cessfully. [ 11.633320] systemd[1]: Stopped systemd-fsck-root.service. [ 11.638938] systemd[1]: systemd-fsck-usr.service: Deactivated successfully. [ 11.641514] systemd[1]: Stopped systemd-fsck-usr.service. [ 11.645026] systemd[1]: Stopped systemd-journald.service. [ 11.653879] systemd[1]: Starting systemd-journald.service... [ 11.665403] loop: module loaded [ 11.673890] systemd[1]: Starting systemd-modules-load.service... [ 11.674454] fuse: init (API version 7.34) [ 11.680556] systemd[1]: Starting systemd-network-generator.service... [ 11.685773] systemd[1]: Starting systemd-remount-fs.service... [ 11.694954] systemd[1]: Starting systemd-udev-trigger.service... [ 11.698148] systemd[1]: verity-setup.service: Deactivated successfully. [ 11.700590] systemd[1]: Stopped verity-setup.service. [ 11.705875] systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). [ 11.714592] systemd[1]: Mounted dev-hugepages.mount. [ 11.719952] systemd[1]: Mounted dev-mqueue.mount. [ 11.724632] systemd[1]: Mounted media.mount. [ 11.727822] systemd[1]: Mounted sys-kernel-debug.mount. [ 11.731195] systemd[1]: Mounted sys-kernel-tracing.mount. [ 11.735519] systemd[1]: Mounted tmp.mount. [ 11.738937] systemd[1]: Finished kmod-static-nodes.service. [ 11.744008] systemd[1]: Started systemd-journald.service. [ 11.808736] systemd-journald[1421]: Received client request to flush runtime journal. [ 12.659017] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 [ 12.666774] ACPI: button: Power Button [PWRF] [ 12.668555] input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 [ 12.671042] ACPI: button: Sleep Button [SLPF] [ 12.768156] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 12.775929] piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr [ 12.798548] input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input4 [ 12.804285] mousedev: PS/2 mouse device common for all mice [ 13.095562] loop0: detected capacity change from 0 to 224512 [ 13.238360] squashfs: version 4.0 (2009/01/31) Phillip Lougher [ 13.265227] loop1: detected capacity change from 0 to 224512 [ 14.281429] EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks [ 14.359763] EXT4-fs (nvme0n1p9): resized filesystem to 1489915 2025/08/13 00:54:57Z: Amazon SSM Agent v2.3.1319.0 is running 2025/08/13 00:54:57Z: OsProductName: Flatcar Container Linux by Kinvolk 2025/08/13 00:54:57Z: OsVersion: 3510.3.8 This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:54:59 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: [ 19.378253] kauditd_printk_skb: 226 callbacks suppressed [ 19.378257] audit: type=1305 audit(1755046501.021:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 [ 19.384767] audit: type=1300 audit(1755046501.021:208): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd8958e2c0 a2=420 a3=0 items=0 ppid=1 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) [ 19.391331] audit: type=1327 audit(1755046501.021:208): proctitle=2F7362696E2F617564697463746C002D44 [ 19.393916] audit: type=1131 audit(1755046501.023:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 19.411620] audit: type=1130 audit(1755046501.054:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 19.415983] audit: type=1106 audit(1755046501.059:211): pid=1974 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 19.420248] audit: type=1104 audit(1755046501.059:212): pid=1974 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 19.440203] audit: type=1106 audit(1755046501.083:213): pid=1971 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 19.446788] audit: type=1104 audit(1755046501.083:214): pid=1971 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 19.533425] audit: type=1131 audit(1755046501.083:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.23.116:22-147.75.109.163:54726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 21.125010] Initializing XFRM netlink socket This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:55:03 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: [ 28.323736] kauditd_printk_skb: 84 callbacks suppressed [ 28.323739] audit: type=1130 audit(1755046509.965:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 28.330216] audit: type=1131 audit(1755046509.965:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 28.839348] audit: type=1130 audit(1755046510.482:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 28.900607] audit: type=1131 audit(1755046510.543:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 39.015722] audit: type=1130 audit(1755046520.658:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 39.019719] audit: type=1131 audit(1755046520.659:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 39.040830] audit: type=1130 audit(1755046520.684:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' [ 39.476210] audit: type=1400 audit(1755046521.119:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 39.479757] audit: type=1400 audit(1755046521.119:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 39.484532] audit: type=1400 audit(1755046521.119:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 39.491317] audit: audit_backlog=65 > audit_backlog_limit=64 [ 39.492138] audit: type=1400 audit(1755046521.119:260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 39.493394] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 39.500257] audit: type=1400 audit(1755046521.119:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 44.543167] kauditd_printk_skb: 615 callbacks suppressed [ 44.543172] audit: type=1131 audit(1755046526.185:581): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 44.574781] audit: type=1334 audit(1755046526.218:582): prog-id=52 op=UNLOAD [ 44.577898] audit: type=1334 audit(1755046526.218:583): prog-id=51 op=UNLOAD [ 44.580938] audit: type=1334 audit(1755046526.218:584): prog-id=50 op=UNLOAD [ 44.682055] audit: type=1400 audit(1755046526.325:585): avc: denied { watch } for pid=2480 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c114,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 44.690238] audit: type=1300 audit(1755046526.325:585): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0039b1f50 a2=fc6 a3=0 items=0 ppid=2338 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c114,c709 key=(null) [ 44.700135] audit: type=1327 audit(1755046526.325:585): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 44.710532] audit: type=1400 audit(1755046526.353:586): avc: denied { watch } for pid=2480 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c114,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 44.717989] audit: type=1300 audit(1755046526.353:586): arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c006db5100 a2=fc6 a3=0 items=0 ppid=2338 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c114,c709 key=(null) [ 44.730471] audit: type=1327 audit(1755046526.353:586): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 49.621428] kauditd_printk_skb: 258 callbacks suppressed [ 49.621431] audit: type=1400 audit(1755046531.264:837): avc: denied { mac_admin } for pid=2606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 49.632002] audit: type=1401 audit(1755046531.264:837): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 49.636434] audit: type=1300 audit(1755046531.264:837): arch=c000003e syscall=188 success=no exit=-22 a0=c000b2fec0 a1=c0008c1248 a2=c000b2fe90 a3=25 items=0 ppid=1 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) [ 49.648266] audit: type=1327 audit(1755046531.264:837): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 [ 49.659290] audit: type=1400 audit(1755046531.264:838): avc: denied { mac_admin } for pid=2606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 49.668217] audit: type=1401 audit(1755046531.264:838): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 49.673354] audit: type=1300 audit(1755046531.264:838): arch=c000003e syscall=188 success=no exit=-22 a0=c0008d57e0 a1=c0008c1260 a2=c000b2ff50 a3=25 items=0 ppid=1 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) [ 49.685519] audit: type=1327 audit(1755046531.264:838): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 [ 49.813147] audit: type=1400 audit(1755046531.456:839): avc: denied { mac_admin } for pid=2606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 49.821670] audit: type=1401 audit(1755046531.456:839): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 56.488150] kauditd_printk_skb: 327 callbacks suppressed [ 56.488153] audit: type=1400 audit(1755046538.131:938): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.497060] audit: type=1400 audit(1755046538.131:939): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.503828] audit: type=1400 audit(1755046538.131:940): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.510470] audit: type=1400 audit(1755046538.131:941): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.516063] audit: type=1400 audit(1755046538.131:942): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.521922] audit: type=1400 audit(1755046538.131:943): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.529436] audit: type=1400 audit(1755046538.131:944): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.537724] audit: type=1400 audit(1755046538.131:945): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.545532] audit: type=1400 audit(1755046538.131:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.554228] audit: type=1400 audit(1755046538.147:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 63.793735] kauditd_printk_skb: 47 callbacks suppressed [ 63.793738] audit: type=1106 audit(1755046545.436:956): pid=2004 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 63.813269] audit: type=1104 audit(1755046545.436:957): pid=2004 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 63.839730] audit: type=1106 audit(1755046545.483:958): pid=2001 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 63.856261] audit: type=1104 audit(1755046545.483:959): pid=2001 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 63.865671] audit: type=1131 audit(1755046545.483:960): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.116:22-147.75.109.163:54732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 65.316657] audit: type=1325 audit(1755046546.957:961): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 65.327932] audit: type=1300 audit(1755046546.957:961): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdd9af3690 a2=0 a3=7ffdd9af367c items=0 ppid=2710 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 65.341985] audit: type=1327 audit(1755046546.957:961): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 65.351598] audit: type=1325 audit(1755046546.984:962): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 65.358520] audit: type=1300 audit(1755046546.984:962): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdd9af3690 a2=0 a3=0 items=0 ppid=2710 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 68.968116] kauditd_printk_skb: 19 callbacks suppressed [ 68.968119] audit: type=1400 audit(1755046550.611:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 68.978927] audit: type=1400 audit(1755046550.611:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 68.986036] audit: type=1400 audit(1755046550.611:971): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 68.994367] audit: type=1400 audit(1755046550.611:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.001699] audit: type=1400 audit(1755046550.611:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.014996] audit: type=1400 audit(1755046550.611:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.021414] audit: type=1400 audit(1755046550.611:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.029528] audit: type=1400 audit(1755046550.611:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.037205] audit: type=1400 audit(1755046550.611:977): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.045028] audit: type=1400 audit(1755046550.611:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.856921] kauditd_printk_skb: 211 callbacks suppressed [ 77.856924] audit: type=1400 audit(1755046559.500:1032): avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.863805] audit: type=1300 audit(1755046559.500:1032): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f31e9c283c8 items=0 ppid=3144 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 77.873231] audit: type=1327 audit(1755046559.500:1032): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337636139373738363761313735376565393339303636336134653435 [ 77.882781] audit: type=1400 audit(1755046559.500:1033): avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.892898] audit: type=1400 audit(1755046559.500:1033): avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.899397] audit: type=1400 audit(1755046559.500:1033): avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.907008] audit: type=1400 audit(1755046559.500:1033): avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.914959] audit: type=1400 audit(1755046559.500:1033): avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.927110] audit: type=1400 audit(1755046559.500:1033): avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.934489] audit: type=1400 audit(1755046559.500:1033): avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.676802] kauditd_printk_skb: 34 callbacks suppressed [ 89.676805] audit: type=1400 audit(1755046571.320:1039): avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.686191] audit: type=1300 audit(1755046571.320:1039): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe42c2bb198 items=0 ppid=3144 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 89.696293] audit: type=1327 audit(1755046571.320:1039): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164333430373762613337313333396236616639393730663461396636 [ 89.706962] audit: type=1400 audit(1755046571.320:1040): avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.717440] audit: type=1400 audit(1755046571.320:1040): avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.725999] audit: type=1400 audit(1755046571.320:1040): avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.732964] audit: type=1400 audit(1755046571.320:1040): avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.739061] audit: type=1400 audit(1755046571.320:1040): avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.746437] audit: type=1400 audit(1755046571.320:1040): avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.753516] audit: type=1400 audit(1755046571.320:1040): avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.199593] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 90.201622] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. [ 92.347056] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 92.349776] IPv6: ADDRCONF(NETDEV_CHANGE): caliabfb658b3e5: link becomes ready [ 93.181427] IPv6: ADDRCONF(NETDEV_CHANGE): cali985cb8c701b: link becomes ready [ 94.490328] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 94.491731] IPv6: ADDRCONF(NETDEV_CHANGE): cali10e012431b2: link becomes ready [ 94.716791] IPv6: ADDRCONF(NETDEV_CHANGE): cali0d537d42cae: link becomes ready [ 94.888468] kauditd_printk_skb: 190 callbacks suppressed [ 94.888472] audit: type=1400 audit(1755046576.531:1094): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.894013] audit: type=1400 audit(1755046576.531:1095): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.900408] audit: type=1400 audit(1755046576.531:1096): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.908413] audit: type=1400 audit(1755046576.531:1097): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.916969] audit: type=1400 audit(1755046576.531:1098): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.923839] audit: type=1400 audit(1755046576.531:1099): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.935841] audit: type=1400 audit(1755046576.531:1100): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.945733] audit: type=1400 audit(1755046576.531:1101): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.951392] audit: type=1400 audit(1755046576.531:1102): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.957712] audit: type=1400 audit(1755046576.531:1103): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:16 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: [ 95.458782] IPv6: ADDRCONF(NETDEV_CHANGE): cali5e43aa988bc: link becomes ready This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:17 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:18 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: [ 97.853348] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 97.854621] IPv6: ADDRCONF(NETDEV_CHANGE): calid48573e76ab: link becomes ready [ 98.056996] IPv6: ADDRCONF(NETDEV_CHANGE): cali4f2af50d4de: link becomes ready [ 98.175458] IPv6: ADDRCONF(NETDEV_CHANGE): cali563d364a552: link becomes ready This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:19 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: [ 100.004627] kauditd_printk_skb: 614 callbacks suppressed [ 100.004630] audit: type=1325 audit(1755046581.648:1281): table=filter:105 family=2 entries=17 op=nft_register_rule pid=5014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 100.009807] audit: type=1300 audit(1755046581.648:1281): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdb6dbf5c0 a2=0 a3=7ffdb6dbf5ac items=0 ppid=2710 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 100.024408] audit: type=1327 audit(1755046581.648:1281): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:21 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: [ 100.061956] audit: type=1325 audit(1755046581.705:1282): table=nat:106 family=2 entries=47 op=nft_register_chain pid=5014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 100.065197] audit: type=1300 audit(1755046581.705:1282): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffdb6dbf5c0 a2=0 a3=7ffdb6dbf5ac items=0 ppid=2710 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 100.072717] audit: type=1327 audit(1755046581.705:1282): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 100.164291] audit: type=1130 audit(1755046581.807:1283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.23.116:22-147.75.109.163:56570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 100.178544] audit: type=1400 audit(1755046581.822:1284): avc: denied { bpf } for pid=5004 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.185862] audit: type=1400 audit(1755046581.822:1284): avc: denied { bpf } for pid=5004 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.189734] audit: type=1400 audit(1755046581.822:1284): avc: denied { perfmon } for pid=5004 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:22 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:23 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:24 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: [ 106.466820] kauditd_printk_skb: 544 callbacks suppressed [ 106.466831] audit: type=1130 audit(1755046588.110:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.23.116:22-147.75.109.163:33974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 106.813235] audit: type=1400 audit(1755046588.456:1413): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.816446] audit: type=1400 audit(1755046588.456:1414): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.820237] audit: type=1400 audit(1755046588.456:1415): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.825193] audit: type=1400 audit(1755046588.456:1416): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.831186] audit: type=1400 audit(1755046588.456:1417): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.837681] audit: type=1400 audit(1755046588.456:1418): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.842231] audit: type=1400 audit(1755046588.456:1419): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.850875] audit: type=1400 audit(1755046588.456:1420): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.862461] audit: type=1400 audit(1755046588.456:1421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.569611] kauditd_printk_skb: 135 callbacks suppressed [ 111.569614] audit: type=1400 audit(1755046593.213:1467): avc: denied { watch } for pid=2473 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 111.584860] audit: type=1300 audit(1755046593.213:1467): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f31120 a2=fc6 a3=0 items=0 ppid=2326 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 key=(null) [ 111.601983] audit: type=1327 audit(1755046593.213:1467): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 111.614855] audit: type=1400 audit(1755046593.213:1468): avc: denied { watch } for pid=2473 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 111.626512] audit: type=1300 audit(1755046593.213:1468): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017cb880 a2=fc6 a3=0 items=0 ppid=2326 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 key=(null) [ 111.638842] audit: type=1327 audit(1755046593.213:1468): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 111.650239] audit: type=1400 audit(1755046593.243:1469): avc: denied { watch } for pid=2473 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 111.659135] audit: type=1300 audit(1755046593.243:1469): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017cb900 a2=fc6 a3=0 items=0 ppid=2326 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 key=(null) [ 111.671200] audit: type=1327 audit(1755046593.243:1469): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 111.682388] audit: type=1400 audit(1755046593.243:1470): avc: denied { watch } for pid=2473 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 116.905475] kauditd_printk_skb: 76 callbacks suppressed [ 116.905478] audit: type=1400 audit(1755046598.549:1500): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.914537] audit: type=1400 audit(1755046598.549:1501): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.921220] audit: type=1400 audit(1755046598.549:1502): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.927847] audit: type=1400 audit(1755046598.549:1503): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.934702] audit: type=1400 audit(1755046598.549:1504): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.941402] audit: type=1400 audit(1755046598.549:1505): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.948348] audit: type=1400 audit(1755046598.549:1506): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.955050] audit: type=1400 audit(1755046598.549:1507): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.961859] audit: type=1400 audit(1755046598.549:1508): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.968520] audit: type=1400 audit(1755046598.551:1509): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 39.491317] audit: audit_backlog=65 > audit_backlog_limit=64 [ 39.492138] audit: type=1400 audit(1755046521.119:260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 39.493394] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 39.500257] audit: type=1400 audit(1755046521.119:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 44.543167] kauditd_printk_skb: 615 callbacks suppressed [ 44.543172] audit: type=1131 audit(1755046526.185:581): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 44.574781] audit: type=1334 audit(1755046526.218:582): prog-id=52 op=UNLOAD [ 44.577898] audit: type=1334 audit(1755046526.218:583): prog-id=51 op=UNLOAD [ 44.580938] audit: type=1334 audit(1755046526.218:584): prog-id=50 op=UNLOAD [ 44.682055] audit: type=1400 audit(1755046526.325:585): avc: denied { watch } for pid=2480 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c114,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 44.690238] audit: type=1300 audit(1755046526.325:585): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c0039b1f50 a2=fc6 a3=0 items=0 ppid=2338 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c114,c709 key=(null) [ 44.700135] audit: type=1327 audit(1755046526.325:585): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 44.710532] audit: type=1400 audit(1755046526.353:586): avc: denied { watch } for pid=2480 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c114,c709 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 44.717989] audit: type=1300 audit(1755046526.353:586): arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c006db5100 a2=fc6 a3=0 items=0 ppid=2338 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c114,c709 key=(null) [ 44.730471] audit: type=1327 audit(1755046526.353:586): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E32332E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 49.621428] kauditd_printk_skb: 258 callbacks suppressed [ 49.621431] audit: type=1400 audit(1755046531.264:837): avc: denied { mac_admin } for pid=2606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 49.632002] audit: type=1401 audit(1755046531.264:837): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 49.636434] audit: type=1300 audit(1755046531.264:837): arch=c000003e syscall=188 success=no exit=-22 a0=c000b2fec0 a1=c0008c1248 a2=c000b2fe90 a3=25 items=0 ppid=1 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) [ 49.648266] audit: type=1327 audit(1755046531.264:837): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 [ 49.659290] audit: type=1400 audit(1755046531.264:838): avc: denied { mac_admin } for pid=2606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 49.668217] audit: type=1401 audit(1755046531.264:838): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 49.673354] audit: type=1300 audit(1755046531.264:838): arch=c000003e syscall=188 success=no exit=-22 a0=c0008d57e0 a1=c0008c1260 a2=c000b2ff50 a3=25 items=0 ppid=1 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) [ 49.685519] audit: type=1327 audit(1755046531.264:838): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 [ 49.813147] audit: type=1400 audit(1755046531.456:839): avc: denied { mac_admin } for pid=2606 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 49.821670] audit: type=1401 audit(1755046531.456:839): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" [ 56.488150] kauditd_printk_skb: 327 callbacks suppressed [ 56.488153] audit: type=1400 audit(1755046538.131:938): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.497060] audit: type=1400 audit(1755046538.131:939): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.503828] audit: type=1400 audit(1755046538.131:940): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.510470] audit: type=1400 audit(1755046538.131:941): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.516063] audit: type=1400 audit(1755046538.131:942): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.521922] audit: type=1400 audit(1755046538.131:943): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.529436] audit: type=1400 audit(1755046538.131:944): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.537724] audit: type=1400 audit(1755046538.131:945): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.545532] audit: type=1400 audit(1755046538.131:946): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 56.554228] audit: type=1400 audit(1755046538.147:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 63.793735] kauditd_printk_skb: 47 callbacks suppressed [ 63.793738] audit: type=1106 audit(1755046545.436:956): pid=2004 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 63.813269] audit: type=1104 audit(1755046545.436:957): pid=2004 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' [ 63.839730] audit: type=1106 audit(1755046545.483:958): pid=2001 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 63.856261] audit: type=1104 audit(1755046545.483:959): pid=2001 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 63.865671] audit: type=1131 audit(1755046545.483:960): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.23.116:22-147.75.109.163:54732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 65.316657] audit: type=1325 audit(1755046546.957:961): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 65.327932] audit: type=1300 audit(1755046546.957:961): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdd9af3690 a2=0 a3=7ffdd9af367c items=0 ppid=2710 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 65.341985] audit: type=1327 audit(1755046546.957:961): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 65.351598] audit: type=1325 audit(1755046546.984:962): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3079 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 65.358520] audit: type=1300 audit(1755046546.984:962): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdd9af3690 a2=0 a3=0 items=0 ppid=2710 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 68.968116] kauditd_printk_skb: 19 callbacks suppressed [ 68.968119] audit: type=1400 audit(1755046550.611:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 68.978927] audit: type=1400 audit(1755046550.611:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 68.986036] audit: type=1400 audit(1755046550.611:971): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 68.994367] audit: type=1400 audit(1755046550.611:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.001699] audit: type=1400 audit(1755046550.611:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.014996] audit: type=1400 audit(1755046550.611:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.021414] audit: type=1400 audit(1755046550.611:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.029528] audit: type=1400 audit(1755046550.611:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.037205] audit: type=1400 audit(1755046550.611:977): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 69.045028] audit: type=1400 audit(1755046550.611:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.856921] kauditd_printk_skb: 211 callbacks suppressed [ 77.856924] audit: type=1400 audit(1755046559.500:1032): avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.863805] audit: type=1300 audit(1755046559.500:1032): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f31e9c283c8 items=0 ppid=3144 pid=3395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 77.873231] audit: type=1327 audit(1755046559.500:1032): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337636139373738363761313735376565393339303636336134653435 [ 77.882781] audit: type=1400 audit(1755046559.500:1033): avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.892898] audit: type=1400 audit(1755046559.500:1033): avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.899397] audit: type=1400 audit(1755046559.500:1033): avc: denied { bpf } for pid=3395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.907008] audit: type=1400 audit(1755046559.500:1033): avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.914959] audit: type=1400 audit(1755046559.500:1033): avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.927110] audit: type=1400 audit(1755046559.500:1033): avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 77.934489] audit: type=1400 audit(1755046559.500:1033): avc: denied { perfmon } for pid=3395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.676802] kauditd_printk_skb: 34 callbacks suppressed [ 89.676805] audit: type=1400 audit(1755046571.320:1039): avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.686191] audit: type=1300 audit(1755046571.320:1039): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fe42c2bb198 items=0 ppid=3144 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 89.696293] audit: type=1327 audit(1755046571.320:1039): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164333430373762613337313333396236616639393730663461396636 [ 89.706962] audit: type=1400 audit(1755046571.320:1040): avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.717440] audit: type=1400 audit(1755046571.320:1040): avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.725999] audit: type=1400 audit(1755046571.320:1040): avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.732964] audit: type=1400 audit(1755046571.320:1040): avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.739061] audit: type=1400 audit(1755046571.320:1040): avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.746437] audit: type=1400 audit(1755046571.320:1040): avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 89.753516] audit: type=1400 audit(1755046571.320:1040): avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 90.199593] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 90.201622] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. [ 92.347056] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 92.349776] IPv6: ADDRCONF(NETDEV_CHANGE): caliabfb658b3e5: link becomes ready [ 93.181427] IPv6: ADDRCONF(NETDEV_CHANGE): cali985cb8c701b: link becomes ready [ 94.490328] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 94.491731] IPv6: ADDRCONF(NETDEV_CHANGE): cali10e012431b2: link becomes ready [ 94.716791] IPv6: ADDRCONF(NETDEV_CHANGE): cali0d537d42cae: link becomes ready [ 94.888468] kauditd_printk_skb: 190 callbacks suppressed [ 94.888472] audit: type=1400 audit(1755046576.531:1094): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.894013] audit: type=1400 audit(1755046576.531:1095): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.900408] audit: type=1400 audit(1755046576.531:1096): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.908413] audit: type=1400 audit(1755046576.531:1097): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.916969] audit: type=1400 audit(1755046576.531:1098): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.923839] audit: type=1400 audit(1755046576.531:1099): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.935841] audit: type=1400 audit(1755046576.531:1100): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.945733] audit: type=1400 audit(1755046576.531:1101): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.951392] audit: type=1400 audit(1755046576.531:1102): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 94.957712] audit: type=1400 audit(1755046576.531:1103): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:16 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: [ 95.458782] IPv6: ADDRCONF(NETDEV_CHANGE): cali5e43aa988bc: link becomes ready This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:17 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:18 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: [ 97.853348] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 97.854621] IPv6: ADDRCONF(NETDEV_CHANGE): calid48573e76ab: link becomes ready [ 98.056996] IPv6: ADDRCONF(NETDEV_CHANGE): cali4f2af50d4de: link becomes ready [ 98.175458] IPv6: ADDRCONF(NETDEV_CHANGE): cali563d364a552: link becomes ready This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:19 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: [ 100.004627] kauditd_printk_skb: 614 callbacks suppressed [ 100.004630] audit: type=1325 audit(1755046581.648:1281): table=filter:105 family=2 entries=17 op=nft_register_rule pid=5014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 100.009807] audit: type=1300 audit(1755046581.648:1281): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdb6dbf5c0 a2=0 a3=7ffdb6dbf5ac items=0 ppid=2710 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 100.024408] audit: type=1327 audit(1755046581.648:1281): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:21 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: [ 100.061956] audit: type=1325 audit(1755046581.705:1282): table=nat:106 family=2 entries=47 op=nft_register_chain pid=5014 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 100.065197] audit: type=1300 audit(1755046581.705:1282): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffdb6dbf5c0 a2=0 a3=7ffdb6dbf5ac items=0 ppid=2710 pid=5014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 100.072717] audit: type=1327 audit(1755046581.705:1282): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 100.164291] audit: type=1130 audit(1755046581.807:1283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.23.116:22-147.75.109.163:56570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 100.178544] audit: type=1400 audit(1755046581.822:1284): avc: denied { bpf } for pid=5004 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.185862] audit: type=1400 audit(1755046581.822:1284): avc: denied { bpf } for pid=5004 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.189734] audit: type=1400 audit(1755046581.822:1284): avc: denied { perfmon } for pid=5004 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:22 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:23 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: This is ip-172-31-23-116 (Linux x86_64 5.15.189-flatcar) 00:56:24 SSH host key: SHA256:dO6ni+DoiFqjkQAahT6fUCcRdeT8WLspjERwXErk2iw (ED25519) SSH host key: SHA256:qLVGPFnbpAYGSGIdi3c5SCU7b8QJVAHaCeLvmtgF/FY (ECDSA) SSH host key: SHA256:z2wk8cT5Ab/CGfh26+Bhpm/114byb+guaayK6spuOVQ (RSA) eth0: 172.31.23.116 fe80::4f0:58ff:fe20:4847 ip-172-31-23-116 login: [ 106.466820] kauditd_printk_skb: 544 callbacks suppressed [ 106.466831] audit: type=1130 audit(1755046588.110:1412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.23.116:22-147.75.109.163:33974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 106.813235] audit: type=1400 audit(1755046588.456:1413): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.816446] audit: type=1400 audit(1755046588.456:1414): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.820237] audit: type=1400 audit(1755046588.456:1415): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.825193] audit: type=1400 audit(1755046588.456:1416): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.831186] audit: type=1400 audit(1755046588.456:1417): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.837681] audit: type=1400 audit(1755046588.456:1418): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.842231] audit: type=1400 audit(1755046588.456:1419): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.850875] audit: type=1400 audit(1755046588.456:1420): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 106.862461] audit: type=1400 audit(1755046588.456:1421): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 111.569611] kauditd_printk_skb: 135 callbacks suppressed [ 111.569614] audit: type=1400 audit(1755046593.213:1467): avc: denied { watch } for pid=2473 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 111.584860] audit: type=1300 audit(1755046593.213:1467): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f31120 a2=fc6 a3=0 items=0 ppid=2326 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 key=(null) [ 111.601983] audit: type=1327 audit(1755046593.213:1467): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 111.614855] audit: type=1400 audit(1755046593.213:1468): avc: denied { watch } for pid=2473 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 111.626512] audit: type=1300 audit(1755046593.213:1468): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017cb880 a2=fc6 a3=0 items=0 ppid=2326 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 key=(null) [ 111.638842] audit: type=1327 audit(1755046593.213:1468): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 111.650239] audit: type=1400 audit(1755046593.243:1469): avc: denied { watch } for pid=2473 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 111.659135] audit: type=1300 audit(1755046593.243:1469): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017cb900 a2=fc6 a3=0 items=0 ppid=2326 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 key=(null) [ 111.671200] audit: type=1327 audit(1755046593.243:1469): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 111.682388] audit: type=1400 audit(1755046593.243:1470): avc: denied { watch } for pid=2473 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c12,c196 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 116.905475] kauditd_printk_skb: 76 callbacks suppressed [ 116.905478] audit: type=1400 audit(1755046598.549:1500): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.914537] audit: type=1400 audit(1755046598.549:1501): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.921220] audit: type=1400 audit(1755046598.549:1502): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.927847] audit: type=1400 audit(1755046598.549:1503): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.934702] audit: type=1400 audit(1755046598.549:1504): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.941402] audit: type=1400 audit(1755046598.549:1505): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.948348] audit: type=1400 audit(1755046598.549:1506): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.955050] audit: type=1400 audit(1755046598.549:1507): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.961859] audit: type=1400 audit(1755046598.549:1508): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.968520] audit: type=1400 audit(1755046598.551:1509): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 122.840070] kauditd_printk_skb: 170 callbacks suppressed [ 122.840074] audit: type=1106 audit(1755046604.483:1553): pid=5887 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 122.853128] audit: type=1104 audit(1755046604.483:1554): pid=5887 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 122.861383] audit: type=1131 audit(1755046604.497:1555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.23.116:22-147.75.109.163:52876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 127.868532] audit: type=1130 audit(1755046609.510:1556): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.23.116:22-147.75.109.163:33172 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 128.125850] audit: type=1101 audit(1755046609.768:1557): pid=5932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 128.134686] audit: type=1103 audit(1755046609.768:1558): pid=5932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 128.141820] audit: type=1006 audit(1755046609.768:1559): pid=5932 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 [ 128.146108] audit: type=1300 audit(1755046609.768:1559): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffba012350 a2=3 a3=0 items=0 ppid=1 pid=5932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 128.153460] audit: type=1327 audit(1755046609.768:1559): proctitle=737368643A20636F7265205B707269765D [ 128.170590] audit: type=1105 audit(1755046609.814:1560): pid=5932 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 128.178447] audit: type=1103 audit(1755046609.814:1561): pid=5934 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 128.688841] audit: type=1106 audit(1755046610.331:1562): pid=5932 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 128.697528] audit: type=1104 audit(1755046610.332:1563): pid=5932 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 133.675491] kauditd_printk_skb: 43 callbacks suppressed [ 133.675494] audit: type=1106 audit(1755046615.318:1593): pid=5972 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 133.701710] audit: type=1130 audit(1755046615.321:1594): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.23.116:22-147.75.109.163:33208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 133.708371] audit: type=1104 audit(1755046615.334:1595): pid=5972 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 133.717873] audit: type=1131 audit(1755046615.337:1596): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.23.116:22-147.75.109.163:33198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 133.907290] audit: type=1101 audit(1755046615.550:1597): pid=5986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 133.919454] audit: type=1103 audit(1755046615.561:1598): pid=5986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 133.929344] audit: type=1006 audit(1755046615.561:1599): pid=5986 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 [ 133.935934] audit: type=1300 audit(1755046615.561:1599): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebae70440 a2=3 a3=0 items=0 ppid=1 pid=5986 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 133.948488] audit: type=1327 audit(1755046615.561:1599): proctitle=737368643A20636F7265205B707269765D [ 133.951765] audit: type=1105 audit(1755046615.588:1600): pid=5986 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 139.521173] kauditd_printk_skb: 10 callbacks suppressed [ 139.521176] audit: type=1130 audit(1755046621.165:1607): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.23.116:22-147.75.109.163:54716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 140.048718] audit: type=1101 audit(1755046621.688:1608): pid=6038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 140.101721] audit: type=1103 audit(1755046621.745:1609): pid=6038 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 140.168296] audit: type=1006 audit(1755046621.745:1610): pid=6038 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 [ 140.185355] audit: type=1300 audit(1755046621.745:1610): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd19053ec0 a2=3 a3=0 items=0 ppid=1 pid=6038 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 140.227080] audit: type=1327 audit(1755046621.745:1610): proctitle=737368643A20636F7265205B707269765D [ 140.257478] audit: type=1105 audit(1755046621.871:1611): pid=6038 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 140.294409] audit: type=1103 audit(1755046621.895:1612): pid=6040 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 143.104036] audit: type=1106 audit(1755046624.748:1613): pid=6038 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 143.115431] audit: type=1104 audit(1755046624.748:1614): pid=6038 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 148.141771] kauditd_printk_skb: 1 callbacks suppressed [ 148.141775] audit: type=1130 audit(1755046629.785:1616): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.23.116:22-147.75.109.163:38564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 148.439169] audit: type=1101 audit(1755046630.083:1617): pid=6100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 148.450598] audit: type=1103 audit(1755046630.085:1618): pid=6100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 148.465891] audit: type=1006 audit(1755046630.085:1619): pid=6100 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 [ 148.474000] audit: type=1300 audit(1755046630.085:1619): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe6cb4d50 a2=3 a3=0 items=0 ppid=1 pid=6100 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 148.488214] audit: type=1327 audit(1755046630.085:1619): proctitle=737368643A20636F7265205B707269765D [ 148.516116] audit: type=1105 audit(1755046630.160:1620): pid=6100 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 148.537347] audit: type=1103 audit(1755046630.180:1621): pid=6102 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 150.364509] audit: type=1106 audit(1755046632.008:1622): pid=6100 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 150.380075] audit: type=1104 audit(1755046632.020:1623): pid=6100 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 155.379004] kauditd_printk_skb: 1 callbacks suppressed [ 155.379007] audit: type=1130 audit(1755046637.023:1625): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.23.116:22-147.75.109.163:38580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 155.655192] audit: type=1101 audit(1755046637.299:1626): pid=6134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 155.666571] audit: type=1103 audit(1755046637.310:1627): pid=6134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 155.680629] audit: type=1006 audit(1755046637.310:1628): pid=6134 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 [ 155.686337] audit: type=1300 audit(1755046637.310:1628): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffd5054e0 a2=3 a3=0 items=0 ppid=1 pid=6134 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 155.695355] audit: type=1327 audit(1755046637.310:1628): proctitle=737368643A20636F7265205B707269765D [ 155.713564] audit: type=1105 audit(1755046637.357:1629): pid=6134 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 155.727785] audit: type=1103 audit(1755046637.370:1630): pid=6136 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 156.623588] audit: type=1106 audit(1755046638.266:1631): pid=6134 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 156.633386] audit: type=1104 audit(1755046638.266:1632): pid=6134 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 161.653060] kauditd_printk_skb: 1 callbacks suppressed [ 161.653063] audit: type=1130 audit(1755046643.297:1634): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.23.116:22-147.75.109.163:45492 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 161.954517] audit: type=1101 audit(1755046643.598:1635): pid=6146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 161.964375] audit: type=1103 audit(1755046643.608:1636): pid=6146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 161.976072] audit: type=1006 audit(1755046643.608:1637): pid=6146 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 [ 161.981817] audit: type=1300 audit(1755046643.608:1637): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc53815610 a2=3 a3=0 items=0 ppid=1 pid=6146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 161.993367] audit: type=1327 audit(1755046643.608:1637): proctitle=737368643A20636F7265205B707269765D [ 162.011769] audit: type=1105 audit(1755046643.655:1638): pid=6146 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 162.024871] audit: type=1103 audit(1755046643.669:1639): pid=6148 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 162.989392] audit: type=1106 audit(1755046644.633:1640): pid=6146 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 163.008383] audit: type=1104 audit(1755046644.646:1641): pid=6146 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 168.017441] kauditd_printk_skb: 28 callbacks suppressed [ 168.017443] audit: type=1130 audit(1755046649.662:1652): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.23.116:22-147.75.109.163:57146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 168.326859] audit: type=1101 audit(1755046649.970:1653): pid=6158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 168.342252] audit: type=1103 audit(1755046649.982:1654): pid=6158 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 168.371637] audit: type=1006 audit(1755046649.982:1655): pid=6158 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 [ 168.380467] audit: type=1300 audit(1755046649.982:1655): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4b10f8e0 a2=3 a3=0 items=0 ppid=1 pid=6158 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 168.395326] audit: type=1327 audit(1755046649.982:1655): proctitle=737368643A20636F7265205B707269765D [ 168.404436] audit: type=1105 audit(1755046650.023:1656): pid=6158 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 168.420382] audit: type=1103 audit(1755046650.025:1657): pid=6160 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 169.566091] audit: type=1106 audit(1755046651.210:1658): pid=6158 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 169.588579] audit: type=1104 audit(1755046651.212:1659): pid=6158 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 179.552004] kauditd_printk_skb: 13 callbacks suppressed [ 179.552007] audit: type=1400 audit(1755046661.196:1665): avc: denied { watch } for pid=5798 comm="apiserver" path="/calico-apiserver-certs/..2025_08_13_00_56_00.495203349/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c720 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c16,c720 tclass=file permissive=0 [ 179.562201] audit: type=1300 audit(1755046661.196:1665): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d5a2c0 a2=fc6 a3=0 items=0 ppid=4796 pid=5798 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c720 key=(null) [ 179.571637] audit: type=1327 audit(1755046661.196:1665): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 [ 184.510357] audit: type=1334 audit(1755046666.155:1666): prog-id=83 op=UNLOAD [ 184.513116] audit: type=1334 audit(1755046666.155:1667): prog-id=99 op=UNLOAD [ 184.761676] audit: type=1334 audit(1755046666.405:1668): prog-id=120 op=UNLOAD [ 184.766475] audit: type=1334 audit(1755046666.411:1669): prog-id=123 op=UNLOAD [ 185.458686] audit: type=1400 audit(1755046667.102:1670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 185.465385] audit: type=1400 audit(1755046667.102:1671): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 185.472385] audit: type=1400 audit(1755046667.102:1672): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 185.479464] audit: type=1400 audit(1755046667.102:1673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 185.486430] audit: type=1400 audit(1755046667.102:1674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 185.493310] audit: type=1400 audit(1755046667.102:1675): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 185.499928] audit: type=1400 audit(1755046667.102:1676): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 185.507910] audit: type=1400 audit(1755046667.102:1677): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 190.157245] kauditd_printk_skb: 112 callbacks suppressed [ 190.157248] audit: type=1334 audit(1755046671.802:1708): prog-id=79 op=UNLOAD [ 190.162735] audit: type=1334 audit(1755046671.802:1709): prog-id=108 op=UNLOAD [ 190.406178] audit: type=1400 audit(1755046672.050:1710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 190.412358] audit: type=1400 audit(1755046672.050:1711): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 190.419377] audit: type=1400 audit(1755046672.050:1712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 190.426777] audit: type=1400 audit(1755046672.050:1713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 190.434288] audit: type=1400 audit(1755046672.050:1714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 190.440386] audit: type=1400 audit(1755046672.050:1715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 190.447297] audit: type=1400 audit(1755046672.050:1716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 190.453357] audit: type=1400 audit(1755046672.050:1717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 197.342953] kauditd_printk_skb: 49 callbacks suppressed [ 197.342955] audit: type=1334 audit(1755046678.987:1728): prog-id=238 op=UNLOAD [ 197.350384] audit: type=1334 audit(1755046678.995:1729): prog-id=241 op=UNLOAD [ 205.133344] audit: type=1106 audit(1755046686.778:1730): pid=1927 uid=0 auid=500 ses=1 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 205.144933] audit: type=1104 audit(1755046686.789:1731): pid=1927 uid=0 auid=500 ses=1 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' [ 205.161778] audit: type=1131 audit(1755046686.805:1732): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@0-172.31.23.116:22-147.75.109.163:38568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 205.469163] audit: type=1131 audit(1755046687.110:1733): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata-sshkeys@core comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 205.492413] audit: type=1131 audit(1755046687.137:1734): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 205.509839] audit: type=1131 audit(1755046687.153:1735): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=prepare-helm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 205.524433] audit: type=1131 audit(1755046687.169:1736): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd-keygen comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 205.533358] audit: type=1131 audit(1755046687.177:1737): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 205.597536] audit: type=1131 audit(1755046687.242:1738): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=update-ssh-keys-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 205.652506] audit: type=1131 audit(1755046687.297:1739): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-logind comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'