z" level=info msg="RemovePodSandbox for \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\"" Nov 1 04:37:49.704956 env[1200]: time="2025-11-01T04:37:49.704376223Z" level=info msg="Forcibly stopping sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\"" Nov 1 04:37:49.916319 env[1200]: 2025-11-01 04:37:49.815 [WARNING][4801] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0", GenerateName:"calico-apiserver-d5d4c457c-", Namespace:"calico-apiserver", SelfLink:"", UID:"25204a16-ec6d-4388-9ea1-9773f8c99782", ResourceVersion:"1365", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"d5d4c457c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"aa3cbca53b62e76c85a8da396d2f96b09568287c616da9e1445de62379c03752", Pod:"calico-apiserver-d5d4c457c-bzssw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.75.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8f0b874de3b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:37:49.916319 env[1200]: 2025-11-01 04:37:49.820 [INFO][4801] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:37:49.916319 env[1200]: 2025-11-01 04:37:49.820 [INFO][4801] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" iface="eth0" netns="" Nov 1 04:37:49.916319 env[1200]: 2025-11-01 04:37:49.820 [INFO][4801] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:37:49.916319 env[1200]: 2025-11-01 04:37:49.821 [INFO][4801] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:37:49.916319 env[1200]: 2025-11-01 04:37:49.896 [INFO][4808] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" HandleID="k8s-pod-network.1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:37:49.916319 env[1200]: 2025-11-01 04:37:49.896 [INFO][4808] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:37:49.916319 env[1200]: 2025-11-01 04:37:49.896 [INFO][4808] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:37:49.916319 env[1200]: 2025-11-01 04:37:49.907 [WARNING][4808] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" HandleID="k8s-pod-network.1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:37:49.916319 env[1200]: 2025-11-01 04:37:49.907 [INFO][4808] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" HandleID="k8s-pod-network.1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Workload="srv--cigeh.gb1.brightbox.com-k8s-calico--apiserver--d5d4c457c--bzssw-eth0" Nov 1 04:37:49.916319 env[1200]: 2025-11-01 04:37:49.909 [INFO][4808] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:37:49.916319 env[1200]: 2025-11-01 04:37:49.912 [INFO][4801] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd" Nov 1 04:37:49.918171 env[1200]: time="2025-11-01T04:37:49.916656138Z" level=info msg="TearDown network for sandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\" successfully" Nov 1 04:37:49.923236 env[1200]: time="2025-11-01T04:37:49.923182684Z" level=info msg="RemovePodSandbox \"1a9545129974df86116dbccb92bdc803fae8e4062484e6bd7874e844139612bd\" returns successfully" Nov 1 04:37:49.923997 env[1200]: time="2025-11-01T04:37:49.923961095Z" level=info msg="StopPodSandbox for \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\"" Nov 1 04:37:50.060886 env[1200]: 2025-11-01 04:37:49.990 [WARNING][4822] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"9a35816c-1be0-4aa2-bf66-79617ab8330f", ResourceVersion:"1363", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7", Pod:"goldmane-666569f655-klqkh", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.75.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali20620852a90", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:37:50.060886 env[1200]: 2025-11-01 04:37:49.990 [INFO][4822] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:37:50.060886 env[1200]: 2025-11-01 04:37:49.990 [INFO][4822] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" iface="eth0" netns="" Nov 1 04:37:50.060886 env[1200]: 2025-11-01 04:37:49.991 [INFO][4822] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:37:50.060886 env[1200]: 2025-11-01 04:37:49.991 [INFO][4822] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:37:50.060886 env[1200]: 2025-11-01 04:37:50.031 [INFO][4829] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" HandleID="k8s-pod-network.87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Workload="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:37:50.060886 env[1200]: 2025-11-01 04:37:50.032 [INFO][4829] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:37:50.060886 env[1200]: 2025-11-01 04:37:50.032 [INFO][4829] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:37:50.060886 env[1200]: 2025-11-01 04:37:50.050 [WARNING][4829] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" HandleID="k8s-pod-network.87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Workload="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:37:50.060886 env[1200]: 2025-11-01 04:37:50.050 [INFO][4829] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" HandleID="k8s-pod-network.87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Workload="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:37:50.060886 env[1200]: 2025-11-01 04:37:50.053 [INFO][4829] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:37:50.060886 env[1200]: 2025-11-01 04:37:50.058 [INFO][4822] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:37:50.062635 env[1200]: time="2025-11-01T04:37:50.062578389Z" level=info msg="TearDown network for sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\" successfully" Nov 1 04:37:50.062789 env[1200]: time="2025-11-01T04:37:50.062754390Z" level=info msg="StopPodSandbox for \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\" returns successfully" Nov 1 04:37:50.076380 env[1200]: time="2025-11-01T04:37:50.076320064Z" level=info msg="RemovePodSandbox for \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\"" Nov 1 04:37:50.076649 env[1200]: time="2025-11-01T04:37:50.076588582Z" level=info msg="Forcibly stopping sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\"" Nov 1 04:37:50.099410 kubelet[2011]: E1101 04:37:50.098637 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-klqkh" podUID="9a35816c-1be0-4aa2-bf66-79617ab8330f" Nov 1 04:37:50.275961 env[1200]: 2025-11-01 04:37:50.210 [WARNING][4846] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"9a35816c-1be0-4aa2-bf66-79617ab8330f", ResourceVersion:"1444", Generation:0, CreationTimestamp:time.Date(2025, time.November, 1, 4, 36, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-cigeh.gb1.brightbox.com", ContainerID:"2cc8d344b424c8ae2ff32e12bf7d3d41bb2db5d960664937e462aef8ffb88ba7", Pod:"goldmane-666569f655-klqkh", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.75.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali20620852a90", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Nov 1 04:37:50.275961 env[1200]: 2025-11-01 04:37:50.211 [INFO][4846] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:37:50.275961 env[1200]: 2025-11-01 04:37:50.211 [INFO][4846] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" iface="eth0" netns="" Nov 1 04:37:50.275961 env[1200]: 2025-11-01 04:37:50.211 [INFO][4846] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:37:50.275961 env[1200]: 2025-11-01 04:37:50.211 [INFO][4846] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:37:50.275961 env[1200]: 2025-11-01 04:37:50.252 [INFO][4853] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" HandleID="k8s-pod-network.87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Workload="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:37:50.275961 env[1200]: 2025-11-01 04:37:50.253 [INFO][4853] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Nov 1 04:37:50.275961 env[1200]: 2025-11-01 04:37:50.253 [INFO][4853] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Nov 1 04:37:50.275961 env[1200]: 2025-11-01 04:37:50.269 [WARNING][4853] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" HandleID="k8s-pod-network.87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Workload="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:37:50.275961 env[1200]: 2025-11-01 04:37:50.269 [INFO][4853] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" HandleID="k8s-pod-network.87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Workload="srv--cigeh.gb1.brightbox.com-k8s-goldmane--666569f655--klqkh-eth0" Nov 1 04:37:50.275961 env[1200]: 2025-11-01 04:37:50.271 [INFO][4853] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Nov 1 04:37:50.275961 env[1200]: 2025-11-01 04:37:50.273 [INFO][4846] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a" Nov 1 04:37:50.278038 env[1200]: time="2025-11-01T04:37:50.276497632Z" level=info msg="TearDown network for sandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\" successfully" Nov 1 04:37:50.281589 env[1200]: time="2025-11-01T04:37:50.281491911Z" level=info msg="RemovePodSandbox \"87163b8886a556991a7e30a880c63822d2a25bee2fc2b071acdc7a7173b5c59a\" returns successfully" Nov 1 04:37:51.095422 kubelet[2011]: E1101 04:37:51.095345 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" podUID="25204a16-ec6d-4388-9ea1-9773f8c99782" Nov 1 04:37:51.097576 kubelet[2011]: E1101 04:37:51.097502 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6cbc5bd78f-jgqrs" podUID="1f970c1e-fc1f-4851-ac5c-128a20d86234" Nov 1 04:37:51.932671 systemd[1]: Started sshd@13-10.244.11.230:22-139.178.89.65:53906.service. Nov 1 04:37:51.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.11.230:22-139.178.89.65:53906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:51.939797 kernel: kauditd_printk_skb: 13 callbacks suppressed Nov 1 04:37:51.939935 kernel: audit: type=1130 audit(1761971871.935:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.11.230:22-139.178.89.65:53906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:52.911000 audit[4860]: USER_ACCT pid=4860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:52.918316 sshd[4860]: Accepted publickey for core from 139.178.89.65 port 53906 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:37:52.924149 kernel: audit: type=1101 audit(1761971872.911:1429): pid=4860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:52.927000 audit[4860]: CRED_ACQ pid=4860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:52.931789 sshd[4860]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:37:52.937615 kernel: audit: type=1103 audit(1761971872.927:1430): pid=4860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:52.953489 kernel: audit: type=1006 audit(1761971872.927:1431): pid=4860 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Nov 1 04:37:52.953692 kernel: audit: type=1300 audit(1761971872.927:1431): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd9f1d890 a2=3 a3=0 items=0 ppid=1 pid=4860 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:37:52.953761 kernel: audit: type=1327 audit(1761971872.927:1431): proctitle=737368643A20636F7265205B707269765D Nov 1 04:37:52.927000 audit[4860]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd9f1d890 a2=3 a3=0 items=0 ppid=1 pid=4860 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:37:52.927000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:37:52.948997 systemd[1]: Started session-14.scope. Nov 1 04:37:52.950828 systemd-logind[1191]: New session 14 of user core. Nov 1 04:37:52.965000 audit[4860]: USER_START pid=4860 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:52.976389 kernel: audit: type=1105 audit(1761971872.965:1432): pid=4860 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:52.976485 kernel: audit: type=1103 audit(1761971872.968:1433): pid=4864 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:52.968000 audit[4864]: CRED_ACQ pid=4864 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:54.096987 sshd[4860]: pam_unix(sshd:session): session closed for user core Nov 1 04:37:54.097000 audit[4860]: USER_END pid=4860 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:54.111152 kernel: audit: type=1106 audit(1761971874.097:1434): pid=4860 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:54.111854 systemd[1]: sshd@13-10.244.11.230:22-139.178.89.65:53906.service: Deactivated successfully. Nov 1 04:37:54.114298 systemd[1]: session-14.scope: Deactivated successfully. Nov 1 04:37:54.115496 systemd-logind[1191]: Session 14 logged out. Waiting for processes to exit. Nov 1 04:37:54.118422 systemd-logind[1191]: Removed session 14. Nov 1 04:37:54.104000 audit[4860]: CRED_DISP pid=4860 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:54.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.11.230:22-139.178.89.65:53906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:54.126179 kernel: audit: type=1104 audit(1761971874.104:1435): pid=4860 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:37:57.104167 kubelet[2011]: E1101 04:37:57.103978 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:37:59.253412 systemd[1]: Started sshd@14-10.244.11.230:22-139.178.89.65:57526.service. Nov 1 04:37:59.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.11.230:22-139.178.89.65:57526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:37:59.260283 kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 1 04:37:59.260431 kernel: audit: type=1130 audit(1761971879.254:1437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.11.230:22-139.178.89.65:57526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:00.207000 audit[4874]: USER_ACCT pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:00.210168 sshd[4874]: Accepted publickey for core from 139.178.89.65 port 57526 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:38:00.217149 kernel: audit: type=1101 audit(1761971880.207:1438): pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:00.217000 audit[4874]: CRED_ACQ pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:00.219427 sshd[4874]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:38:00.225149 kernel: audit: type=1103 audit(1761971880.217:1439): pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:00.231143 kernel: audit: type=1006 audit(1761971880.217:1440): pid=4874 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Nov 1 04:38:00.240241 systemd[1]: Started session-15.scope. Nov 1 04:38:00.242918 systemd-logind[1191]: New session 15 of user core. Nov 1 04:38:00.217000 audit[4874]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea4614450 a2=3 a3=0 items=0 ppid=1 pid=4874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:00.254146 kernel: audit: type=1300 audit(1761971880.217:1440): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea4614450 a2=3 a3=0 items=0 ppid=1 pid=4874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:00.217000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:00.259000 audit[4874]: USER_START pid=4874 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:00.272199 kernel: audit: type=1327 audit(1761971880.217:1440): proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:00.272378 kernel: audit: type=1105 audit(1761971880.259:1441): pid=4874 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:00.264000 audit[4876]: CRED_ACQ pid=4876 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:00.280246 kernel: audit: type=1103 audit(1761971880.264:1442): pid=4876 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:01.094794 kubelet[2011]: E1101 04:38:01.094238 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" podUID="a04c514c-f548-4854-abe7-a0adc995c889" Nov 1 04:38:01.162010 sshd[4874]: pam_unix(sshd:session): session closed for user core Nov 1 04:38:01.163000 audit[4874]: USER_END pid=4874 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:01.172151 kernel: audit: type=1106 audit(1761971881.163:1443): pid=4874 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:01.172815 systemd[1]: sshd@14-10.244.11.230:22-139.178.89.65:57526.service: Deactivated successfully. Nov 1 04:38:01.175982 systemd[1]: session-15.scope: Deactivated successfully. Nov 1 04:38:01.178583 systemd-logind[1191]: Session 15 logged out. Waiting for processes to exit. Nov 1 04:38:01.180751 systemd-logind[1191]: Removed session 15. Nov 1 04:38:01.163000 audit[4874]: CRED_DISP pid=4874 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:01.190148 kernel: audit: type=1104 audit(1761971881.163:1444): pid=4874 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:01.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.11.230:22-139.178.89.65:57526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:02.094161 kubelet[2011]: E1101 04:38:02.094044 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-klqkh" podUID="9a35816c-1be0-4aa2-bf66-79617ab8330f" Nov 1 04:38:03.093277 kubelet[2011]: E1101 04:38:03.093217 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8" Nov 1 04:38:03.096161 kubelet[2011]: E1101 04:38:03.095471 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6cbc5bd78f-jgqrs" podUID="1f970c1e-fc1f-4851-ac5c-128a20d86234" Nov 1 04:38:05.096061 kubelet[2011]: E1101 04:38:05.095974 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" podUID="25204a16-ec6d-4388-9ea1-9773f8c99782" Nov 1 04:38:06.314722 systemd[1]: Started sshd@15-10.244.11.230:22-139.178.89.65:57158.service. Nov 1 04:38:06.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.11.230:22-139.178.89.65:57158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:06.317710 kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 1 04:38:06.318003 kernel: audit: type=1130 audit(1761971886.314:1446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.11.230:22-139.178.89.65:57158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:07.250000 audit[4891]: USER_ACCT pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:07.252366 sshd[4891]: Accepted publickey for core from 139.178.89.65 port 57158 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:38:07.259153 kernel: audit: type=1101 audit(1761971887.250:1447): pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:07.260000 audit[4891]: CRED_ACQ pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:07.262701 sshd[4891]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:38:07.286583 kernel: audit: type=1103 audit(1761971887.260:1448): pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:07.286795 kernel: audit: type=1006 audit(1761971887.260:1449): pid=4891 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Nov 1 04:38:07.260000 audit[4891]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9efe4710 a2=3 a3=0 items=0 ppid=1 pid=4891 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:07.296142 kernel: audit: type=1300 audit(1761971887.260:1449): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9efe4710 a2=3 a3=0 items=0 ppid=1 pid=4891 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:07.260000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:07.300553 kernel: audit: type=1327 audit(1761971887.260:1449): proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:07.305397 systemd-logind[1191]: New session 16 of user core. Nov 1 04:38:07.308061 systemd[1]: Started session-16.scope. Nov 1 04:38:07.316000 audit[4891]: USER_START pid=4891 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:07.326153 kernel: audit: type=1105 audit(1761971887.316:1450): pid=4891 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:07.326000 audit[4893]: CRED_ACQ pid=4893 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:07.335152 kernel: audit: type=1103 audit(1761971887.326:1451): pid=4893 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:08.099303 sshd[4891]: pam_unix(sshd:session): session closed for user core Nov 1 04:38:08.100000 audit[4891]: USER_END pid=4891 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:08.109145 kernel: audit: type=1106 audit(1761971888.100:1452): pid=4891 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:08.109678 systemd[1]: sshd@15-10.244.11.230:22-139.178.89.65:57158.service: Deactivated successfully. Nov 1 04:38:08.111035 systemd[1]: session-16.scope: Deactivated successfully. Nov 1 04:38:08.100000 audit[4891]: CRED_DISP pid=4891 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:08.112858 systemd-logind[1191]: Session 16 logged out. Waiting for processes to exit. Nov 1 04:38:08.119174 kernel: audit: type=1104 audit(1761971888.100:1453): pid=4891 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:08.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.11.230:22-139.178.89.65:57158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:08.120902 systemd-logind[1191]: Removed session 16. Nov 1 04:38:08.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.11.230:22-139.178.89.65:57170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:08.250673 systemd[1]: Started sshd@16-10.244.11.230:22-139.178.89.65:57170.service. Nov 1 04:38:09.196905 sshd[4903]: Accepted publickey for core from 139.178.89.65 port 57170 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:38:09.195000 audit[4903]: USER_ACCT pid=4903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:09.198000 audit[4903]: CRED_ACQ pid=4903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:09.198000 audit[4903]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde2439980 a2=3 a3=0 items=0 ppid=1 pid=4903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:09.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:09.201232 sshd[4903]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:38:09.211203 systemd-logind[1191]: New session 17 of user core. Nov 1 04:38:09.213724 systemd[1]: Started session-17.scope. Nov 1 04:38:09.221000 audit[4903]: USER_START pid=4903 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:09.224000 audit[4905]: CRED_ACQ pid=4905 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:10.096847 kubelet[2011]: E1101 04:38:10.096728 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:38:10.537619 sshd[4903]: pam_unix(sshd:session): session closed for user core Nov 1 04:38:10.544000 audit[4903]: USER_END pid=4903 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:10.544000 audit[4903]: CRED_DISP pid=4903 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:10.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.11.230:22-139.178.89.65:57170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:10.548382 systemd-logind[1191]: Session 17 logged out. Waiting for processes to exit. Nov 1 04:38:10.548803 systemd[1]: sshd@16-10.244.11.230:22-139.178.89.65:57170.service: Deactivated successfully. Nov 1 04:38:10.551883 systemd[1]: session-17.scope: Deactivated successfully. Nov 1 04:38:10.555596 systemd-logind[1191]: Removed session 17. Nov 1 04:38:10.681998 systemd[1]: Started sshd@17-10.244.11.230:22-139.178.89.65:57176.service. Nov 1 04:38:10.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.11.230:22-139.178.89.65:57176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:11.640142 kernel: kauditd_printk_skb: 13 callbacks suppressed Nov 1 04:38:11.641034 kernel: audit: type=1101 audit(1761971891.627:1465): pid=4928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:11.627000 audit[4928]: USER_ACCT pid=4928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:11.642454 sshd[4928]: Accepted publickey for core from 139.178.89.65 port 57176 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:38:11.643000 audit[4928]: CRED_ACQ pid=4928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:11.656575 kernel: audit: type=1103 audit(1761971891.643:1466): pid=4928 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:11.656820 kernel: audit: type=1006 audit(1761971891.643:1467): pid=4928 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Nov 1 04:38:11.656880 kernel: audit: type=1300 audit(1761971891.643:1467): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2833cec0 a2=3 a3=0 items=0 ppid=1 pid=4928 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:11.643000 audit[4928]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2833cec0 a2=3 a3=0 items=0 ppid=1 pid=4928 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:11.657865 sshd[4928]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:38:11.643000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:11.668400 kernel: audit: type=1327 audit(1761971891.643:1467): proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:11.674156 systemd-logind[1191]: New session 18 of user core. Nov 1 04:38:11.677203 systemd[1]: Started session-18.scope. Nov 1 04:38:11.687000 audit[4928]: USER_START pid=4928 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:11.697252 kernel: audit: type=1105 audit(1761971891.687:1468): pid=4928 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:11.697000 audit[4934]: CRED_ACQ pid=4934 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:11.705252 kernel: audit: type=1103 audit(1761971891.697:1469): pid=4934 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:13.721496 sshd[4928]: pam_unix(sshd:session): session closed for user core Nov 1 04:38:13.735727 kernel: audit: type=1106 audit(1761971893.724:1470): pid=4928 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:13.724000 audit[4928]: USER_END pid=4928 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:13.725000 audit[4928]: CRED_DISP pid=4928 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:13.748352 kernel: audit: type=1104 audit(1761971893.725:1471): pid=4928 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:13.753433 systemd[1]: sshd@17-10.244.11.230:22-139.178.89.65:57176.service: Deactivated successfully. Nov 1 04:38:13.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.11.230:22-139.178.89.65:57176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:13.761187 kernel: audit: type=1131 audit(1761971893.752:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.11.230:22-139.178.89.65:57176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:13.756764 systemd[1]: session-18.scope: Deactivated successfully. Nov 1 04:38:13.760308 systemd-logind[1191]: Session 18 logged out. Waiting for processes to exit. Nov 1 04:38:13.761736 systemd-logind[1191]: Removed session 18. Nov 1 04:38:13.867773 systemd[1]: Started sshd@18-10.244.11.230:22-139.178.89.65:57190.service. Nov 1 04:38:13.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.11.230:22-139.178.89.65:57190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:13.912000 audit[4950]: NETFILTER_CFG table=filter:128 family=2 entries=26 op=nft_register_rule pid=4950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:38:13.912000 audit[4950]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffddea3dc30 a2=0 a3=7ffddea3dc1c items=0 ppid=2119 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:13.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:38:13.918000 audit[4950]: NETFILTER_CFG table=nat:129 family=2 entries=20 op=nft_register_rule pid=4950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:38:13.918000 audit[4950]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffddea3dc30 a2=0 a3=0 items=0 ppid=2119 pid=4950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:13.918000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:38:13.958000 audit[4953]: NETFILTER_CFG table=filter:130 family=2 entries=38 op=nft_register_rule pid=4953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:38:13.958000 audit[4953]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffe0e675620 a2=0 a3=7ffe0e67560c items=0 ppid=2119 pid=4953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:13.958000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:38:13.963000 audit[4953]: NETFILTER_CFG table=nat:131 family=2 entries=20 op=nft_register_rule pid=4953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:38:13.963000 audit[4953]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe0e675620 a2=0 a3=0 items=0 ppid=2119 pid=4953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:13.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:38:14.130508 kubelet[2011]: E1101 04:38:14.130394 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-klqkh" podUID="9a35816c-1be0-4aa2-bf66-79617ab8330f" Nov 1 04:38:14.810000 audit[4949]: USER_ACCT pid=4949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:14.811814 sshd[4949]: Accepted publickey for core from 139.178.89.65 port 57190 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:38:14.814000 audit[4949]: CRED_ACQ pid=4949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:14.814000 audit[4949]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc8917d70 a2=3 a3=0 items=0 ppid=1 pid=4949 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:14.814000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:14.817866 sshd[4949]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:38:14.828398 systemd-logind[1191]: New session 19 of user core. Nov 1 04:38:14.830246 systemd[1]: Started session-19.scope. Nov 1 04:38:14.839000 audit[4949]: USER_START pid=4949 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:14.841000 audit[4954]: CRED_ACQ pid=4954 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:15.128340 env[1200]: time="2025-11-01T04:38:15.126420909Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Nov 1 04:38:15.432027 env[1200]: time="2025-11-01T04:38:15.431779261Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:38:15.433278 env[1200]: time="2025-11-01T04:38:15.433172911Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Nov 1 04:38:15.459316 kubelet[2011]: E1101 04:38:15.451971 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 04:38:15.473389 kubelet[2011]: E1101 04:38:15.473283 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Nov 1 04:38:15.542721 kubelet[2011]: E1101 04:38:15.542578 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-s2gct,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-6d9b84d64-gh6zn_calico-system(a04c514c-f548-4854-abe7-a0adc995c889): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Nov 1 04:38:15.544250 kubelet[2011]: E1101 04:38:15.544187 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" podUID="a04c514c-f548-4854-abe7-a0adc995c889" Nov 1 04:38:16.571851 sshd[4949]: pam_unix(sshd:session): session closed for user core Nov 1 04:38:16.578000 audit[4949]: USER_END pid=4949 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:16.578000 audit[4949]: CRED_DISP pid=4949 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:16.582659 systemd-logind[1191]: Session 19 logged out. Waiting for processes to exit. Nov 1 04:38:16.585237 systemd[1]: sshd@18-10.244.11.230:22-139.178.89.65:57190.service: Deactivated successfully. Nov 1 04:38:16.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.11.230:22-139.178.89.65:57190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:16.587103 systemd[1]: session-19.scope: Deactivated successfully. Nov 1 04:38:16.588859 systemd-logind[1191]: Removed session 19. Nov 1 04:38:16.724538 systemd[1]: Started sshd@19-10.244.11.230:22-139.178.89.65:45864.service. Nov 1 04:38:16.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.11.230:22-139.178.89.65:45864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:16.731463 kernel: kauditd_printk_skb: 23 callbacks suppressed Nov 1 04:38:16.732488 kernel: audit: type=1130 audit(1761971896.724:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.11.230:22-139.178.89.65:45864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:17.230821 env[1200]: time="2025-11-01T04:38:17.230696452Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Nov 1 04:38:17.538214 env[1200]: time="2025-11-01T04:38:17.538052869Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:38:17.539674 env[1200]: time="2025-11-01T04:38:17.539566322Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Nov 1 04:38:17.540417 kubelet[2011]: E1101 04:38:17.540234 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 04:38:17.541075 kubelet[2011]: E1101 04:38:17.541038 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Nov 1 04:38:17.541578 kubelet[2011]: E1101 04:38:17.541501 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:ee5615a3b1d44da0ac00b8c4d31c8559,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-bw556,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6cbc5bd78f-jgqrs_calico-system(1f970c1e-fc1f-4851-ac5c-128a20d86234): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Nov 1 04:38:17.545687 env[1200]: time="2025-11-01T04:38:17.545248584Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Nov 1 04:38:17.669593 sshd[4983]: Accepted publickey for core from 139.178.89.65 port 45864 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:38:17.666000 audit[4983]: USER_ACCT pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:17.677142 kernel: audit: type=1101 audit(1761971897.666:1487): pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:17.677548 sshd[4983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:38:17.675000 audit[4983]: CRED_ACQ pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:17.686174 kernel: audit: type=1103 audit(1761971897.675:1488): pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:17.697829 kernel: audit: type=1006 audit(1761971897.675:1489): pid=4983 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Nov 1 04:38:17.699235 systemd-logind[1191]: New session 20 of user core. Nov 1 04:38:17.700389 systemd[1]: Started session-20.scope. Nov 1 04:38:17.675000 audit[4983]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8a22dd40 a2=3 a3=0 items=0 ppid=1 pid=4983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:17.675000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:17.710981 kernel: audit: type=1300 audit(1761971897.675:1489): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8a22dd40 a2=3 a3=0 items=0 ppid=1 pid=4983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:17.711554 kernel: audit: type=1327 audit(1761971897.675:1489): proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:17.717000 audit[4983]: USER_START pid=4983 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:17.730145 kernel: audit: type=1105 audit(1761971897.717:1490): pid=4983 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:17.735000 audit[4985]: CRED_ACQ pid=4985 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:17.743145 kernel: audit: type=1103 audit(1761971897.735:1491): pid=4985 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:17.852735 env[1200]: time="2025-11-01T04:38:17.851617705Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:38:17.857684 env[1200]: time="2025-11-01T04:38:17.857609285Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Nov 1 04:38:17.858310 kubelet[2011]: E1101 04:38:17.858185 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 04:38:17.858673 kubelet[2011]: E1101 04:38:17.858637 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Nov 1 04:38:17.859209 kubelet[2011]: E1101 04:38:17.859110 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-bw556,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6cbc5bd78f-jgqrs_calico-system(1f970c1e-fc1f-4851-ac5c-128a20d86234): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Nov 1 04:38:17.861220 kubelet[2011]: E1101 04:38:17.861145 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6cbc5bd78f-jgqrs" podUID="1f970c1e-fc1f-4851-ac5c-128a20d86234" Nov 1 04:38:18.094105 env[1200]: time="2025-11-01T04:38:18.094045319Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 04:38:18.409310 env[1200]: time="2025-11-01T04:38:18.409182073Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:38:18.414898 env[1200]: time="2025-11-01T04:38:18.413019030Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 04:38:18.415426 kubelet[2011]: E1101 04:38:18.415217 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:38:18.415677 kubelet[2011]: E1101 04:38:18.415637 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:38:18.421042 env[1200]: time="2025-11-01T04:38:18.420997594Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Nov 1 04:38:18.431034 kubelet[2011]: E1101 04:38:18.430898 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-m4ggz,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d5d4c457c-d2k4h_calico-apiserver(a466af82-23ad-4581-8753-4ea82dbddbf8): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 04:38:18.438181 kubelet[2011]: E1101 04:38:18.437590 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8" Nov 1 04:38:18.593734 sshd[4983]: pam_unix(sshd:session): session closed for user core Nov 1 04:38:18.595000 audit[4983]: USER_END pid=4983 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:18.596000 audit[4983]: CRED_DISP pid=4983 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:18.612938 kernel: audit: type=1106 audit(1761971898.595:1492): pid=4983 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:18.613072 kernel: audit: type=1104 audit(1761971898.596:1493): pid=4983 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:18.613598 systemd[1]: sshd@19-10.244.11.230:22-139.178.89.65:45864.service: Deactivated successfully. Nov 1 04:38:18.615290 systemd[1]: session-20.scope: Deactivated successfully. Nov 1 04:38:18.616212 systemd-logind[1191]: Session 20 logged out. Waiting for processes to exit. Nov 1 04:38:18.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.11.230:22-139.178.89.65:45864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:18.617903 systemd-logind[1191]: Removed session 20. Nov 1 04:38:18.751212 env[1200]: time="2025-11-01T04:38:18.750810307Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:38:18.759840 env[1200]: time="2025-11-01T04:38:18.759650898Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Nov 1 04:38:18.760484 kubelet[2011]: E1101 04:38:18.760249 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:38:18.760944 kubelet[2011]: E1101 04:38:18.760487 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Nov 1 04:38:18.760944 kubelet[2011]: E1101 04:38:18.760707 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vsjht,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-d5d4c457c-bzssw_calico-apiserver(25204a16-ec6d-4388-9ea1-9773f8c99782): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Nov 1 04:38:18.762558 kubelet[2011]: E1101 04:38:18.762442 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" podUID="25204a16-ec6d-4388-9ea1-9773f8c99782" Nov 1 04:38:23.097441 env[1200]: time="2025-11-01T04:38:23.097224611Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Nov 1 04:38:23.250000 audit[4998]: NETFILTER_CFG table=filter:132 family=2 entries=26 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:38:23.254336 kernel: kauditd_printk_skb: 1 callbacks suppressed Nov 1 04:38:23.254668 kernel: audit: type=1325 audit(1761971903.250:1495): table=filter:132 family=2 entries=26 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:38:23.250000 audit[4998]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcca68b370 a2=0 a3=7ffcca68b35c items=0 ppid=2119 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:23.266317 kernel: audit: type=1300 audit(1761971903.250:1495): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcca68b370 a2=0 a3=7ffcca68b35c items=0 ppid=2119 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:23.270486 kernel: audit: type=1327 audit(1761971903.250:1495): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:38:23.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:38:23.300000 audit[4998]: NETFILTER_CFG table=nat:133 family=2 entries=104 op=nft_register_chain pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:38:23.300000 audit[4998]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffcca68b370 a2=0 a3=7ffcca68b35c items=0 ppid=2119 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:23.315145 kernel: audit: type=1325 audit(1761971903.300:1496): table=nat:133 family=2 entries=104 op=nft_register_chain pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Nov 1 04:38:23.315327 kernel: audit: type=1300 audit(1761971903.300:1496): arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffcca68b370 a2=0 a3=7ffcca68b35c items=0 ppid=2119 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:23.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:38:23.319623 kernel: audit: type=1327 audit(1761971903.300:1496): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Nov 1 04:38:23.407261 env[1200]: time="2025-11-01T04:38:23.406912871Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:38:23.410036 env[1200]: time="2025-11-01T04:38:23.409917675Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Nov 1 04:38:23.411262 kubelet[2011]: E1101 04:38:23.410633 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 04:38:23.411262 kubelet[2011]: E1101 04:38:23.410765 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Nov 1 04:38:23.411262 kubelet[2011]: E1101 04:38:23.411147 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9dpjt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xqtpq_calico-system(ccda356b-9c43-49d4-bc40-aea58a266a51): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Nov 1 04:38:23.413788 env[1200]: time="2025-11-01T04:38:23.413714627Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Nov 1 04:38:23.721460 env[1200]: time="2025-11-01T04:38:23.721276474Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:38:23.723226 env[1200]: time="2025-11-01T04:38:23.723137067Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Nov 1 04:38:23.723732 kubelet[2011]: E1101 04:38:23.723646 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 04:38:23.723881 kubelet[2011]: E1101 04:38:23.723779 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Nov 1 04:38:23.724533 kubelet[2011]: E1101 04:38:23.724313 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9dpjt,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-xqtpq_calico-system(ccda356b-9c43-49d4-bc40-aea58a266a51): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Nov 1 04:38:23.725692 kubelet[2011]: E1101 04:38:23.725606 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-xqtpq" podUID="ccda356b-9c43-49d4-bc40-aea58a266a51" Nov 1 04:38:23.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.11.230:22-139.178.89.65:45880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:23.753260 systemd[1]: Started sshd@20-10.244.11.230:22-139.178.89.65:45880.service. Nov 1 04:38:23.762414 kernel: audit: type=1130 audit(1761971903.752:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.11.230:22-139.178.89.65:45880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:24.703000 audit[5000]: USER_ACCT pid=5000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:24.704071 sshd[5000]: Accepted publickey for core from 139.178.89.65 port 45880 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:38:24.711285 kernel: audit: type=1101 audit(1761971904.703:1498): pid=5000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:24.712000 audit[5000]: CRED_ACQ pid=5000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:24.719169 sshd[5000]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:38:24.722726 kernel: audit: type=1103 audit(1761971904.712:1499): pid=5000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:24.722814 kernel: audit: type=1006 audit(1761971904.712:1500): pid=5000 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Nov 1 04:38:24.712000 audit[5000]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf60d8c70 a2=3 a3=0 items=0 ppid=1 pid=5000 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:24.712000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:24.733198 systemd-logind[1191]: New session 21 of user core. Nov 1 04:38:24.734465 systemd[1]: Started session-21.scope. Nov 1 04:38:24.744000 audit[5000]: USER_START pid=5000 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:24.747000 audit[5002]: CRED_ACQ pid=5002 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:25.538469 sshd[5000]: pam_unix(sshd:session): session closed for user core Nov 1 04:38:25.541000 audit[5000]: USER_END pid=5000 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:25.541000 audit[5000]: CRED_DISP pid=5000 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:25.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.11.230:22-139.178.89.65:45880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:25.544156 systemd[1]: sshd@20-10.244.11.230:22-139.178.89.65:45880.service: Deactivated successfully. Nov 1 04:38:25.545500 systemd[1]: session-21.scope: Deactivated successfully. Nov 1 04:38:25.547013 systemd-logind[1191]: Session 21 logged out. Waiting for processes to exit. Nov 1 04:38:25.549564 systemd-logind[1191]: Removed session 21. Nov 1 04:38:28.098529 env[1200]: time="2025-11-01T04:38:28.098217268Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Nov 1 04:38:28.415853 env[1200]: time="2025-11-01T04:38:28.415510851Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Nov 1 04:38:28.417109 env[1200]: time="2025-11-01T04:38:28.417000855Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Nov 1 04:38:28.417666 kubelet[2011]: E1101 04:38:28.417526 2011 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 04:38:28.418346 kubelet[2011]: E1101 04:38:28.417716 2011 kuberuntime_image.go:42] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Nov 1 04:38:28.418346 kubelet[2011]: E1101 04:38:28.418246 2011 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-fl4cq,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-klqkh_calico-system(9a35816c-1be0-4aa2-bf66-79617ab8330f): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Nov 1 04:38:28.420096 kubelet[2011]: E1101 04:38:28.420028 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-klqkh" podUID="9a35816c-1be0-4aa2-bf66-79617ab8330f" Nov 1 04:38:30.695104 systemd[1]: Started sshd@21-10.244.11.230:22-139.178.89.65:47806.service. Nov 1 04:38:30.706188 kernel: kauditd_printk_skb: 7 callbacks suppressed Nov 1 04:38:30.706459 kernel: audit: type=1130 audit(1761971910.697:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.11.230:22-139.178.89.65:47806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:30.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.11.230:22-139.178.89.65:47806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:31.099045 kubelet[2011]: E1101 04:38:31.098965 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-6d9b84d64-gh6zn" podUID="a04c514c-f548-4854-abe7-a0adc995c889" Nov 1 04:38:31.654000 audit[5012]: USER_ACCT pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:31.656623 sshd[5012]: Accepted publickey for core from 139.178.89.65 port 47806 ssh2: RSA SHA256:V0PERg6UVsbWZGsAZFbTY/baYEpLUh6zfqFi+pvc+oM Nov 1 04:38:31.663147 kernel: audit: type=1101 audit(1761971911.654:1507): pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:31.661000 audit[5012]: CRED_ACQ pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:31.674222 kernel: audit: type=1103 audit(1761971911.661:1508): pid=5012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:31.674391 kernel: audit: type=1006 audit(1761971911.661:1509): pid=5012 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Nov 1 04:38:31.675741 sshd[5012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Nov 1 04:38:31.685543 kernel: audit: type=1300 audit(1761971911.661:1509): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd4289840 a2=3 a3=0 items=0 ppid=1 pid=5012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:31.661000 audit[5012]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd4289840 a2=3 a3=0 items=0 ppid=1 pid=5012 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Nov 1 04:38:31.661000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:31.690427 kernel: audit: type=1327 audit(1761971911.661:1509): proctitle=737368643A20636F7265205B707269765D Nov 1 04:38:31.695203 systemd-logind[1191]: New session 22 of user core. Nov 1 04:38:31.696966 systemd[1]: Started session-22.scope. Nov 1 04:38:31.704000 audit[5012]: USER_START pid=5012 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:31.715204 kernel: audit: type=1105 audit(1761971911.704:1510): pid=5012 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:31.713000 audit[5014]: CRED_ACQ pid=5014 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:31.724152 kernel: audit: type=1103 audit(1761971911.713:1511): pid=5014 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:32.093155 kubelet[2011]: E1101 04:38:32.093076 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-bzssw" podUID="25204a16-ec6d-4388-9ea1-9773f8c99782" Nov 1 04:38:32.094822 kubelet[2011]: E1101 04:38:32.094764 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-6cbc5bd78f-jgqrs" podUID="1f970c1e-fc1f-4851-ac5c-128a20d86234" Nov 1 04:38:32.540047 sshd[5012]: pam_unix(sshd:session): session closed for user core Nov 1 04:38:32.553041 kernel: audit: type=1106 audit(1761971912.541:1512): pid=5012 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:32.541000 audit[5012]: USER_END pid=5012 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:32.557104 systemd[1]: sshd@21-10.244.11.230:22-139.178.89.65:47806.service: Deactivated successfully. Nov 1 04:38:32.558567 systemd[1]: session-22.scope: Deactivated successfully. Nov 1 04:38:32.559827 systemd-logind[1191]: Session 22 logged out. Waiting for processes to exit. Nov 1 04:38:32.541000 audit[5012]: CRED_DISP pid=5012 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:32.581477 kernel: audit: type=1104 audit(1761971912.541:1513): pid=5012 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Nov 1 04:38:32.583651 systemd-logind[1191]: Removed session 22. Nov 1 04:38:32.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.11.230:22-139.178.89.65:47806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Nov 1 04:38:33.095141 kubelet[2011]: E1101 04:38:33.095058 2011 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-d5d4c457c-d2k4h" podUID="a466af82-23ad-4581-8753-4ea82dbddbf8"